2020-10-07 05:47:28 +03:00
/ * *
2020-10-08 02:59:44 +03:00
* @ description MeshCentral Intel AMT manager
2020-10-07 05:47:28 +03:00
* @ author Ylian Saint - Hilaire
* @ copyright Intel Corporation 2018 - 2020
* @ license Apache - 2.0
* @ version v0 . 0.1
* /
/*jslint node: true */
/*jshint node: true */
/*jshint strict:false */
/*jshint -W097 */
/*jshint esversion: 6 */
2020-10-16 02:08:36 +03:00
'use strict' ;
2020-10-07 05:47:28 +03:00
2020-10-22 05:13:14 +03:00
module . exports . CreateAmtManager = function ( parent ) {
2020-10-07 05:47:28 +03:00
var obj = { } ;
obj . parent = parent ;
2020-10-16 02:08:36 +03:00
obj . amtDevices = { } ; // Nodeid --> [ dev ]
2020-10-19 08:02:48 +03:00
obj . activeLocalConnections = { } ; // Host --> dev
2020-10-16 02:08:36 +03:00
obj . amtAdminAccounts = { } ; // DomainId -> [ { user, pass } ]
2020-10-18 09:53:50 +03:00
obj . rootCertBase64 = obj . parent . certificates . root . cert . split ( '-----BEGIN CERTIFICATE-----' ) . join ( '' ) . split ( '-----END CERTIFICATE-----' ) . join ( '' ) . split ( '\r' ) . join ( '' ) . split ( '\n' ) . join ( '' )
obj . rootCertCN = obj . parent . certificateOperations . forge . pki . certificateFromPem ( obj . parent . certificates . root . cert ) . subject . getField ( 'CN' ) . value ;
2020-10-07 05:47:28 +03:00
// WSMAN stack
const CreateWsmanComm = require ( './amt/amt-wsman-comm' ) ;
const WsmanStackCreateService = require ( './amt/amt-wsman' ) ;
const AmtStackCreateService = require ( './amt/amt' ) ;
2020-10-16 02:08:36 +03:00
const ConnectionTypeStrings = { 0 : "CIRA" , 1 : "Relay" , 2 : "LMS" , 3 : "Local" } ;
2020-10-22 23:40:49 +03:00
// Check that each domain configuration is correct because we are not going to be checking this later.
if ( parent . config == null ) parent . config = { } ;
if ( parent . config . domains == null ) parent . config . domains = { } ;
for ( var domainid in parent . config . domains ) {
var domain = parent . config . domains [ domainid ] ;
if ( typeof domain . amtmanager != 'object' ) { domain . amtmanager = { } ; }
// Load administrator accounts
if ( Array . isArray ( domain . amtmanager . adminaccounts ) == true ) {
for ( var i = 0 ; i < domain . amtmanager . adminaccounts . length ; i ++ ) {
var c = domain . amtmanager . adminaccounts [ i ] , c2 = { } ;
if ( typeof c . user == 'string' ) { c2 . user = c . user ; } else { c2 . user = 'admin' ; }
if ( typeof c . pass == 'string' ) {
c2 . pass = c . pass ;
if ( obj . amtAdminAccounts [ domainid ] == null ) { obj . amtAdminAccounts [ domainid ] = [ ] ; }
obj . amtAdminAccounts [ domainid ] . push ( c2 ) ;
2020-10-16 02:08:36 +03:00
}
}
2020-10-23 04:39:32 +03:00
} else {
delete domain . amtmanager . adminaccounts ;
2020-10-22 23:40:49 +03:00
}
2020-10-22 05:13:14 +03:00
2020-10-22 23:40:49 +03:00
// Check environment detection
if ( Array . isArray ( domain . amtmanager . environmentdetection ) == true ) {
var envDetect = [ ] ;
for ( var i = 0 ; i < domain . amtmanager . environmentdetection . length ; i ++ ) {
var x = domain . amtmanager . environmentdetection [ i ] . toLowerCase ( ) ;
if ( ( typeof x == 'string' ) && ( x != '' ) && ( x . length < 64 ) && ( envDetect . indexOf ( x ) == - 1 ) ) { envDetect . push ( x ) ; }
if ( envDetect . length >= 4 ) break ; // Maximum of 4 DNS suffix
}
if ( envDetect . length > 0 ) { domain . amtmanager . environmentdetection = envDetect ; } else { delete domain . amtmanager . environmentdetection ; }
2020-10-23 04:39:32 +03:00
} else {
delete domain . amtmanager . environmentdetection ;
}
// Check WIFI profiles
//var wifiAuthMethod = { 1: "Other", 2: "Open", 3: "Shared Key", 4: "WPA PSK", 5: "WPA 802.1x", 6: "WPA2 PSK", 7: "WPA2 802.1x", 32768: "WPA3 802.1x" };
//var wifiEncMethod = { 1: "Other", 2: "WEP", 3: "TKIP", 4: "CCMP", 5: "None" }
if ( Array . isArray ( domain . amtmanager . wifiprofiles ) == true ) {
var goodWifiProfiles = [ ] ;
for ( var i = 0 ; i < domain . amtmanager . wifiprofiles . length ; i ++ ) {
var wifiProfile = domain . amtmanager . wifiprofiles [ i ] ;
if ( ( typeof wifiProfile . ssid == 'string' ) && ( wifiProfile . ssid != '' ) && ( typeof wifiProfile . password == 'string' ) && ( wifiProfile . password != '' ) ) {
if ( ( wifiProfile . name == null ) || ( wifiProfile . name == '' ) ) { wifiProfile . name = wifiProfile . ssid ; }
if ( typeof wifiProfile . authentication == 'string' ) {
// Authentication
if ( typeof wifiProfile . authentication == 'string' ) { wifiProfile . authentication = wifiProfile . authentication . toLowerCase ( ) ; }
if ( wifiProfile . authentication == 'wpa-psk' ) { wifiProfile . authentication = 4 ; }
if ( wifiProfile . authentication == 'wpa2-psk' ) { wifiProfile . authentication = 6 ; }
2020-10-23 05:51:31 +03:00
if ( typeof wifiProfile . authentication != 'number' ) { wifiProfile . authentication = 6 ; } // Default to WPA2-PSK
2020-10-23 04:39:32 +03:00
// Encyption
if ( typeof wifiProfile . encryption == 'string' ) { wifiProfile . encryption = wifiProfile . encryption . toLowerCase ( ) ; }
if ( ( wifiProfile . encryption == 'ccmp-aes' ) || ( wifiProfile . encryption == 'ccmp' ) ) { wifiProfile . encryption = 4 ; }
if ( ( wifiProfile . encryption == 'tkip-rc4' ) || ( wifiProfile . encryption == 'tkip' ) ) { wifiProfile . encryption = 3 ; }
2020-10-23 05:51:31 +03:00
if ( typeof wifiProfile . encryption != 'number' ) { wifiProfile . encryption = 4 ; } // Default to CCMP-AES
2020-10-23 04:39:32 +03:00
// Type
wifiProfile . type = 3 ; // Infrastructure
}
goodWifiProfiles . push ( wifiProfile ) ;
}
}
domain . amtmanager . wifiprofiles = goodWifiProfiles ;
} else {
delete domain . amtmanager . wifiprofiles ;
2020-10-16 02:08:36 +03:00
}
}
// Check if an Intel AMT device is being managed
function isAmtDeviceValid ( dev ) {
var devices = obj . amtDevices [ dev . nodeid ] ;
if ( devices == null ) return false ;
2020-10-22 05:13:14 +03:00
return ( devices . indexOf ( dev ) >= 0 )
2020-10-16 02:08:36 +03:00
}
// Add an Intel AMT managed device
function addAmtDevice ( dev ) {
var devices = obj . amtDevices [ dev . nodeid ] ;
if ( devices == null ) { obj . amtDevices [ dev . nodeid ] = [ dev ] ; return true ; }
if ( devices . indexOf ( dev ) >= 0 ) { return false ; } // This device is already in the list
devices . push ( dev ) ; // Add the device to the list
return true ;
}
// Remove an Intel AMT managed device
function removeAmtDevice ( dev ) {
2021-01-07 12:29:21 +03:00
parent . debug ( 'amt' , dev . name , "Remove device" , dev . nodeid , dev . connType ) ;
2021-01-07 11:11:02 +03:00
2020-10-16 02:08:36 +03:00
// Find the device in the list
var devices = obj . amtDevices [ dev . nodeid ] ;
if ( devices == null ) return false ;
var i = devices . indexOf ( dev ) ;
if ( i == - 1 ) return false ;
2020-10-21 01:15:56 +03:00
// Remove from task limiter if needed
if ( dev . taskid != null ) { obj . parent . taskLimiter . completed ( dev . taskid ) ; delete dev . taskLimiter ; }
2020-10-16 02:08:36 +03:00
// Clean up this device
if ( dev . amtstack != null ) { dev . amtstack . wsman . comm . FailAllError = 999 ; delete dev . amtstack ; } // Disconnect any active connections.
if ( dev . polltimer != null ) { clearInterval ( dev . polltimer ) ; delete dev . polltimer ; }
// Remove the device from the list
devices . splice ( i , 1 ) ;
if ( devices . length == 0 ) { delete obj . amtDevices [ dev . nodeid ] ; } else { obj . amtDevices [ dev . nodeid ] = devices ; }
2020-10-18 05:23:24 +03:00
// Notify connection closure if this is a LMS connection
2021-01-07 11:11:02 +03:00
if ( dev . connType == 2 ) { dev . controlMsg ( { action : 'close' } ) ; }
2020-10-16 02:08:36 +03:00
return true ;
}
// Remove all Intel AMT devices for a given nodeid
function removeDevice ( nodeid ) {
2021-01-07 11:11:02 +03:00
parent . debug ( 'amt' , "Remove nodeid" , nodeid ) ;
2020-10-16 02:08:36 +03:00
// Find the devices in the list
var devices = obj . amtDevices [ nodeid ] ;
if ( devices == null ) return false ;
for ( var i in devices ) {
var dev = devices [ i ] ;
2020-10-21 01:15:56 +03:00
// Remove from task limiter if needed
if ( dev . taskid != null ) { obj . parent . taskLimiter . completed ( dev . taskid ) ; delete dev . taskLimiter ; }
// Clean up this device
2020-10-16 02:08:36 +03:00
if ( dev . amtstack != null ) { dev . amtstack . wsman . comm . FailAllError = 999 ; delete dev . amtstack ; } // Disconnect any active connections.
if ( dev . polltimer != null ) { clearInterval ( dev . polltimer ) ; delete dev . polltimer ; }
2021-01-07 11:11:02 +03:00
// Notify connection closure if this is a LMS connection
if ( dev . connType == 2 ) { dev . controlMsg ( { action : 'close' } ) ; }
2020-10-16 02:08:36 +03:00
}
2021-01-07 11:11:02 +03:00
// Remove all Intel AMT management sessions for this nodeid
2020-10-16 02:08:36 +03:00
delete obj . amtDevices [ nodeid ] ;
return true ;
}
// Start Intel AMT management
obj . startAmtManagement = function ( nodeid , connType , connection ) {
//if (connType == 3) return; // DEBUG
var devices = obj . amtDevices [ nodeid ] , dev = null ;
if ( devices != null ) { for ( var i in devices ) { if ( ( devices [ i ] . mpsConnection == connection ) || ( devices [ i ] . host == connection ) ) { dev = devices [ i ] ; } } }
if ( dev != null ) return false ; // We are already managing this device on this connection
2020-10-18 05:23:24 +03:00
dev = { nodeid : nodeid , connType : connType , domainid : nodeid . split ( '/' ) [ 1 ] } ;
2020-10-16 02:08:36 +03:00
if ( typeof connection == 'string' ) { dev . host = connection ; }
if ( typeof connection == 'object' ) { dev . mpsConnection = connection ; }
2021-01-07 12:29:21 +03:00
dev . consoleMsg = function deviceConsoleMsg ( msg ) { parent . debug ( 'amt' , deviceConsoleMsg . dev . name , msg ) ; if ( typeof deviceConsoleMsg . conn == 'object' ) { deviceConsoleMsg . conn . ControlMsg ( { action : 'console' , msg : msg } ) ; } }
2020-10-18 05:23:24 +03:00
dev . consoleMsg . conn = connection ;
2020-10-19 07:06:39 +03:00
dev . consoleMsg . dev = dev ;
2020-10-18 05:23:24 +03:00
dev . controlMsg = function deviceControlMsg ( msg ) { if ( typeof deviceControlMsg . conn == 'object' ) { deviceControlMsg . conn . ControlMsg ( msg ) ; } }
dev . controlMsg . conn = connection ;
2020-10-16 02:08:36 +03:00
parent . debug ( 'amt' , "Start Management" , nodeid , connType ) ;
addAmtDevice ( dev ) ;
2020-10-20 21:28:18 +03:00
// Start the device manager the task limiter so not to flood the server. Low priority task
obj . parent . taskLimiter . launch ( function ( dev , taskid , taskLimiterQueue ) {
if ( isAmtDeviceValid ( dev ) ) {
// Start managing this device
dev . taskid = taskid ;
fetchIntelAmtInformation ( dev ) ;
} else {
// Device is not valid anymore, do nothing
obj . parent . taskLimiter . completed ( taskid ) ;
}
} , dev , 2 ) ;
2020-10-16 02:08:36 +03:00
}
// Stop Intel AMT management
obj . stopAmtManagement = function ( nodeid , connType , connection ) {
var devices = obj . amtDevices [ nodeid ] , dev = null ;
if ( devices != null ) { for ( var i in devices ) { if ( ( devices [ i ] . mpsConnection == connection ) || ( devices [ i ] . host == connection ) ) { dev = devices [ i ] ; } } }
if ( dev == null ) return false ; // We are not managing this device on this connection
2021-01-07 12:29:21 +03:00
parent . debug ( 'amt' , dev . name , "Stop Management" , nodeid , connType ) ;
2020-10-16 02:08:36 +03:00
return removeAmtDevice ( dev ) ;
}
2020-10-07 05:47:28 +03:00
2020-10-16 02:08:36 +03:00
// Get a string status of the managed devices
obj . getStatusString = function ( ) {
var r = '' ;
for ( var nodeid in obj . amtDevices ) {
var devices = obj . amtDevices [ nodeid ] ;
r += devices [ 0 ] . nodeid + ', ' + devices [ 0 ] . name + '\r\n' ;
for ( var i in devices ) {
var dev = devices [ i ] ;
var items = [ ] ;
if ( dev . state == 1 ) { items . push ( 'Connected' ) ; } else { items . push ( 'Trying' ) ; }
items . push ( ConnectionTypeStrings [ dev . connType ] ) ;
if ( dev . connType == 3 ) { items . push ( dev . host ) ; }
if ( dev . polltimer != null ) { items . push ( 'Polling Power' ) ; }
r += ' ' + items . join ( ', ' ) + '\r\n' ;
}
2020-10-07 05:47:28 +03:00
}
2020-10-16 02:08:36 +03:00
if ( r == '' ) { r = "No managed Intel AMT devices" ; }
return r ;
2020-10-07 05:47:28 +03:00
}
2020-10-21 22:19:00 +03:00
// Receive a JSON control message from the MPS server
obj . mpsControlMessage = function ( nodeid , conn , connType , jsondata ) {
// Find the devices in the list
var dev = null ;
var devices = obj . amtDevices [ nodeid ] ;
if ( devices == null ) return ;
for ( var i in devices ) { if ( devices [ i ] . mpsConnection === conn ) { dev = devices [ i ] ; } }
if ( dev == null ) return ;
// Process the message
switch ( jsondata . action ) {
case 'deactivate' :
if ( ( dev . connType != 2 ) || ( dev . deactivateCcmPending != 1 ) ) break ; // Only accept MEI state on CIRA-LMS connection
delete dev . deactivateCcmPending ;
deactivateIntelAmtCCMEx ( dev , jsondata . value ) ;
break ;
case 'meiState' :
if ( dev . pendingUpdatedMeiState != 1 ) break ;
delete dev . pendingUpdatedMeiState ;
attemptInitialContact ( dev ) ;
break ;
}
}
2020-10-07 05:47:28 +03:00
// Subscribe to server events
parent . AddEventDispatch ( [ '*' ] , obj ) ;
// Handle server events
2020-10-16 02:08:36 +03:00
// Make sure to only manage devices with connections to this server. In a multi-server setup, we don't want multiple managers talking to the same device.
2020-10-07 05:47:28 +03:00
obj . HandleEvent = function ( source , event , ids , id ) {
2020-10-10 01:44:09 +03:00
switch ( event . action ) {
case 'removenode' : { // React to node being removed
removeDevice ( event . nodeid ) ;
break ;
}
case 'wakedevices' : { // React to node wakeup command, perform Intel AMT wake if possible
if ( Array . isArray ( event . nodeids ) ) { for ( var i in event . nodeids ) { performPowerAction ( event . nodeids [ i ] , 2 ) ; } }
break ;
}
2020-10-16 02:08:36 +03:00
case 'changenode' : { // React to changes in a device
var devices = obj . amtDevices [ event . nodeid ] ;
if ( devices = null ) break ; // We are not managing this device
2020-10-10 01:44:09 +03:00
if ( event . amtchange === 1 ) {
2020-10-16 02:08:36 +03:00
// TODO
2020-10-10 01:44:09 +03:00
} else {
2020-10-16 02:08:36 +03:00
/ *
2020-10-10 01:44:09 +03:00
var dev = obj . amtDevices [ event . nodeid ] ;
if ( dev != null ) {
var amtchange = 0 ;
if ( dev . name != event . node . name ) { dev . name = event . node . name ; }
if ( dev . host != event . node . host ) {
dev . host = event . node . host ;
// The host has changed, if we are connected to this device locally, we need to reset.
if ( ( dev . conn & 4 ) != 0 ) { removeDevice ( dev . nodeid ) ; return ; } // We are going to wait for the AMT scanned to find this device again.
}
2020-10-08 02:41:14 +03:00
}
2020-10-16 02:08:36 +03:00
* /
2020-10-08 02:41:14 +03:00
}
2020-10-10 01:44:09 +03:00
break ;
2020-10-08 02:41:14 +03:00
}
}
2020-10-07 05:47:28 +03:00
}
2020-10-19 07:06:39 +03:00
//
// Intel AMT Connection Setup
//
2020-10-07 05:47:28 +03:00
// Update information about a device
2020-10-16 02:08:36 +03:00
function fetchIntelAmtInformation ( dev ) {
parent . db . Get ( dev . nodeid , function ( err , nodes ) {
if ( ( nodes == null ) || ( nodes . length != 1 ) ) { removeAmtDevice ( dev ) ; return ; }
2020-10-07 05:47:28 +03:00
const node = nodes [ 0 ] ;
2020-10-16 02:08:36 +03:00
if ( ( node . intelamt == null ) || ( node . meshid == null ) ) { removeAmtDevice ( dev ) ; return ; }
2020-10-07 05:47:28 +03:00
const mesh = parent . webserver . meshes [ node . meshid ] ;
2020-10-16 02:08:36 +03:00
if ( mesh == null ) { removeAmtDevice ( dev ) ; return ; }
2020-10-07 05:47:28 +03:00
if ( dev == null ) { return ; }
2020-10-21 22:19:00 +03:00
// Fetch Intel AMT setup policy
// mesh.amt.type: 0 = No Policy, 1 = Deactivate CCM, 2 = Manage in CCM, 3 = Manage in ACM
// mesh.amt.cirasetup: 0 = No Change, 1 = Remove CIRA, 2 = Setup CIRA
2020-10-21 23:38:24 +03:00
var amtPolicy = 0 , ciraPolicy = 0 , badPass = 0 , password = null ;
2020-10-21 23:04:36 +03:00
if ( mesh . amt != null ) {
if ( mesh . amt . type ) { amtPolicy = mesh . amt . type ; }
2020-10-23 23:28:31 +03:00
if ( mesh . amt . type == 4 ) {
// Fully automatic policy
ciraPolicy = 2 ; // CIRA will be setup
badPass = 1 ; // Automatically re-active CCM
password = null ; // Randomize the password.
} else {
if ( mesh . amt . cirasetup ) { ciraPolicy = mesh . amt . cirasetup ; }
if ( mesh . amt . badpass ) { badPass = mesh . amt . badpass ; }
if ( ( typeof mesh . amt . password == 'string' ) && ( mesh . amt . password != '' ) ) { password = mesh . amt . password ; }
}
2020-10-21 23:04:36 +03:00
}
2020-10-24 00:56:20 +03:00
if ( amtPolicy == 0 ) { ciraPolicy = 0 ; } // If no policy, don't change CIRA state.
if ( amtPolicy == 1 ) { ciraPolicy = 1 ; } // If deactivation policy, clear CIRA.
2020-10-21 23:38:24 +03:00
dev . policy = { amtPolicy : amtPolicy , ciraPolicy : ciraPolicy , badPass : badPass , password : password } ;
2020-10-21 22:19:00 +03:00
// Setup the monitored device
2020-10-07 05:47:28 +03:00
dev . name = node . name ;
dev . meshid = node . meshid ;
dev . intelamt = node . intelamt ;
2020-10-22 01:36:07 +03:00
// Check if the status of Intel AMT sent by the agents matched what we have in the database
if ( ( dev . connType == 2 ) && ( dev . mpsConnection != null ) && ( dev . mpsConnection . tag != null ) && ( dev . mpsConnection . tag . meiState != null ) ) {
dev . aquired = { } ;
2020-10-22 09:54:56 +03:00
if ( ( typeof dev . mpsConnection . tag . meiState . OsHostname == 'string' ) && ( typeof dev . mpsConnection . tag . meiState . OsDnsSuffix == 'string' ) ) {
dev . host = dev . aquired . host = dev . mpsConnection . tag . meiState . OsHostname + '.' + dev . mpsConnection . tag . meiState . OsDnsSuffix ;
}
2020-10-22 01:36:07 +03:00
if ( typeof dev . mpsConnection . tag . meiState [ 'ProvisioningState' ] == 'number' ) {
dev . intelamt . state = dev . aquired . state = dev . mpsConnection . tag . meiState [ 'ProvisioningState' ] ;
}
if ( typeof dev . mpsConnection . tag . meiState [ 'Flags' ] == 'number' ) {
const flags = dev . intelamt . flags = dev . mpsConnection . tag . meiState [ 'Flags' ] ;
if ( flags & 2 ) { dev . aquired . controlMode = 1 ; } // CCM
if ( flags & 4 ) { dev . aquired . controlMode = 2 ; } // ACM
}
UpdateDevice ( dev ) ;
}
// If there is no Intel AMT policy for this device, stop here.
2020-10-26 21:51:19 +03:00
//if (amtPolicy == 0) { dev.consoleMsg("Done."); removeAmtDevice(dev); return; }
2020-10-22 01:36:07 +03:00
// Initiate the communication to Intel AMT
2020-10-21 22:19:00 +03:00
dev . consoleMsg ( "Checking Intel AMT state..." ) ;
2020-10-10 01:44:09 +03:00
attemptInitialContact ( dev ) ;
2020-10-07 05:47:28 +03:00
} ) ;
}
// Attempt to perform initial contact with Intel AMT
2020-10-10 01:44:09 +03:00
function attemptInitialContact ( dev ) {
2020-10-21 22:19:00 +03:00
delete dev . amtstack ; // If there is a WSMAn stack setup, clean it up now.
2021-01-07 12:29:21 +03:00
parent . debug ( 'amt' , dev . name , "Attempt Initial Contact" , [ "CIRA" , "CIRA-Relay" , "CIRA-LMS" , "Local" ] [ dev . connType ] ) ;
2020-10-07 05:47:28 +03:00
2020-10-21 22:19:00 +03:00
// Check Intel AMT policy when CIRA-LMS connection is in use.
if ( ( dev . connType == 2 ) && ( dev . mpsConnection != null ) && ( dev . mpsConnection . tag != null ) && ( dev . mpsConnection . tag . meiState != null ) ) {
// Intel AMT activation policy
if ( ( dev . policy . amtPolicy > 1 ) && ( dev . mpsConnection . tag . meiState . ProvisioningState !== 2 ) ) {
// This Intel AMT device is not activated, we need to work on activating it.
activateIntelAmt ( dev ) ;
return ;
}
2020-10-23 06:54:18 +03:00
// Check if we have an ACM activation policy, but the device is in CCM
2020-10-23 23:28:31 +03:00
if ( ( ( dev . policy . amtPolicy == 3 ) || ( dev . policy . amtPolicy == 4 ) ) && ( ( dev . mpsConnection . tag . meiState . Flags & 2 ) != 0 ) ) {
2020-10-23 06:54:18 +03:00
// This device in is CCM, check if we can upgrade to ACM
if ( activateIntelAmt ( dev ) == false ) return ; // If this return true, the platform is in CCM and can't go to ACM, keep going with management.
}
2020-10-21 22:19:00 +03:00
// Intel AMT CCM deactivation policy
if ( dev . policy . amtPolicy == 1 ) {
if ( ( dev . mpsConnection . tag . meiState . ProvisioningState == 2 ) && ( ( dev . mpsConnection . tag . meiState . Flags & 2 ) != 0 ) ) {
// Deactivate CCM.
deactivateIntelAmtCCM ( dev ) ;
2020-10-26 21:51:19 +03:00
return ;
2020-10-27 08:52:52 +03:00
}
2020-10-21 22:19:00 +03:00
}
2020-10-21 01:15:56 +03:00
}
2020-10-21 23:04:36 +03:00
// See if we need to try different credentials
2020-10-07 05:47:28 +03:00
if ( ( dev . acctry == null ) && ( ( typeof dev . intelamt . user != 'string' ) || ( typeof dev . intelamt . pass != 'string' ) ) ) {
2020-10-18 05:23:24 +03:00
if ( ( obj . amtAdminAccounts [ dev . domainid ] != null ) && ( obj . amtAdminAccounts [ dev . domainid ] . length > 0 ) ) { dev . acctry = 0 ; } else { removeAmtDevice ( dev ) ; return ; }
2020-10-07 05:47:28 +03:00
}
2020-10-16 02:08:36 +03:00
switch ( dev . connType ) {
case 0 : // CIRA
// Handle the case where the Intel AMT CIRA is connected (connType 0)
// In this connection type, we look at the port bindings to see if we need to do TLS or not.
2020-10-08 22:50:27 +03:00
2020-10-16 02:08:36 +03:00
// Check to see if CIRA is connected on this server.
var ciraconn = dev . mpsConnection ;
if ( ( ciraconn == null ) || ( ciraconn . tag == null ) || ( ciraconn . tag . boundPorts == null ) ) { removeAmtDevice ( dev ) ; return ; } // CIRA connection is not on this server, no need to deal with this device anymore.
2020-10-10 01:44:09 +03:00
2020-10-16 02:08:36 +03:00
// See what user/pass to try.
2020-10-07 05:47:28 +03:00
var user = null , pass = null ;
2020-10-21 23:38:24 +03:00
if ( dev . acctry == null ) { user = dev . intelamt . user ; pass = dev . intelamt . pass ; }
else if ( dev . acctry == 'policy' ) { user = 'admin' ; pass = dev . policy . password ; }
else if ( typeof dev . acctry == 'number' ) { user = obj . amtAdminAccounts [ dev . domainid ] [ dev . acctry ] . user ; pass = obj . amtAdminAccounts [ dev . domainid ] [ dev . acctry ] . pass ; }
2020-10-16 02:08:36 +03:00
// See if we need to perform TLS or not. We prefer not to do TLS within CIRA.
var dotls = - 1 ;
if ( ciraconn . tag . boundPorts . indexOf ( '16992' ) ) { dotls = 0 ; }
else if ( ciraconn . tag . boundPorts . indexOf ( '16993' ) ) { dotls = 1 ; }
2020-10-18 09:53:50 +03:00
if ( dotls == - 1 ) { removeAmtDevice ( dev ) ; return ; } // The Intel AMT ports are not open, not a device we can deal with.
2020-10-16 02:08:36 +03:00
// Connect now
2021-01-07 12:29:21 +03:00
parent . debug ( 'amt' , dev . name , 'CIRA-Connect' , ( dotls == 1 ) ? "TLS" : "NoTLS" , user , pass ) ;
2020-10-16 02:08:36 +03:00
var comm ;
if ( dotls == 1 ) {
comm = CreateWsmanComm ( dev . nodeid , 16993 , user , pass , 1 , null , ciraconn ) ; // Perform TLS
comm . xtlsFingerprint = 0 ; // Perform no certificate checking
} else {
comm = CreateWsmanComm ( dev . nodeid , 16992 , user , pass , 0 , null , ciraconn ) ; // No TLS
}
var wsstack = WsmanStackCreateService ( comm ) ;
dev . amtstack = AmtStackCreateService ( wsstack ) ;
dev . amtstack . dev = dev ;
dev . amtstack . BatchEnum ( null , [ '*AMT_GeneralSettings' , '*IPS_HostBasedSetupService' ] , attemptLocalConnectResponse ) ;
break ;
2020-10-23 07:46:32 +03:00
case 1 : // CIRA-Relay
case 2 : // CIRA-LMS
2020-10-16 02:08:36 +03:00
// Handle the case where the Intel AMT relay or LMS is connected (connType 1 or 2)
// Check to see if CIRA is connected on this server.
var ciraconn = dev . mpsConnection ;
if ( ( ciraconn == null ) || ( ciraconn . tag == null ) || ( ciraconn . tag . boundPorts == null ) ) { removeAmtDevice ( dev ) ; return ; } // Relay connection not valid
// See what user/pass to try.
var user = null , pass = null ;
2020-10-21 23:38:24 +03:00
if ( dev . acctry == null ) { user = dev . intelamt . user ; pass = dev . intelamt . pass ; }
else if ( dev . acctry == 'policy' ) { user = 'admin' ; pass = dev . policy . password ; }
else if ( typeof dev . acctry == 'number' ) { user = obj . amtAdminAccounts [ dev . domainid ] [ dev . acctry ] . user ; pass = obj . amtAdminAccounts [ dev . domainid ] [ dev . acctry ] . pass ; }
2020-10-07 05:47:28 +03:00
// Connect now
var comm ;
if ( dev . tlsfail !== true ) {
2021-01-07 12:29:21 +03:00
parent . debug ( 'amt' , dev . name , ( dev . connType == 1 ) ? 'Relay-Connect' : 'LMS-Connect' , "TLS" , user , pass ) ;
2020-10-16 02:08:36 +03:00
comm = CreateWsmanComm ( dev . nodeid , 16993 , user , pass , 1 , null , ciraconn ) ; // Perform TLS
2020-10-07 05:47:28 +03:00
comm . xtlsFingerprint = 0 ; // Perform no certificate checking
} else {
2021-01-07 12:29:21 +03:00
parent . debug ( 'amt' , dev . name , ( dev . connType == 1 ) ? 'Relay-Connect' : 'LMS-Connect' , "NoTLS" , user , pass ) ;
2020-10-16 02:08:36 +03:00
comm = CreateWsmanComm ( dev . nodeid , 16992 , user , pass , 0 , null , ciraconn ) ; // No TLS
2020-10-07 05:47:28 +03:00
}
var wsstack = WsmanStackCreateService ( comm ) ;
dev . amtstack = AmtStackCreateService ( wsstack ) ;
dev . amtstack . dev = dev ;
2020-10-08 22:50:27 +03:00
dev . amtstack . BatchEnum ( null , [ '*AMT_GeneralSettings' , '*IPS_HostBasedSetupService' ] , attemptLocalConnectResponse ) ;
2020-10-16 02:08:36 +03:00
break ;
2020-10-23 07:46:32 +03:00
case 3 : // Local LAN
2020-10-16 02:08:36 +03:00
// Handle the case where the Intel AMT local scanner found the device (connType 3)
2021-01-07 12:29:21 +03:00
parent . debug ( 'amt' , dev . name , "Attempt Initial Local Contact" , dev . connType , dev . host ) ;
2020-10-16 02:08:36 +03:00
if ( typeof dev . host != 'string' ) { removeAmtDevice ( dev ) ; return ; } // Local connection not valid
// Since we don't allow two or more connections to the same host, check if a pending connection is active.
if ( obj . activeLocalConnections [ dev . host ] != null ) {
// Active connection, hold and try later.
var tryAgainFunc = function tryAgainFunc ( ) { if ( obj . amtDevices [ tryAgainFunc . dev . nodeid ] != null ) { attemptInitialContact ( tryAgainFunc . dev ) ; } }
tryAgainFunc . dev = dev ;
setTimeout ( tryAgainFunc , 5000 ) ;
} else {
2020-10-21 23:38:24 +03:00
// No active connections
// See what user/pass to try.
2020-10-16 02:08:36 +03:00
var user = null , pass = null ;
2020-10-21 23:38:24 +03:00
if ( dev . acctry == null ) { user = dev . intelamt . user ; pass = dev . intelamt . pass ; }
else if ( dev . acctry == 'policy' ) { user = 'admin' ; pass = dev . policy . password ; }
else if ( typeof dev . acctry == 'number' ) { user = obj . amtAdminAccounts [ dev . domainid ] [ dev . acctry ] . user ; pass = obj . amtAdminAccounts [ dev . domainid ] [ dev . acctry ] . pass ; }
2020-10-16 02:08:36 +03:00
// Connect now
var comm ;
if ( dev . tlsfail !== true ) {
2021-01-07 12:29:21 +03:00
parent . debug ( 'amt' , dev . name , 'Direct-Connect' , "TLS" , dev . host , user ) ;
2020-10-16 02:08:36 +03:00
comm = CreateWsmanComm ( dev . host , 16993 , user , pass , 1 ) ; // Always try with TLS first
comm . xtlsFingerprint = 0 ; // Perform no certificate checking
} else {
2021-01-07 12:29:21 +03:00
parent . debug ( 'amt' , dev . name , 'Direct-Connect' , "NoTLS" , dev . host , user ) ;
2020-10-16 02:08:36 +03:00
comm = CreateWsmanComm ( dev . host , 16992 , user , pass , 0 ) ; // Try without TLS
}
var wsstack = WsmanStackCreateService ( comm ) ;
dev . amtstack = AmtStackCreateService ( wsstack ) ;
dev . amtstack . dev = dev ;
obj . activeLocalConnections [ dev . host ] = dev ;
dev . amtstack . BatchEnum ( null , [ '*AMT_GeneralSettings' , '*IPS_HostBasedSetupService' ] , attemptLocalConnectResponse ) ;
dev . conntype = 1 ; // LOCAL
}
break ;
2020-10-07 05:47:28 +03:00
}
}
2020-10-08 22:50:27 +03:00
function attemptLocalConnectResponse ( stack , name , responses , status ) {
2020-10-16 02:08:36 +03:00
const dev = stack . dev ;
2021-01-07 12:29:21 +03:00
parent . debug ( 'amt' , dev . name , "Initial Contact Response" , status ) ;
2020-10-08 22:50:27 +03:00
2020-10-16 02:08:36 +03:00
// If this is a local connection device, release active connection to this host.
if ( dev . connType == 3 ) { delete obj . activeLocalConnections [ dev . host ] ; }
2020-10-07 05:47:28 +03:00
// Check if the device still exists
2020-10-16 02:08:36 +03:00
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
2020-10-07 05:47:28 +03:00
// Check the response
if ( ( status == 200 ) && ( responses [ 'AMT_GeneralSettings' ] != null ) && ( responses [ 'IPS_HostBasedSetupService' ] != null ) && ( responses [ 'IPS_HostBasedSetupService' ] . response != null ) && ( responses [ 'IPS_HostBasedSetupService' ] . response != null ) && ( stack . wsman . comm . digestRealm == responses [ 'AMT_GeneralSettings' ] . response . DigestRealm ) ) {
// Everything looks good
2020-10-18 05:23:24 +03:00
dev . consoleMsg ( stack . wsman . comm . xtls ? "Intel AMT connected with TLS." : "Intel AMT connected." ) ;
2020-10-16 02:08:36 +03:00
dev . state = 1 ;
2020-10-07 05:47:28 +03:00
if ( dev . aquired == null ) { dev . aquired = { } ; }
dev . aquired . controlMode = responses [ 'IPS_HostBasedSetupService' ] . response . CurrentControlMode ; // 1 = CCM, 2 = ACM
2020-10-23 19:45:57 +03:00
if ( typeof stack . wsman . comm . amtVersion == 'string' ) { // Set the Intel AMT version using the HTTP header if present
var verSplit = stack . wsman . comm . amtVersion . split ( '.' ) ;
if ( verSplit . length >= 3 ) { dev . aquired . version = verSplit [ 0 ] + '.' + verSplit [ 1 ] + '.' + verSplit [ 2 ] ; dev . aquired . majorver = parseInt ( verSplit [ 0 ] ) ; dev . aquired . minorver = parseInt ( verSplit [ 1 ] ) ; }
}
2020-10-07 05:47:28 +03:00
dev . aquired . realm = stack . wsman . comm . digestRealm ;
2020-10-22 01:36:07 +03:00
dev . aquired . user = dev . intelamt . user = stack . wsman . comm . user ;
dev . aquired . pass = dev . intelamt . pass = stack . wsman . comm . pass ;
2020-10-07 05:47:28 +03:00
dev . aquired . lastContact = Date . now ( ) ;
2020-10-23 21:42:27 +03:00
dev . aquired . warn = 0 ; // Clear all warnings (TODO: Check Realm and TLS cert pinning)
2020-10-16 02:08:36 +03:00
if ( ( dev . connType == 1 ) || ( dev . connType == 3 ) ) { dev . aquired . tls = stack . wsman . comm . xtls ; } // Only set the TLS state if in relay or local mode. When using CIRA, this is auto-detected.
2020-10-08 02:41:14 +03:00
if ( stack . wsman . comm . xtls == 1 ) { dev . aquired . hash = stack . wsman . comm . xtlsCertificate . fingerprint . split ( ':' ) . join ( '' ) . toLowerCase ( ) ; } else { delete dev . aquired . hash ; }
2020-10-07 05:47:28 +03:00
UpdateDevice ( dev ) ;
2020-10-08 02:59:44 +03:00
2020-10-15 00:57:54 +03:00
// Perform Intel AMT clock sync
2020-10-21 20:43:55 +03:00
attemptSyncClock ( dev , function ( dev ) {
2020-10-18 09:53:50 +03:00
// Check Intel AMT TLS state
2020-10-21 20:43:55 +03:00
attemptTlsSync ( dev , function ( dev ) {
// If we need to switch to TLS, do it now.
2020-10-21 22:19:00 +03:00
if ( dev . switchToTls == 1 ) { delete dev . switchToTls ; attemptInitialContact ( dev ) ; return ; }
2020-10-23 04:39:32 +03:00
// Check Intel AMT WIFI state
attemptWifiSync ( dev , function ( dev ) {
// Check Intel AMT root certificate state
attemptRootCertSync ( dev , function ( dev ) {
// Check Intel AMT CIRA settings
attemptCiraSync ( dev , function ( dev ) {
// Check Intel AMT settings
attemptSettingsSync ( dev , function ( dev ) {
// See if we need to get hardware inventory
attemptFetchHardwareInventory ( dev , function ( dev ) {
dev . consoleMsg ( 'Done.' ) ;
// Remove from task limiter if needed
if ( dev . taskid != null ) { obj . parent . taskLimiter . completed ( dev . taskid ) ; delete dev . taskLimiter ; }
if ( dev . connType != 2 ) {
// Start power polling if not connected to LMS
var ppfunc = function powerPoleFunction ( ) { fetchPowerState ( powerPoleFunction . dev ) ; }
ppfunc . dev = dev ;
dev . polltimer = new setTimeout ( ppfunc , 290000 ) ; // Poll for power state every 4 minutes 50 seconds.
fetchPowerState ( dev ) ;
} else {
// For LMS connections, close now.
dev . controlMsg ( { action : 'close' } ) ;
}
} ) ;
2020-10-21 20:28:59 +03:00
} ) ;
2020-10-19 07:06:39 +03:00
} ) ;
2020-10-18 09:53:50 +03:00
} ) ;
} ) ;
2020-10-18 05:23:24 +03:00
} ) ;
2020-10-15 00:57:54 +03:00
} ) ;
2020-10-07 05:47:28 +03:00
} else {
// We got a bad response
2020-10-23 07:46:32 +03:00
if ( ( dev . conntype != 0 ) && ( dev . tlsfail !== true ) && ( status == 408 ) ) { // If not using CIRA and we get a 408 error while using TLS, try non-TLS.
2020-10-08 22:50:27 +03:00
// TLS error on a local connection, try again without TLS
2020-10-10 01:44:09 +03:00
dev . tlsfail = true ; attemptInitialContact ( dev ) ; return ;
2020-10-07 05:47:28 +03:00
} else if ( status == 401 ) {
// Authentication error, see if we can use alternative credentials
2020-10-23 23:28:31 +03:00
if ( ( dev . acctry == null ) && ( typeof dev . policy . password == 'string' ) && ( dev . policy . password != '' ) ) { dev . acctry = 'policy' ; attemptInitialContact ( dev ) ; return ; }
2020-10-24 00:56:20 +03:00
if ( ( ( dev . acctry == null ) || ( dev . acctry == 'policy' ) ) && ( obj . amtAdminAccounts [ dev . domainid ] != null ) && ( obj . amtAdminAccounts [ dev . domainid ] . length > 0 ) ) { dev . acctry = 0 ; attemptInitialContact ( dev ) ; return ; }
2020-10-16 02:08:36 +03:00
if ( ( dev . acctry != null ) && ( obj . amtAdminAccounts [ dev . domainid ] != null ) && ( obj . amtAdminAccounts [ dev . domainid ] . length > ( dev . acctry + 1 ) ) ) { dev . acctry ++ ; attemptInitialContact ( dev ) ; return ; }
2020-10-07 22:30:29 +03:00
2020-10-21 23:04:36 +03:00
// If this devics is in CCM mode and we have a bad password reset policy, do it now.
if ( ( dev . connType == 2 ) && ( dev . policy . badPass == 1 ) && ( dev . mpsConnection != null ) && ( dev . mpsConnection . tag != null ) && ( dev . mpsConnection . tag . meiState != null ) && ( dev . mpsConnection . tag . meiState . Flags != null ) && ( ( dev . mpsConnection . tag . meiState . Flags & 2 ) != 0 ) ) {
deactivateIntelAmtCCM ( dev ) ;
return ;
}
// We are unable to authenticate to this device
2020-10-18 09:53:50 +03:00
dev . consoleMsg ( "Unable to connect." ) ;
2020-10-21 23:04:36 +03:00
// Set an error that we can't login to this device
2020-10-24 01:02:13 +03:00
if ( dev . aquired == null ) { dev . aquired = { } ; }
2020-10-23 21:42:27 +03:00
dev . aquired . warn = 1 ; // Intel AMT Warning Flags: 1 = Unknown credentials, 2 = Realm Mismatch, 4 = TLS Cert Mismatch
UpdateDevice ( dev ) ;
2020-10-07 05:47:28 +03:00
}
2020-10-08 02:59:44 +03:00
//console.log(dev.nodeid, dev.name, dev.host, status, 'Bad response');
2020-10-16 02:08:36 +03:00
removeAmtDevice ( dev ) ;
2020-10-07 05:47:28 +03:00
}
}
2020-10-19 07:06:39 +03:00
//
// Intel AMT Database Update
//
2020-10-07 05:47:28 +03:00
// Change the current core information string and event it
function UpdateDevice ( dev ) {
// Check that the mesh exists
const mesh = parent . webserver . meshes [ dev . meshid ] ;
2020-10-22 05:13:14 +03:00
if ( mesh == null ) { removeAmtDevice ( dev ) ; return false ; }
2020-10-07 05:47:28 +03:00
// Get the node and change it if needed
parent . db . Get ( dev . nodeid , function ( err , nodes ) {
2020-10-22 05:13:14 +03:00
if ( ( nodes == null ) || ( nodes . length != 1 ) ) return false ;
2020-10-07 05:47:28 +03:00
const device = nodes [ 0 ] ;
var changes = [ ] , change = 0 , log = 0 ;
var domain = parent . config . domains [ device . domain ] ;
2020-10-22 05:13:14 +03:00
if ( domain == null ) return false ;
2020-10-07 05:47:28 +03:00
// Check if anything changes
if ( device . intelamt == null ) { device . intelamt = { } ; }
2020-10-25 09:34:00 +03:00
if ( ( typeof dev . aquired . version == 'string' ) && ( dev . aquired . version != device . intelamt . ver ) ) { change = 1 ; log = 1 ; device . intelamt . ver = dev . aquired . version ; changes . push ( 'AMT version' ) ; }
if ( ( typeof dev . aquired . user == 'string' ) && ( dev . aquired . user != device . intelamt . user ) ) { change = 1 ; log = 1 ; device . intelamt . user = dev . aquired . user ; changes . push ( 'AMT user' ) ; }
if ( ( typeof dev . aquired . pass == 'string' ) && ( dev . aquired . pass != device . intelamt . pass ) ) { change = 1 ; log = 1 ; device . intelamt . pass = dev . aquired . pass ; changes . push ( 'AMT pass' ) ; }
if ( ( typeof dev . aquired . mpspass == 'string' ) && ( dev . aquired . mpspass != device . intelamt . mpspass ) ) { change = 1 ; log = 1 ; device . intelamt . mpspass = dev . aquired . mpspass ; changes . push ( 'AMT MPS pass' ) ; }
2020-10-31 03:08:07 +03:00
if ( ( typeof dev . aquired . host == 'string' ) && ( dev . aquired . host != device . intelamt . host ) ) { change = 1 ; log = 1 ; device . intelamt . host = dev . aquired . host ; changes . push ( 'AMT host' ) ; }
2020-10-25 09:34:00 +03:00
if ( ( typeof dev . aquired . realm == 'string' ) && ( dev . aquired . realm != device . intelamt . realm ) ) { change = 1 ; log = 1 ; device . intelamt . realm = dev . aquired . realm ; changes . push ( 'AMT realm' ) ; }
if ( ( typeof dev . aquired . hash == 'string' ) && ( dev . aquired . hash != device . intelamt . hash ) ) { change = 1 ; log = 1 ; device . intelamt . hash = dev . aquired . hash ; changes . push ( 'AMT hash' ) ; }
if ( ( typeof dev . aquired . tls == 'number' ) && ( dev . aquired . tls != device . intelamt . tls ) ) { change = 1 ; log = 1 ; device . intelamt . tls = dev . aquired . tls ; changes . push ( 'AMT TLS' ) ; }
if ( ( typeof dev . aquired . state == 'number' ) && ( dev . aquired . state != device . intelamt . state ) ) { change = 1 ; log = 1 ; device . intelamt . state = dev . aquired . state ; changes . push ( 'AMT state' ) ; }
2020-10-07 05:47:28 +03:00
2020-10-23 21:42:27 +03:00
// Intel AMT Warning Flags: 1 = Unknown credentials, 2 = Realm Mismatch, 4 = TLS Cert Mismatch
if ( ( typeof dev . aquired . warn == 'number' ) ) { if ( ( dev . aquired . warn == 0 ) && ( device . intelamt . warn != null ) ) { delete device . intelamt . warn ; change = 1 ; } else if ( dev . aquired . warn != device . intelamt . warn ) { device . intelamt . warn = dev . aquired . warn ; change = 1 ; } }
2020-10-07 05:47:28 +03:00
// Update Intel AMT flags if needed
// dev.aquired.controlMode // 1 = CCM, 2 = ACM
// (node.intelamt.flags & 2) == CCM, (node.intelamt.flags & 4) == ACM
var flags = 0 ;
if ( typeof device . intelamt . flags == 'number' ) { flags = device . intelamt . flags ; }
if ( dev . aquired . controlMode == 1 ) { if ( ( flags & 4 ) != 0 ) { flags -= 4 ; } if ( ( flags & 2 ) == 0 ) { flags += 2 ; } } // CCM
if ( dev . aquired . controlMode == 2 ) { if ( ( flags & 4 ) == 0 ) { flags += 4 ; } if ( ( flags & 2 ) != 0 ) { flags -= 2 ; } } // ACM
2020-10-22 05:13:14 +03:00
if ( device . intelamt . flags != flags ) { change = 1 ; log = 1 ; device . intelamt . flags = flags ; changes . push ( 'AMT flags' ) ; }
2020-10-07 05:47:28 +03:00
// If there are changes, event the new device
if ( change == 1 ) {
// Save to the database
parent . db . Set ( device ) ;
// Event the node change
var event = { etype : 'node' , action : 'changenode' , nodeid : device . _id , domain : domain . id , node : parent . webserver . CloneSafeNode ( device ) } ;
if ( changes . length > 0 ) { event . msg = 'Changed device ' + device . name + ' from group ' + mesh . name + ': ' + changes . join ( ', ' ) ; }
if ( ( log == 0 ) || ( ( obj . agentInfo ) && ( obj . agentInfo . capabilities ) && ( obj . agentInfo . capabilities & 0x20 ) ) || ( changes . length == 0 ) ) { event . nolog = 1 ; } // If this is a temporary device, don't log changes
if ( parent . db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the node. Another event will come.
parent . DispatchEvent ( parent . webserver . CreateMeshDispatchTargets ( device . meshid , [ device . _id ] ) , obj , event ) ;
}
} ) ;
}
2020-10-07 22:30:29 +03:00
// Change the current core information string and event it
function ClearDeviceCredentials ( dev ) {
2020-10-16 02:08:36 +03:00
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
2020-10-07 22:30:29 +03:00
// Check that the mesh exists
const mesh = parent . webserver . meshes [ dev . meshid ] ;
2020-10-18 09:53:50 +03:00
if ( mesh == null ) { removeAmtDevice ( dev ) ; return ; }
2020-10-07 22:30:29 +03:00
// Get the node and change it if needed
parent . db . Get ( dev . nodeid , function ( err , nodes ) {
if ( ( nodes == null ) || ( nodes . length != 1 ) ) return ;
const device = nodes [ 0 ] ;
var changes = [ ] , change = 0 , log = 0 ;
var domain = parent . config . domains [ device . domain ] ;
if ( domain == null ) return ;
// Check if anything changes
if ( device . intelamt == null ) return ;
if ( device . intelamt . user != null ) { change = 1 ; log = 1 ; delete device . intelamt . user ; changes . push ( 'AMT user' ) ; }
if ( device . intelamt . pass != null ) { change = 1 ; log = 1 ; delete device . intelamt . pass ; changes . push ( 'AMT pass' ) ; }
// If there are changes, event the new device
if ( change == 1 ) {
// Save to the database
parent . db . Set ( device ) ;
// Event the node change
var event = { etype : 'node' , action : 'changenode' , nodeid : device . _id , domain : domain . id , node : parent . webserver . CloneSafeNode ( device ) } ;
if ( changes . length > 0 ) { event . msg = 'Changed device ' + device . name + ' from group ' + mesh . name + ': ' + changes . join ( ', ' ) ; }
if ( ( log == 0 ) || ( ( obj . agentInfo ) && ( obj . agentInfo . capabilities ) && ( obj . agentInfo . capabilities & 0x20 ) ) || ( changes . length == 0 ) ) { event . nolog = 1 ; } // If this is a temporary device, don't log changes
if ( parent . db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the node. Another event will come.
parent . DispatchEvent ( parent . webserver . CreateMeshDispatchTargets ( device . meshid , [ device . _id ] ) , obj , event ) ;
}
} ) ;
}
2020-10-19 07:06:39 +03:00
//
// Intel AMT Power State
//
2020-10-16 02:08:36 +03:00
// Get the current power state of a device
function fetchPowerState ( dev ) {
if ( isAmtDeviceValid ( dev ) == false ) return ;
// Check if the agent is connected
var constate = parent . GetConnectivityState ( dev . nodeid ) ;
if ( ( constate == null ) || ( constate . connectivity & 1 ) ) return ; // If there is no connectivity or the agent is connected, skip trying to poll power state.
// Fetch the power state
dev . amtstack . BatchEnum ( null , [ 'CIM_ServiceAvailableToElement' ] , function ( stack , name , responses , status ) {
const dev = stack . dev ;
if ( obj . amtDevices [ dev . nodeid ] == null ) return ; // Device no longer exists, ignore this response.
if ( ( status != 200 ) || ( responses [ 'CIM_ServiceAvailableToElement' ] == null ) || ( responses [ 'CIM_ServiceAvailableToElement' ] . responses == null ) || ( responses [ 'CIM_ServiceAvailableToElement' ] . responses . length < 1 ) ) return ; // If the polling fails, just skip it.
var powerstate = responses [ 'CIM_ServiceAvailableToElement' ] . responses [ 0 ] . PowerState ;
2020-10-23 19:45:57 +03:00
if ( ( powerstate == 2 ) && ( dev . aquired . majorver != null ) && ( dev . aquired . majorver > 9 ) ) {
2020-10-16 02:08:36 +03:00
// Device is powered on and Intel AMT 10+, poll the OS power state.
dev . amtstack . Get ( 'IPS_PowerManagementService' , function ( stack , name , response , status ) {
const dev = stack . dev ;
if ( obj . amtDevices [ dev . nodeid ] == null ) return ; // Device no longer exists, ignore this response.
if ( status != 200 ) return ;
// Convert the OS power state
var meshPowerState = - 1 ;
if ( response . Body . OSPowerSavingState == 2 ) { meshPowerState = 1 ; } // Fully powered (S0);
else if ( response . Body . OSPowerSavingState == 3 ) { meshPowerState = 2 ; } // Modern standby (We are going to call this S1);
// Set OS power state
if ( meshPowerState >= 0 ) { parent . SetConnectivityState ( dev . meshid , dev . nodeid , Date . now ( ) , 4 , meshPowerState ) ; }
} ) ;
} else {
// Convert the power state
// AMT power: 1 = Other, 2 = On, 3 = Sleep-Light, 4 = Sleep-Deep, 5 = Power Cycle (Off-Soft), 6 = Off-Hard, 7 = Hibernate (Off-Soft), 8 = Off-Soft, 9 = Power Cycle (Off-Hard), 10 = Master Bus Reset, 11 = Diagnostic Interrupt (NMI), 12 = Off-Soft Graceful, 13 = Off-Hard Graceful, 14 = Master Bus Reset Graceful, 15 = Power Cycle (Off- oft Graceful), 16 = Power Cycle (Off - Hard Graceful), 17 = Diagnostic Interrupt (INIT)
// Mesh power: 0 = Unknown, 1 = S0 power on, 2 = S1 Sleep, 3 = S2 Sleep, 4 = S3 Sleep, 5 = S4 Hibernate, 6 = S5 Soft-Off, 7 = Present
var meshPowerState = - 1 , powerConversionTable = [ - 1 , - 1 , 1 , 2 , 3 , 6 , 6 , 5 , 6 ] ;
if ( powerstate < powerConversionTable . length ) { meshPowerState = powerConversionTable [ powerstate ] ; } else { powerstate = 6 ; }
// Set power state
if ( meshPowerState >= 0 ) { parent . SetConnectivityState ( dev . meshid , dev . nodeid , Date . now ( ) , 4 , meshPowerState ) ; }
}
} ) ;
}
// Perform a power action: 2 = Power up, 5 = Power cycle, 8 = Power down, 10 = Reset
function performPowerAction ( nodeid , action ) {
var devices = obj . amtDevices [ nodeid ] ;
if ( devices == null ) return ;
for ( var i in devices ) {
var dev = devices [ i ] ;
if ( dev . amtstack != null ) {
// TODO: Check if the device passed initial connection
try { dev . amtstack . RequestPowerStateChange ( action , performPowerActionResponse ) ; } catch ( ex ) { }
}
}
}
// Response to Intel AMT power action
function performPowerActionResponse ( stack , name , responses , status ) {
//console.log('performPowerActionResponse', status);
}
2020-10-19 07:06:39 +03:00
//
// Intel AMT Clock Syncronization
//
2020-10-15 00:57:54 +03:00
// Attempt to sync the Intel AMT clock if needed, call func back when done.
// Care should be take not to have many pending WSMAN called when performing clock sync.
function attemptSyncClock ( dev , func ) {
2020-10-16 02:08:36 +03:00
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
2020-10-26 21:51:19 +03:00
if ( dev . policy . amtPolicy == 0 ) { func ( dev ) ; return ; } // If there is no Intel AMT policy, skip this operation.
2020-10-18 05:23:24 +03:00
dev . taskCount = 1 ;
dev . taskCompleted = func ;
2020-10-15 00:57:54 +03:00
dev . amtstack . AMT _TimeSynchronizationService _GetLowAccuracyTimeSynch ( attemptSyncClockEx ) ;
}
// Intel AMT clock query response
function attemptSyncClockEx ( stack , name , response , status ) {
const dev = stack . dev ;
2020-10-16 02:08:36 +03:00
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
2020-10-19 08:02:48 +03:00
if ( status != 200 ) { dev . consoleMsg ( "Failed to get clock (" + status + ")." ) ; removeAmtDevice ( dev ) ; return ; }
2020-10-15 00:57:54 +03:00
// Compute how much drift between Intel AMT and our clock.
var t = new Date ( ) , now = new Date ( ) ;
t . setTime ( response . Body [ 'Ta0' ] * 1000 ) ;
if ( Math . abs ( t - now ) > 10000 ) { // If the Intel AMT clock is more than 10 seconds off, set it.
2020-10-18 05:23:24 +03:00
dev . consoleMsg ( "Performing clock sync." ) ;
2020-10-15 00:57:54 +03:00
var Tm1 = Math . round ( now . getTime ( ) / 1000 ) ;
dev . amtstack . AMT _TimeSynchronizationService _SetHighAccuracyTimeSynch ( response . Body [ 'Ta0' ] , Tm1 , Tm1 , attemptSyncClockSet ) ;
} else {
// Clock is fine, we are done.
2020-10-18 05:23:24 +03:00
devTaskCompleted ( dev )
2020-10-15 00:57:54 +03:00
}
}
// Intel AMT clock set response
function attemptSyncClockSet ( stack , name , responses , status ) {
const dev = stack . dev ;
2020-10-16 02:08:36 +03:00
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
2020-10-19 08:02:48 +03:00
if ( status != 200 ) { dev . consoleMsg ( "Failed to sync clock (" + status + ")." ) ; removeAmtDevice ( dev ) ; }
2020-10-18 05:23:24 +03:00
devTaskCompleted ( dev )
2020-10-15 00:57:54 +03:00
}
2020-10-19 07:06:39 +03:00
//
// Intel AMT TLS setup
//
2020-10-18 09:53:50 +03:00
// Check if Intel AMT TLS state is correct
function attemptTlsSync ( dev , func ) {
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
2020-10-26 21:51:19 +03:00
if ( dev . policy . amtPolicy == 0 ) { func ( dev ) ; return ; } // If there is no Intel AMT policy, skip this operation.
2020-10-21 23:04:36 +03:00
dev . taskCount = 1 ;
dev . taskCompleted = func ;
// TODO: We only deal with certificates starting with Intel AMT 6 and beyond
dev . amtstack . BatchEnum ( null , [ 'AMT_PublicKeyCertificate' , 'AMT_PublicPrivateKeyPair' , 'AMT_TLSSettingData' , 'AMT_TLSCredentialContext' ] , attemptTlsSyncEx ) ;
2020-10-18 09:53:50 +03:00
}
function attemptTlsSyncEx ( stack , name , responses , status ) {
const dev = stack . dev ;
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
2020-10-19 08:02:48 +03:00
if ( status != 200 ) { dev . consoleMsg ( "Failed to get security information (" + status + ")." ) ; removeAmtDevice ( dev ) ; return ; }
2020-10-18 09:53:50 +03:00
// Setup the certificates
dev . policy . certPrivateKeys = responses [ 'AMT_PublicPrivateKeyPair' ] . responses ;
dev . policy . tlsSettings = responses [ 'AMT_TLSSettingData' ] . responses ;
dev . policy . tlsCredentialContext = responses [ 'AMT_TLSCredentialContext' ] . responses ;
var xxCertificates = responses [ 'AMT_PublicKeyCertificate' ] . responses ;
for ( var i in xxCertificates ) {
xxCertificates [ i ] . TrustedRootCertficate = ( xxCertificates [ i ] [ 'TrustedRootCertficate' ] == true ) ;
2020-10-19 07:06:39 +03:00
xxCertificates [ i ] . X509CertificateBin = Buffer . from ( xxCertificates [ i ] [ 'X509Certificate' ] , 'base64' ) . toString ( 'binary' ) ;
2020-10-18 09:53:50 +03:00
xxCertificates [ i ] . XIssuer = parseCertName ( xxCertificates [ i ] [ 'Issuer' ] ) ;
xxCertificates [ i ] . XSubject = parseCertName ( xxCertificates [ i ] [ 'Subject' ] ) ;
}
amtcert _linkCertPrivateKey ( xxCertificates , dev . policy . certPrivateKeys ) ;
dev . policy . certificates = xxCertificates ;
// Find the current TLS certificate & MeshCentral root certificate
var xxTlsCurrentCert = null ;
if ( dev . policy . tlsCredentialContext . length > 0 ) {
var certInstanceId = dev . policy . tlsCredentialContext [ 0 ] [ 'ElementInContext' ] [ 'ReferenceParameters' ] [ 'SelectorSet' ] [ 'Selector' ] [ 'Value' ] ;
for ( var i in dev . policy . certificates ) { if ( dev . policy . certificates [ i ] [ 'InstanceID' ] == certInstanceId ) { xxTlsCurrentCert = i ; } }
}
// This is a managed device and TLS is not enabled, turn it on.
if ( xxTlsCurrentCert == null ) {
// Start by generating a key pair
dev . amtstack . AMT _PublicKeyManagementService _GenerateKeyPair ( 0 , 2048 , function ( stack , name , responses , status ) {
const dev = stack . dev ;
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
2020-10-19 08:02:48 +03:00
if ( status != 200 ) { dev . consoleMsg ( "Failed to generate a key pair (" + status + ")." ) ; removeAmtDevice ( dev ) ; return ; }
2020-10-18 09:53:50 +03:00
2020-10-21 01:15:56 +03:00
// Check that we get a key pair reference
var x = null ;
try { x = responses . Body [ 'KeyPair' ] [ 'ReferenceParameters' ] [ 'SelectorSet' ] [ 'Selector' ] [ 'Value' ] ; } catch ( ex ) { }
if ( x == null ) { dev . consoleMsg ( "Unable to get key pair reference." ) ; removeAmtDevice ( dev ) ; return ; }
2020-10-18 09:53:50 +03:00
// Get the new key pair
dev . amtstack . Enum ( 'AMT_PublicPrivateKeyPair' , function ( stack , name , responses , status , tag ) {
const dev = stack . dev ;
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
2020-10-19 08:02:48 +03:00
if ( status != 200 ) { dev . consoleMsg ( "Failed to get a key pair list (" + status + ")." ) ; removeAmtDevice ( dev ) ; return ; }
2020-10-18 09:53:50 +03:00
// Get the new DER key
var DERKey = null ;
for ( var i in responses ) { if ( responses [ i ] [ 'InstanceID' ] == tag ) { DERKey = responses [ i ] [ 'DERKey' ] ; } }
// Get certificate values
const commonName = 'IntelAMT-' + Buffer . from ( parent . crypto . randomBytes ( 6 ) , 'binary' ) . toString ( 'hex' ) ;
const domain = parent . config . domains [ dev . domainid ] ;
var serverName = 'MeshCentral' ;
if ( ( domain != null ) && ( domain . title != null ) ) { serverName = domain . title ; }
2020-10-21 04:14:00 +03:00
const certattributes = { 'CN' : commonName , 'O' : serverName , 'ST' : 'MC' , 'C' : 'MC' } ;
2020-10-18 09:53:50 +03:00
const issuerattributes = { 'CN' : obj . rootCertCN } ;
const xxCaPrivateKey = obj . parent . certificates . root . key ;
// Set the extended key usages
var extKeyUsage = { name : 'extKeyUsage' , serverAuth : true , clientAuth : true }
// Sign the key pair using the CA certifiate
const cert = amtcert _createCertificate ( certattributes , xxCaPrivateKey , DERKey , issuerattributes , extKeyUsage ) ;
if ( cert == null ) { dev . consoleMsg ( "Failed to sign the TLS certificate." ) ; removeAmtDevice ( dev ) ; return ; }
// Place the resulting signed certificate back into AMT
var pem = obj . parent . certificateOperations . forge . pki . certificateToPem ( cert ) . replace ( /(\r\n|\n|\r)/gm , '' ) ;
2020-10-21 01:15:56 +03:00
// Set the certificate finderprint (SHA1)
var md = obj . parent . certificateOperations . forge . md . sha1 . create ( ) ;
md . update ( obj . parent . certificateOperations . forge . asn1 . toDer ( obj . parent . certificateOperations . forge . pki . certificateToAsn1 ( cert ) ) . getBytes ( ) ) ;
dev . aquired . xhash = md . digest ( ) . toHex ( ) ;
2020-10-18 09:53:50 +03:00
dev . amtstack . AMT _PublicKeyManagementService _AddCertificate ( pem . substring ( 27 , pem . length - 25 ) , function ( stack , name , responses , status ) {
const dev = stack . dev ;
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
2020-10-19 08:02:48 +03:00
if ( status != 200 ) { dev . consoleMsg ( "Failed to add TLS certificate (" + status + ")." ) ; removeAmtDevice ( dev ) ; return ; }
2020-10-29 00:46:40 +03:00
var certInstanceId = null ;
try { certInstanceId = responses . Body [ 'CreatedCertificate' ] [ 'ReferenceParameters' ] [ 'SelectorSet' ] [ 'Selector' ] [ 'Value' ] ; } catch ( ex ) { }
if ( certInstanceId == null ) { dev . consoleMsg ( "Failed to get TLS certificate identifier." ) ; removeAmtDevice ( dev ) ; return ; }
2020-10-18 09:53:50 +03:00
// Set the TLS certificate
dev . setTlsSecurityPendingCalls = 3 ;
if ( dev . policy . tlsCredentialContext . length > 0 ) {
// Modify the current context
var newTLSCredentialContext = Clone ( dev . policy . tlsCredentialContext [ 0 ] ) ;
newTLSCredentialContext [ 'ElementInContext' ] [ 'ReferenceParameters' ] [ 'SelectorSet' ] [ 'Selector' ] [ 'Value' ] = certInstanceId ;
dev . amtstack . Put ( 'AMT_TLSCredentialContext' , newTLSCredentialContext , amtSwitchToTls , 0 , 1 ) ;
} else {
// Add a new security context
dev . amtstack . Create ( 'AMT_TLSCredentialContext' , {
'ElementInContext' : '<a:Address>/wsman</a:Address><a:ReferenceParameters><w:ResourceURI>' + dev . amtstack . CompleteName ( 'AMT_PublicKeyCertificate' ) + '</w:ResourceURI><w:SelectorSet><w:Selector Name="InstanceID">' + certInstanceId + '</w:Selector></w:SelectorSet></a:ReferenceParameters>' ,
'ElementProvidingContext' : '<a:Address>/wsman</a:Address><a:ReferenceParameters><w:ResourceURI>' + dev . amtstack . CompleteName ( 'AMT_TLSProtocolEndpointCollection' ) + '</w:ResourceURI><w:SelectorSet><w:Selector Name="ElementName">TLSProtocolEndpointInstances Collection</w:Selector></w:SelectorSet></a:ReferenceParameters>'
} , amtSwitchToTls ) ;
}
// Figure out what index is local & remote
var localNdx = ( ( dev . policy . tlsSettings [ 0 ] [ 'InstanceID' ] == 'Intel(r) AMT LMS TLS Settings' ) ) ? 0 : 1 , remoteNdx = ( 1 - localNdx ) ;
// Remote TLS settings
var xxTlsSettings2 = Clone ( dev . policy . tlsSettings ) ;
xxTlsSettings2 [ remoteNdx ] [ 'Enabled' ] = true ;
xxTlsSettings2 [ remoteNdx ] [ 'MutualAuthentication' ] = false ;
xxTlsSettings2 [ remoteNdx ] [ 'AcceptNonSecureConnections' ] = true ;
delete xxTlsSettings2 [ remoteNdx ] [ 'TrustedCN' ] ;
// Local TLS settings
xxTlsSettings2 [ localNdx ] [ 'Enabled' ] = true ;
delete xxTlsSettings2 [ localNdx ] [ 'TrustedCN' ] ;
// Update TLS settings
dev . amtstack . Put ( 'AMT_TLSSettingData' , xxTlsSettings2 [ 0 ] , amtSwitchToTls , 0 , 1 , xxTlsSettings2 [ 0 ] ) ;
dev . amtstack . Put ( 'AMT_TLSSettingData' , xxTlsSettings2 [ 1 ] , amtSwitchToTls , 0 , 1 , xxTlsSettings2 [ 1 ] ) ;
} ) ;
} , responses . Body [ 'KeyPair' ] [ 'ReferenceParameters' ] [ 'SelectorSet' ] [ 'Selector' ] [ 'Value' ] ) ;
} ) ;
} else {
2020-10-22 09:54:56 +03:00
// Update device in the database
dev . intelamt . tls = dev . aquired . tls = 1 ;
UpdateDevice ( dev ) ;
2020-10-18 09:53:50 +03:00
// TLS is setup
devTaskCompleted ( dev ) ;
}
}
function amtSwitchToTls ( stack , name , responses , status ) {
const dev = stack . dev ;
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
2020-10-19 08:02:48 +03:00
if ( status != 200 ) { dev . consoleMsg ( "Failed setup TLS (" + status + ")." ) ; removeAmtDevice ( dev ) ; return ; }
2020-10-18 09:53:50 +03:00
// Check if all the calls are done & perform a commit
if ( ( -- dev . setTlsSecurityPendingCalls ) == 0 ) {
dev . amtstack . AMT _SetupAndConfigurationService _CommitChanges ( null , function ( stack , name , responses , status ) {
const dev = stack . dev ;
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
2020-10-19 08:02:48 +03:00
if ( status != 200 ) { dev . consoleMsg ( "Failed perform commit (" + status + ")." ) ; removeAmtDevice ( dev ) ; return ; }
2020-10-22 05:13:14 +03:00
dev . consoleMsg ( "Enabled TLS, holding 5 seconds..." ) ;
2020-10-21 01:15:56 +03:00
// Update device in the database
2020-10-22 09:54:56 +03:00
dev . intelamt . tls = dev . aquired . tls = 1 ;
dev . intelamt . hash = dev . aquired . hash = dev . aquired . xhash ;
2020-10-21 01:15:56 +03:00
delete dev . aquired . xhash ;
UpdateDevice ( dev ) ;
2020-10-21 20:43:55 +03:00
// Switch our communications to TLS (Restart our management of this node)
dev . switchToTls = 1 ;
delete dev . tlsfail ;
2020-10-22 05:13:14 +03:00
// Wait 5 seconds before attempting to manage this device some more
var f = function doManage ( ) { if ( isAmtDeviceValid ( dev ) ) { devTaskCompleted ( doManage . dev ) ; } }
f . dev = dev ;
setTimeout ( f , 5000 ) ;
2020-10-18 09:53:50 +03:00
} ) ;
}
}
2020-10-19 07:06:39 +03:00
2020-10-23 04:39:32 +03:00
//
// Intel AMT WIFI
//
// This method will sync the WIFI profiles from the device and the server, but does not care about profile priority.
// We may want to work on an alternate version that does do priority if requested.
function attemptWifiSync ( dev , func ) {
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
2020-10-26 21:51:19 +03:00
if ( dev . policy . amtPolicy == 0 ) { func ( dev ) ; return ; } // If there is no Intel AMT policy, skip this operation.
2020-10-23 04:39:32 +03:00
if ( dev . connType != 2 ) { func ( dev ) ; return ; } // Only configure wireless over a CIRA-LMS link
if ( parent . config . domains [ dev . domainid ] . amtmanager . wifiprofiles == null ) { func ( dev ) ; return ; } // No server WIFI profiles set, skip this.
2020-10-23 05:11:57 +03:00
if ( ( dev . mpsConnection . tag . meiState == null ) || ( dev . mpsConnection . tag . meiState . net1 == null ) ) { func ( dev ) ; return ; } // No WIFI on this device, skip this.
2020-10-23 04:39:32 +03:00
// Get the current list of WIFI profiles
dev . taskCount = 1 ;
dev . taskCompleted = func ;
2020-10-23 05:11:57 +03:00
dev . amtstack . BatchEnum ( null , [ 'CIM_WiFiEndpointSettings' , '*CIM_WiFiPort' ] , function ( stack , name , responses , status ) {
2020-10-23 04:39:32 +03:00
const dev = stack . dev ;
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
if ( status != 200 ) { devTaskCompleted ( dev ) ; return ; } // We can't get wireless settings, ignore and carry on.
// The server and device WIFI profiles, find profiles to add and remove
const sevProfiles = parent . config . domains [ dev . domainid ] . amtmanager . wifiprofiles ;
2020-10-23 05:11:57 +03:00
const devProfiles = responses [ 'CIM_WiFiEndpointSettings' ] . responses ;
var profilesToAdd = [ ] , profilesToRemove = [ ] ;
2020-10-23 04:39:32 +03:00
// Look at the WIFI profiles in the device
for ( var i in sevProfiles ) {
var sevProfile = sevProfiles [ i ] , match = false ;
for ( var j in devProfiles ) {
var devProfile = devProfiles [ j ] ;
if (
( devProfile . ElementName == sevProfile . name ) &&
( devProfile . SSID == sevProfile . ssid ) &&
( devProfile . AuthenticationMethod == sevProfile . authentication ) &&
( devProfile . EncryptionMethod == sevProfile . encryption ) &&
( devProfile . BSSType == sevProfile . type )
) { match = true ; devProfile . match = true ; }
}
if ( match == false ) { profilesToAdd . push ( sevProfile ) ; }
}
for ( var j in devProfiles ) {
var devProfile = devProfiles [ j ] ;
if ( devProfile . match !== true ) { profilesToRemove . push ( devProfile ) ; }
}
// Compute what priorities are allowed
var prioritiesInUse = [ ] ;
2020-10-23 05:11:57 +03:00
for ( var j in devProfiles ) { if ( devProfiles [ j ] . match == true ) { prioritiesInUse . push ( devProfiles [ j ] . Priority ) ; } }
2020-10-23 04:39:32 +03:00
// Notify of WIFI profile changes
2020-10-23 06:54:18 +03:00
if ( ( profilesToAdd . length > 0 ) || ( profilesToRemove . length > 0 ) ) { dev . consoleMsg ( "Changing WIFI profiles, adding " + profilesToAdd . length + ", removing " + profilesToRemove . length + "." ) ; }
2020-10-23 04:39:32 +03:00
// Remove any extra WIFI profiles
for ( var i in profilesToRemove ) {
2020-10-23 06:54:18 +03:00
dev . amtstack . Delete ( 'CIM_WiFiEndpointSettings' , { InstanceID : 'Intel(r) AMT:WiFi Endpoint Settings ' + profilesToRemove [ i ] . ElementName } , function ( stack , name , responses , status ) { } , 0 , 1 ) ;
2020-10-23 04:39:32 +03:00
}
// Add missing WIFI profiles
var nextPriority = 0 ;
for ( var i in profilesToAdd ) {
while ( prioritiesInUse . indexOf ( nextPriority ) >= 0 ) { nextPriority ++ ; } // Figure out the next available priority slot.
var profileToAdd = profilesToAdd [ i ] ;
const wifiep = {
_ _parameterType : 'reference' ,
_ _resourceUri : 'http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/CIM_WiFiEndpoint' ,
Name : 'WiFi Endpoint 0'
} ;
const wifiepsettinginput = {
_ _parameterType : 'instance' ,
_ _namespace : 'http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/CIM_WiFiEndpointSettings' ,
ElementName : profileToAdd . name ,
InstanceID : 'Intel(r) AMT:WiFi Endpoint Settings ' + profileToAdd . name ,
AuthenticationMethod : profileToAdd . authentication ,
EncryptionMethod : profileToAdd . encryption ,
SSID : profileToAdd . ssid ,
Priority : nextPriority ,
PSKPassPhrase : profileToAdd . password
}
prioritiesInUse . push ( nextPriority ) ; // Occupy the priority slot and add the WIFI profile.
2020-10-23 06:54:18 +03:00
dev . amtstack . AMT _WiFiPortConfigurationService _AddWiFiSettings ( wifiep , wifiepsettinginput , null , null , null , function ( stack , name , responses , status ) { } ) ;
2020-10-23 05:11:57 +03:00
}
// Compute how many WIFI profiles will be in the device and change the state if needed
// WifiState = { 3: "Disabled", 32768: "Enabled in S0", 32769: "Enabled in S0, Sx/AC" };
var resultingProfileCount = ( devProfiles . length + profilesToAdd . length - profilesToRemove . length ) ;
var wifiState = ( resultingProfileCount == 0 ) ? 3 : 32769 ;
if ( responses [ 'CIM_WiFiPort' ] . responses . Body . EnabledState != wifiState ) {
if ( wifiState == 3 ) {
dev . amtstack . CIM _WiFiPort _RequestStateChange ( wifiState , null , function ( stack , name , responses , status ) {
const dev = stack . dev ;
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
if ( status == 200 ) { dev . consoleMsg ( "Disabled WIFI." ) ; }
} ) ;
} else {
dev . amtstack . CIM _WiFiPort _RequestStateChange ( wifiState , null , function ( stack , name , responses , status ) {
const dev = stack . dev ;
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
if ( status == 200 ) { dev . consoleMsg ( "Enabled WIFI." ) ; }
} ) ;
}
2020-10-23 04:39:32 +03:00
}
// Done
devTaskCompleted ( dev ) ;
} ) ;
}
2020-10-19 07:06:39 +03:00
//
// Intel AMT Server Root Certificate
//
2020-10-18 09:53:50 +03:00
// Check if Intel AMT has the server root certificate
function attemptRootCertSync ( dev , func ) {
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
2020-10-26 21:51:19 +03:00
if ( dev . policy . amtPolicy == 0 ) { func ( dev ) ; return ; } // If there is no Intel AMT policy, skip this operation.
2020-10-23 23:28:31 +03:00
if ( ( dev . connType != 2 ) || ( dev . policy . ciraPolicy != 2 ) || ( parent . mpsserver . server == null ) ) { func ( dev ) ; return ; } // Server root certificate does not need to be present is CIRA is not needed
2020-10-18 09:53:50 +03:00
// Find the current TLS certificate & MeshCentral root certificate
var xxMeshCentralRoot = null ;
if ( dev . policy . tlsCredentialContext . length > 0 ) {
for ( var i in dev . policy . certificates ) { if ( dev . policy . certificates [ i ] [ 'X509Certificate' ] == obj . rootCertBase64 ) { xxMeshCentralRoot = i ; } }
}
// If the server root certificate is not present and we need to configure CIRA, add it
if ( xxMeshCentralRoot == null ) {
dev . taskCount = 1 ;
dev . taskCompleted = func ;
dev . amtstack . AMT _PublicKeyManagementService _AddTrustedRootCertificate ( obj . rootCertBase64 , function ( stack , name , responses , status ) {
const dev = stack . dev ;
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
2020-10-19 08:02:48 +03:00
if ( status != 200 ) { dev . consoleMsg ( "Failed to add server root certificate (" + status + ")." ) ; removeAmtDevice ( dev ) ; return ; }
2020-10-18 09:53:50 +03:00
dev . consoleMsg ( "Added server root certificate." ) ;
devTaskCompleted ( dev ) ;
} ) ;
2020-10-21 20:43:55 +03:00
} else { func ( dev ) ; }
2020-10-18 09:53:50 +03:00
}
2020-10-19 07:06:39 +03:00
//
// Intel AMT CIRA Setup
//
// Check if Intel AMT has the server root certificate
2020-10-26 21:51:19 +03:00
// If deactivation policy is in effect, remove CIRA configuration
2020-10-19 07:06:39 +03:00
function attemptCiraSync ( dev , func ) {
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
2020-10-21 20:43:55 +03:00
if ( ( dev . connType != 2 ) || ( ( dev . policy . ciraPolicy != 1 ) && ( dev . policy . ciraPolicy != 2 ) ) ) { func ( dev ) ; return ; } // Only setup CIRA when LMS connection is used and a CIRA policy is enabled.
2020-10-19 07:06:39 +03:00
// Get current CIRA settings
// TODO: We only deal with remote access starting with Intel AMT 6 and beyond
dev . taskCount = 1 ;
dev . taskCompleted = func ;
2020-10-26 21:51:19 +03:00
dev . tryCount = 0 ;
2020-10-19 07:06:39 +03:00
var requests = [ '*AMT_EnvironmentDetectionSettingData' , 'AMT_ManagementPresenceRemoteSAP' , 'AMT_RemoteAccessCredentialContext' , 'AMT_RemoteAccessPolicyAppliesToMPS' , 'AMT_RemoteAccessPolicyRule' , '*AMT_UserInitiatedConnectionService' , 'AMT_MPSUsernamePassword' ] ;
2020-10-23 19:45:57 +03:00
if ( ( dev . aquired . majorver != null ) && ( dev . aquired . majorver > 11 ) ) { requests . push ( '*IPS_HTTPProxyService' , 'IPS_HTTPProxyAccessPoint' ) ; }
2020-10-26 21:51:19 +03:00
dev . amtstack . BatchEnum ( null , requests , attemptCiraSyncResponse ) ;
}
2020-10-19 07:06:39 +03:00
2020-10-26 21:51:19 +03:00
function attemptCiraSyncResponse ( stack , name , responses , status ) {
const dev = stack . dev ;
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
2020-10-19 07:06:39 +03:00
2020-10-26 21:51:19 +03:00
if ( ( dev . aquired . majorver != null ) && ( dev . aquired . majorver > 11 ) && ( status == 400 ) ) {
// Check if only the HTTP proxy objects failed
status = 200 ;
if ( responses [ 'IPS_HTTPProxyAccessPoint' ] . status == 400 ) { delete responses [ 'IPS_HTTPProxyAccessPoint' ] ; }
if ( responses [ 'IPS_HTTPProxyService' ] . status == 400 ) { delete responses [ 'IPS_HTTPProxyService' ] ; }
for ( var i in responses ) { if ( responses [ i ] . status != 200 ) { status = responses [ i ] . status ; } }
}
2020-10-19 07:06:39 +03:00
2020-10-26 21:51:19 +03:00
// If batch enumeration was not succesful, try again.
if ( status != 200 ) {
// If we failed to get the CIRA state, try again up to 5 times.
if ( dev . tryCount <= 5 ) {
dev . tryCount ++ ;
var requests = [ '*AMT_EnvironmentDetectionSettingData' , 'AMT_ManagementPresenceRemoteSAP' , 'AMT_RemoteAccessCredentialContext' , 'AMT_RemoteAccessPolicyAppliesToMPS' , 'AMT_RemoteAccessPolicyRule' , '*AMT_UserInitiatedConnectionService' , 'AMT_MPSUsernamePassword' ] ;
if ( ( dev . aquired . majorver != null ) && ( dev . aquired . majorver > 11 ) ) { requests . push ( '*IPS_HTTPProxyService' , 'IPS_HTTPProxyAccessPoint' ) ; }
dev . amtstack . BatchEnum ( null , requests , attemptCiraSyncResponse ) ;
return ;
2020-10-19 07:06:39 +03:00
}
2020-10-26 21:51:19 +03:00
// We tried 5 times, give up.
dev . consoleMsg ( "Failed to get CIRA state (" + status + ")." ) ;
removeAmtDevice ( dev ) ;
return ;
}
if ( ( responses [ 'AMT_UserInitiatedConnectionService' ] == null ) || ( responses [ 'AMT_UserInitiatedConnectionService' ] . response == null ) ) { dev . consoleMsg ( "Invalid CIRA state." ) ; removeAmtDevice ( dev ) ; return ; }
2020-10-19 07:06:39 +03:00
2020-10-26 21:51:19 +03:00
dev . cira = { } ;
dev . cira . xxRemoteAccess = responses ;
dev . cira . xxEnvironementDetection = responses [ 'AMT_EnvironmentDetectionSettingData' ] . response ;
dev . cira . xxEnvironementDetection [ 'DetectionStrings' ] = MakeToArray ( dev . cira . xxEnvironementDetection [ 'DetectionStrings' ] ) ;
dev . cira . xxCiraServers = responses [ 'AMT_ManagementPresenceRemoteSAP' ] . responses ;
dev . cira . xxUserInitiatedCira = responses [ 'AMT_UserInitiatedConnectionService' ] . response ;
dev . cira . xxRemoteAccessCredentiaLinks = responses [ 'AMT_RemoteAccessCredentialContext' ] . responses ;
dev . cira . xxMPSUserPass = responses [ 'AMT_MPSUsernamePassword' ] . responses ;
// Set CIRA initiation to BIOS & OS enabled
if ( dev . cira . xxUserInitiatedCira [ 'EnabledState' ] != 32771 ) { // 32768: "Disabled", 32769: "BIOS enabled", 32770: "OS enable", 32771: "BIOS & OS enabled"
dev . amtstack . AMT _UserInitiatedConnectionService _RequestStateChange ( 32771 , null , function ( stack , name , responses , status ) { } ) ; // This is not a critical call.
}
// Figure out policies attached to servers. Create a policy type to server table.
dev . cira . xxPolicies = { 'User' : [ ] , 'Alert' : [ ] , 'Periodic' : [ ] } ;
for ( var i in responses [ 'AMT_RemoteAccessPolicyAppliesToMPS' ] . responses ) {
var policy = responses [ 'AMT_RemoteAccessPolicyAppliesToMPS' ] . responses [ i ] ;
var server = Clone ( getItem ( dev . cira . xxCiraServers , 'Name' , getItem ( policy [ 'ManagedElement' ] [ 'ReferenceParameters' ] [ 'SelectorSet' ] [ 'Selector' ] , '@Name' , 'Name' ) [ 'Value' ] ) ) ;
server . MpsType = policy [ 'MpsType' ] ; // MpsType was added in Intel AMT 11.6
var ptype = ( getItem ( policy [ 'PolicySet' ] [ 'ReferenceParameters' ] [ 'SelectorSet' ] [ 'Selector' ] , '@Name' , 'PolicyRuleName' ) [ 'Value' ] ) . split ( ' ' ) [ 0 ] ;
dev . cira . xxPolicies [ ptype ] . push ( server ) ;
}
// Fetch the server's CIRA settings
dev . cira . mpsPresent = null ;
dev . cira . mpsPolicy = false ;
if ( ( dev . policy . ciraPolicy == 2 ) && ( parent . mpsserver . server != null ) ) { // parent.mpsserver.server is not null if the MPS server is listening for TCP/TLS connections
dev . cira . meshidx = dev . meshid . split ( '/' ) [ 2 ] . replace ( /\@/g , 'X' ) . replace ( /\$/g , 'X' ) . substring ( 0 , 16 ) ;
dev . cira . mpsName = parent . webserver . certificates . AmtMpsName ;
var serverNameSplit = dev . cira . mpsName . split ( '.' ) ;
dev . cira . mpsPort = ( ( parent . args . mpsaliasport != null ) ? parent . args . mpsaliasport : parent . args . mpsport ) ;
dev . cira . mpsAddressFormat = 201 ; // 201 = FQDN, 3 = IPv4
dev . cira . mpsPass = getRandomAmtPassword ( ) ;
if ( ( serverNameSplit . length == 4 ) && ( parseInt ( serverNameSplit [ 0 ] ) == serverNameSplit [ 0 ] ) && ( parseInt ( serverNameSplit [ 1 ] ) == serverNameSplit [ 1 ] ) && ( parseInt ( serverNameSplit [ 2 ] ) == serverNameSplit [ 2 ] ) && ( parseInt ( serverNameSplit [ 3 ] ) == serverNameSplit [ 3 ] ) ) { dev . cira . mpsAddressFormat = 3 ; }
// Check if our server is already present
2020-12-10 04:13:02 +03:00
if ( ( dev . cira . xxCiraServers != null ) && ( dev . cira . xxCiraServers . length > 0 ) ) {
2020-10-19 07:06:39 +03:00
for ( var i = 0 ; i < dev . cira . xxCiraServers . length ; i ++ ) {
var mpsServer = dev . cira . xxCiraServers [ i ] ;
2020-10-26 21:51:19 +03:00
if ( ( mpsServer . AccessInfo == dev . cira . mpsName ) && ( mpsServer . Port == dev . cira . mpsPort ) && ( mpsServer . InfoFormat == dev . cira . mpsAddressFormat ) ) { dev . cira . mpsPresent = mpsServer [ 'Name' ] ; }
2020-10-19 07:06:39 +03:00
}
}
2020-10-26 21:51:19 +03:00
// Check if our server is already present
2020-12-10 04:13:02 +03:00
if ( ( dev . cira . xxPolicies != null ) && ( dev . cira . xxPolicies [ 'Periodic' ] . length > 0 ) ) {
2020-10-26 21:51:19 +03:00
var mpsServer = dev . cira . xxPolicies [ 'Periodic' ] [ 0 ] ;
if ( ( mpsServer . AccessInfo == dev . cira . mpsName ) && ( mpsServer . Port == dev . cira . mpsPort ) && ( mpsServer . InfoFormat == dev . cira . mpsAddressFormat ) ) { dev . cira . mpsPolicy = true ; }
}
}
// Remove all MPS policies that are not ours
2020-12-10 04:13:02 +03:00
if ( dev . cira . xxPolicies != null ) {
if ( ( dev . cira . xxPolicies [ 'User' ] != null ) && ( dev . cira . xxPolicies [ 'User' ] . length > 0 ) ) { dev . consoleMsg ( "Removing CIRA user trigger." ) ; dev . amtstack . Delete ( 'AMT_RemoteAccessPolicyRule' , { 'PolicyRuleName' : 'User Initiated' } , function ( stack , name , responses , status ) { } ) ; }
if ( ( dev . cira . xxPolicies [ 'Alert' ] != null ) && ( dev . cira . xxPolicies [ 'Alert' ] . length > 0 ) ) { dev . consoleMsg ( "Removing CIRA alert trigger." ) ; dev . amtstack . Delete ( 'AMT_RemoteAccessPolicyRule' , { 'PolicyRuleName' : 'Alert' } , function ( stack , name , responses , status ) { } ) ; }
if ( ( dev . cira . xxPolicies [ 'Periodic' ] != null ) && ( dev . cira . xxPolicies [ 'Periodic' ] . length > 0 ) && ( dev . cira . mpsPolicy == false ) ) { dev . consoleMsg ( "Removing CIRA periodic trigger." ) ; dev . amtstack . Delete ( 'AMT_RemoteAccessPolicyRule' , { 'PolicyRuleName' : 'Periodic' } , function ( stack , name , responses , status ) { } ) ; }
}
2020-10-26 21:51:19 +03:00
// Remove all MPS servers that are not ours
2020-12-10 04:13:02 +03:00
if ( ( dev . cira . xxCiraServers != null ) && ( dev . cira . xxCiraServers . length > 0 ) ) {
2020-10-26 21:51:19 +03:00
for ( var i = 0 ; i < dev . cira . xxCiraServers . length ; i ++ ) {
var mpsServer = dev . cira . xxCiraServers [ i ] ;
if ( ( mpsServer . AccessInfo != dev . cira . mpsName ) || ( mpsServer . Port != dev . cira . mpsPort ) || ( mpsServer . InfoFormat != dev . cira . mpsAddressFormat ) ) {
dev . consoleMsg ( "Removing MPS server." ) ;
dev . amtstack . Delete ( 'AMT_ManagementPresenceRemoteSAP' , { 'Name' : mpsServer [ 'Name' ] } , function ( stack , name , responses , status ) { } ) ;
}
}
}
// If we need to setup CIRA, start by checking the MPS server
// parent.mpsserver.server is not null if the MPS server is listening for TCP/TLS connections
if ( ( dev . policy . ciraPolicy == 2 ) && ( parent . mpsserver . server != null ) ) { addMpsServer ( dev ) ; } else { checkEnvironmentDetection ( dev ) ; }
2020-10-19 07:06:39 +03:00
}
function addMpsServer ( dev ) {
// Add the MPS server if not present
if ( dev . cira . mpsPresent == null ) {
2020-10-25 09:34:00 +03:00
dev . amtstack . AMT _RemoteAccessService _AddMpServer ( dev . cira . mpsName , dev . cira . mpsAddressFormat , dev . cira . mpsPort , 2 , null , dev . cira . meshidx , dev . cira . mpsPass , dev . cira . mpsName , function ( stack , name , response , status ) {
2020-10-19 07:06:39 +03:00
const dev = stack . dev ;
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
2020-10-19 08:02:48 +03:00
if ( status != 200 ) { dev . consoleMsg ( "Failed to create new MPS server (" + status + ")." ) ; removeAmtDevice ( dev ) ; return ; }
2020-10-24 00:56:20 +03:00
if ( ( response . Body . MpServer == null ) || ( response . Body . MpServer . ReferenceParameters == null ) || ( response . Body . MpServer . ReferenceParameters . SelectorSet == null ) || ( response . Body . MpServer . ReferenceParameters . SelectorSet . Selector == null ) ) { dev . consoleMsg ( "Create new MPS server invalid response." ) ; removeAmtDevice ( dev ) ; return ; }
2020-10-19 07:06:39 +03:00
dev . cira . mpsPresent = getItem ( response . Body . MpServer . ReferenceParameters . SelectorSet . Selector , '@Name' , 'Name' ) . Value ;
dev . consoleMsg ( "Created new MPS server." ) ;
addMpsPolicy ( dev ) ;
2020-10-25 09:34:00 +03:00
// Update the device with the MPS password
dev . aquired . mpspass = dev . cira . mpsPass ;
UpdateDevice ( dev ) ;
2020-10-19 07:06:39 +03:00
} ) ;
} else {
// MPS server is present, check MPS trigger policy
addMpsPolicy ( dev ) ;
}
}
function addMpsPolicy ( dev ) {
if ( dev . cira . mpsPolicy == false ) {
2020-10-23 19:45:57 +03:00
var cilaSupport = ( ( dev . aquired . majorver != null ) && ( dev . aquired . minorver != null ) ) && ( ( dev . aquired . majorver > 11 ) || ( ( dev . aquired . majorver == 11 ) && ( dev . aquired . minorver >= 6 ) ) ) ;
2020-10-19 07:06:39 +03:00
var trigger = 2 ; // 1 = Alert, 2 = Periodic
// Setup extended data
var extendedData = null ;
if ( trigger == 2 ) {
var timertype = 0 ; // 0 = Periodic, 1 = Time of day
var exdata = IntToStr ( 10 ) ; // Interval trigger, 10 seconds
extendedData = Buffer . from ( IntToStr ( timertype ) + exdata , 'binary' ) . toString ( 'base64' ) ;
}
// Create the MPS server references
var server1 = '<Address xmlns="http://schemas.xmlsoap.org/ws/2004/08/addressing">http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous</Address><ReferenceParameters xmlns="http://schemas.xmlsoap.org/ws/2004/08/addressing"><ResourceURI xmlns="http://schemas.dmtf.org/wbem/wsman/1/wsman.xsd">http://intel.com/wbem/wscim/1/amt-schema/1/AMT_ManagementPresenceRemoteSAP</ResourceURI><SelectorSet xmlns="http://schemas.dmtf.org/wbem/wsman/1/wsman.xsd"><Selector Name="Name">' + dev . cira . mpsPresent + '</Selector></SelectorSet></ReferenceParameters>' ;
var server2 = null ;
// Put the CIRA/CILA servers in the right bins.
var ciraServers = [ ] , cilaServers = [ ] ;
if ( server1 ) { ciraServers . push ( server1 ) ; if ( server2 ) { ciraServers . push ( server2 ) ; } }
// Go ahead and create the new CIRA/CILA policy.
dev . amtstack . AMT _RemoteAccessService _AddRemoteAccessPolicyRule ( trigger , 0 , extendedData , ciraServers , cilaServers , function ( stack , name , responses , status ) {
const dev = stack . dev ;
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
2020-10-19 08:02:48 +03:00
if ( status != 200 ) { dev . consoleMsg ( "Failed to create new MPS policy (" + status + ")." ) ; removeAmtDevice ( dev ) ; return ; }
2020-10-19 07:06:39 +03:00
dev . consoleMsg ( "Created new MPS policy." ) ;
checkEnvironmentDetection ( dev ) ;
} ) ;
} else {
checkEnvironmentDetection ( dev ) ;
}
}
function checkEnvironmentDetection ( dev ) {
var changes = false ;
var editEnvironmentDetectionTmp = [ ] ;
2020-10-22 23:40:49 +03:00
var currentEnvDetect = dev . cira . xxEnvironementDetection [ 'DetectionStrings' ] ;
if ( currentEnvDetect == null ) { currentEnvDetect = [ ] ; }
2020-10-23 23:28:31 +03:00
if ( ( dev . policy . ciraPolicy == 2 ) && ( parent . mpsserver . server != null ) ) { // ciraPolicy: 0 = Do Nothing, 1 = Clear, 2 = Set
2020-10-22 23:40:49 +03:00
const newEnvDetect = parent . config . domains [ dev . domainid ] . amtmanager . environmentdetection ;
if ( newEnvDetect == null ) {
// If no environment detection is specified in the config.json, check that we have a random environment detection
if ( currentEnvDetect . length == 0 ) { editEnvironmentDetectionTmp = [ Buffer . from ( parent . crypto . randomBytes ( 6 ) , 'binary' ) . toString ( 'hex' ) ] ; changes = true ; }
} else {
// Check that we have exactly the correct environement detection suffixes
var mismatch = false ;
if ( currentEnvDetect . length != newEnvDetect . length ) {
mismatch = true ;
} else {
// Check if everything matches
for ( var i in currentEnvDetect ) { if ( newEnvDetect . indexOf ( currentEnvDetect [ i ] ) == - 1 ) { mismatch = true ; } }
for ( var i in newEnvDetect ) { if ( currentEnvDetect . indexOf ( newEnvDetect [ i ] ) == - 1 ) { mismatch = true ; } }
}
// If not, we need to set the new ones
if ( mismatch == true ) { editEnvironmentDetectionTmp = newEnvDetect ; changes = true ; }
}
2020-10-23 23:28:31 +03:00
} else if ( ( dev . policy . ciraPolicy == 1 ) || ( parent . mpsserver . server == null ) ) {
2020-10-19 07:06:39 +03:00
// Check environment detection is clear
2020-10-22 23:40:49 +03:00
if ( currentEnvDetect . length != 0 ) { editEnvironmentDetectionTmp = [ ] ; changes = true ; }
2020-10-19 07:06:39 +03:00
}
2020-10-22 23:40:49 +03:00
// If we need to change the environment detection on the remote device, do it now.
2020-10-19 07:06:39 +03:00
if ( changes == true ) {
2020-10-19 08:02:48 +03:00
var t = Clone ( dev . cira . xxEnvironementDetection ) ;
2020-10-19 07:06:39 +03:00
t [ 'DetectionStrings' ] = editEnvironmentDetectionTmp ;
2020-10-19 08:47:34 +03:00
dev . cira . envclear = ( editEnvironmentDetectionTmp . length == 0 ) ;
2020-10-19 08:02:48 +03:00
dev . amtstack . Put ( 'AMT_EnvironmentDetectionSettingData' , t , function ( stack , name , responses , status ) {
2020-10-19 07:06:39 +03:00
const dev = stack . dev ;
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
2020-10-19 08:02:48 +03:00
if ( status != 200 ) { dev . consoleMsg ( "Failed to set environement detection (" + status + ")." ) ; removeAmtDevice ( dev ) ; return ; }
2020-10-19 08:47:34 +03:00
if ( dev . cira . envclear ) { dev . consoleMsg ( "Environment detection cleared." ) ; } else { dev . consoleMsg ( "Environment detection set." ) ; }
2020-10-19 07:06:39 +03:00
devTaskCompleted ( dev ) ;
} , 0 , 1 ) ;
} else {
devTaskCompleted ( dev ) ;
}
}
2020-10-21 20:28:59 +03:00
//
// Intel AMT Settings
//
function attemptSettingsSync ( dev , func ) {
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
2020-10-26 21:51:19 +03:00
if ( dev . policy . amtPolicy == 0 ) { func ( dev ) ; return ; } // If there is no Intel AMT policy, skip this operation.
2020-10-21 20:28:59 +03:00
dev . taskCount = 1 ;
dev . taskCompleted = func ;
// Query the things we are going to be checking
var query = [ '*AMT_GeneralSettings' , '*AMT_RedirectionService' ] ;
2020-10-23 19:45:57 +03:00
if ( ( dev . aquired . majorver != null ) && ( dev . aquired . majorver > 5 ) ) { query . push ( '*CIM_KVMRedirectionSAP' , '*IPS_OptInService' ) ; }
2020-10-21 20:28:59 +03:00
dev . amtstack . BatchEnum ( '' , query , attemptSettingsSyncResponse ) ;
}
function attemptSettingsSyncResponse ( stack , name , responses , status ) {
const dev = stack . dev ;
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
if ( status != 200 ) { devTaskCompleted ( dev ) ; return ; }
// If this device does not have KVM, ignore the response. This can happen for Intel Standard Manageability (Intel(R) SM).
if ( ( responses [ 'CIM_KVMRedirectionSAP' ] == null ) || ( responses [ 'CIM_KVMRedirectionSAP' ] . status == 400 ) ) { responses [ 'CIM_KVMRedirectionSAP' ] = null ; }
2020-10-22 07:34:55 +03:00
// Clear user consent requirements
if ( ( responses [ 'IPS_OptInService' ] != null ) && ( responses [ 'IPS_OptInService' ] . response [ 'OptInRequired' ] != 0 ) ) {
responses [ 'IPS_OptInService' ] . response [ 'OptInRequired' ] = 0 ; // 0 = Not Required, 1 = Required for KVM only, 0xFFFFFFFF = Always Required
dev . amtstack . Put ( 'IPS_OptInService' , responses [ 'IPS_OptInService' ] . response , function ( stack , name , responses , status ) {
const dev = stack . dev ;
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
if ( status == 200 ) { dev . consoleMsg ( "Cleared user consent requirements." ) ; }
} , 0 , 1 ) ;
}
2020-10-21 20:28:59 +03:00
// Enable SOL & IDER
2020-10-22 01:36:07 +03:00
if ( ( responses [ 'AMT_RedirectionService' ] . response [ 'EnabledState' ] != 32771 ) || ( responses [ 'AMT_RedirectionService' ] . response [ 'ListenerEnabled' ] == false ) ) {
2020-10-21 20:28:59 +03:00
dev . redirObj = responses [ 'AMT_RedirectionService' ] . response ;
dev . redirObj [ 'ListenerEnabled' ] = true ;
dev . redirObj [ 'EnabledState' ] = 32771 ;
dev . taskCount ++ ;
dev . amtstack . AMT _RedirectionService _RequestStateChange ( 32771 ,
function ( stack , name , response , status ) {
const dev = stack . dev ;
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
dev . amtstack . Put ( 'AMT_RedirectionService' , dev . redirObj , function ( stack , name , response , status ) {
const dev = stack . dev ;
delete dev . redirObj ;
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
if ( status == 200 ) { dev . consoleMsg ( "Enabled redirection features." ) ; }
devTaskCompleted ( dev ) ;
} , 0 , 1 ) ;
}
) ;
}
// Check KVM state
2020-10-23 19:45:57 +03:00
if ( ( dev . aquired . majorver != null ) && ( dev . aquired . majorver > 5 ) && ( responses [ 'CIM_KVMRedirectionSAP' ] != null ) ) {
2020-10-21 20:28:59 +03:00
var kvm = ( ( ( responses [ 'CIM_KVMRedirectionSAP' ] . response [ 'EnabledState' ] == 6 ) && ( responses [ 'CIM_KVMRedirectionSAP' ] . response [ 'RequestedState' ] == 2 ) ) || ( responses [ 'CIM_KVMRedirectionSAP' ] . response [ 'EnabledState' ] == 2 ) || ( responses [ 'CIM_KVMRedirectionSAP' ] . response [ 'EnabledState' ] == 6 ) ) ;
if ( kvm == false ) {
// Enable KVM
dev . taskCount ++ ;
dev . amtstack . CIM _KVMRedirectionSAP _RequestStateChange ( 2 , 0 ,
function ( stack , name , response , status ) {
const dev = stack . dev ;
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
2020-10-21 22:19:00 +03:00
if ( status == 200 ) { dev . consoleMsg ( "Enabled KVM." ) ; }
2020-10-21 20:28:59 +03:00
devTaskCompleted ( dev ) ;
}
) ;
}
}
// Check device name and domain name
if ( ( dev . connType == 2 ) && ( dev . mpsConnection != null ) && ( dev . mpsConnection . tag != null ) && ( dev . mpsConnection . tag . meiState != null ) && ( typeof dev . mpsConnection . tag . meiState . OsHostname == 'string' ) && ( typeof dev . mpsConnection . tag . meiState . OsDnsSuffix == 'string' ) ) {
const generalSettings = responses [ 'AMT_GeneralSettings' ] . response ;
if ( ( generalSettings [ 'HostName' ] != dev . mpsConnection . tag . meiState . OsHostname ) || ( generalSettings [ 'DomainName' ] != dev . mpsConnection . tag . meiState . OsDnsSuffix ) ) {
// Change the computer and domain name
generalSettings [ 'HostName' ] = dev . mpsConnection . tag . meiState . OsHostname ;
generalSettings [ 'DomainName' ] = dev . mpsConnection . tag . meiState . OsDnsSuffix ;
dev . taskCount ++ ;
dev . xname = dev . mpsConnection . tag . meiState . OsHostname + '.' + dev . mpsConnection . tag . meiState . OsDnsSuffix ;
dev . amtstack . Put ( 'AMT_GeneralSettings' , generalSettings , function ( ) {
const dev = stack . dev ;
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
if ( status == 200 ) { dev . consoleMsg ( "Changed device name: " + dev . xname ) ; }
delete dev . xname ;
devTaskCompleted ( dev ) ;
} , 0 , 1 ) ;
}
}
// Done
devTaskCompleted ( dev ) ;
}
2020-10-19 07:06:39 +03:00
//
// Intel AMT Hardware Inventory and Networking
//
2020-10-18 05:23:24 +03:00
function attemptFetchHardwareInventory ( dev , func ) {
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
2020-10-07 05:47:28 +03:00
const mesh = parent . webserver . meshes [ dev . meshid ] ;
2020-10-18 09:53:50 +03:00
if ( mesh == null ) { removeAmtDevice ( dev ) ; return ; }
2020-10-07 22:03:19 +03:00
if ( mesh . mtype == 1 ) { // If this is a Intel AMT only device group, pull the hardware inventory and network information for this device
2020-10-18 05:23:24 +03:00
dev . consoleMsg ( "Fetching hardware inventory." ) ;
dev . taskCount = 2 ;
dev . taskCompleted = func ;
2020-10-07 05:47:28 +03:00
dev . amtstack . BatchEnum ( '' , [ '*CIM_ComputerSystemPackage' , 'CIM_SystemPackaging' , '*CIM_Chassis' , 'CIM_Chip' , '*CIM_Card' , '*CIM_BIOSElement' , 'CIM_Processor' , 'CIM_PhysicalMemory' , 'CIM_MediaAccessDevice' , 'CIM_PhysicalPackage' ] , attemptFetchHardwareInventoryResponse ) ;
2020-10-07 22:03:19 +03:00
dev . amtstack . BatchEnum ( '' , [ 'AMT_EthernetPortSettings' ] , attemptFetchNetworkResponse ) ;
2020-10-18 05:23:24 +03:00
} else {
2020-10-21 20:43:55 +03:00
if ( func ) { func ( dev ) ; }
2020-10-07 05:47:28 +03:00
}
2020-10-18 05:23:24 +03:00
}
2020-10-07 22:03:19 +03:00
function attemptFetchNetworkResponse ( stack , name , responses , status ) {
const dev = stack . dev ;
2020-10-16 02:08:36 +03:00
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
2020-10-18 05:23:24 +03:00
if ( status != 200 ) { devTaskCompleted ( dev ) ; return ; }
2020-10-07 22:03:19 +03:00
//console.log(JSON.stringify(responses, null, 2));
2020-10-18 05:23:24 +03:00
if ( ( responses [ 'AMT_EthernetPortSettings' ] == null ) || ( responses [ 'AMT_EthernetPortSettings' ] . responses == null ) ) { devTaskCompleted ( dev ) ; return ; }
2020-10-07 22:03:19 +03:00
// Find the wired and wireless interfaces
var wired = null , wireless = null ;
for ( var i in responses [ 'AMT_EthernetPortSettings' ] . responses ) {
var netif = responses [ 'AMT_EthernetPortSettings' ] . responses [ i ] ;
2020-10-08 02:59:44 +03:00
if ( ( netif . MACAddress != null ) && ( netif . MACAddress != '00-00-00-00-00-00' ) ) {
2020-10-07 22:03:19 +03:00
if ( netif . WLANLinkProtectionLevel != null ) { wireless = netif ; } else { wired = netif ; }
}
}
2020-10-18 05:23:24 +03:00
if ( ( wired == null ) && ( wireless == null ) ) { devTaskCompleted ( dev ) ; return ; }
2020-10-07 22:03:19 +03:00
// Sent by the agent to update agent network interface information
var net = { netif2 : { } } ;
if ( wired != null ) {
var x = { } ;
x . family = 'IPv4' ;
2020-10-08 02:59:44 +03:00
x . type = 'ethernet' ;
2020-10-07 22:03:19 +03:00
x . address = wired . IPAddress ;
x . netmask = wired . SubnetMask ;
x . mac = wired . MACAddress . split ( '-' ) . join ( ':' ) . toUpperCase ( ) ;
x . gateway = wired . DefaultGateway ;
2020-10-22 05:13:14 +03:00
net . netif2 [ 'Ethernet' ] = [ x ] ;
2020-10-07 22:03:19 +03:00
}
if ( wireless != null ) {
var x = { } ;
x . family = 'IPv4' ;
2020-10-08 02:59:44 +03:00
x . type = 'wireless' ;
2020-10-07 22:03:19 +03:00
x . address = wireless . IPAddress ;
x . netmask = wireless . SubnetMask ;
x . mac = wireless . MACAddress . split ( '-' ) . join ( ':' ) . toUpperCase ( ) ;
x . gateway = wireless . DefaultGateway ;
2020-10-22 05:13:14 +03:00
net . netif2 [ 'Wireless' ] = [ x ] ;
2020-10-07 22:03:19 +03:00
}
net . updateTime = Date . now ( ) ;
net . _id = 'if' + dev . nodeid ;
net . type = 'ifinfo' ;
parent . db . Set ( net ) ;
// Event the node interface information change
parent . DispatchEvent ( parent . webserver . CreateMeshDispatchTargets ( dev . meshid , [ dev . nodeid ] ) , obj , { action : 'ifchange' , nodeid : dev . nodeid , domain : dev . nodeid . split ( '/' ) [ 1 ] , nolog : 1 } ) ;
2020-10-18 05:23:24 +03:00
devTaskCompleted ( dev ) ;
2020-10-07 22:03:19 +03:00
}
/ *
2020-10-07 05:47:28 +03:00
// http://www.dmtf.org/sites/default/files/standards/documents/DSP0134_2.7.1.pdf
const DMTFCPUStatus = [ "Unknown" , "Enabled" , "Disabled by User" , "Disabled By BIOS (POST Error)" , "Idle" , "Other" ] ;
const DMTFMemType = [ "Unknown" , "Other" , "DRAM" , "Synchronous DRAM" , "Cache DRAM" , "EDO" , "EDRAM" , "VRAM" , "SRAM" , "RAM" , "ROM" , "Flash" , "EEPROM" , "FEPROM" , "EPROM" , "CDRAM" , "3DRAM" , "SDRAM" , "SGRAM" , "RDRAM" , "DDR" , "DDR-2" , "BRAM" , "FB-DIMM" , "DDR3" , "FBD2" , "DDR4" , "LPDDR" , "LPDDR2" , "LPDDR3" , "LPDDR4" ] ;
const DMTFMemFormFactor = [ '' , "Other" , "Unknown" , "SIMM" , "SIP" , "Chip" , "DIP" , "ZIP" , "Proprietary Card" , "DIMM" , "TSOP" , "Row of chips" , "RIMM" , "SODIMM" , "SRIMM" , "FB-DIM" ] ;
const DMTFProcFamilly = { // Page 46 of DMTF document
191 : "Intel® Core™ 2 Duo Processor" ,
192 : "Intel® Core™ 2 Solo processor" ,
193 : "Intel® Core™ 2 Extreme processor" ,
194 : "Intel® Core™ 2 Quad processor" ,
195 : "Intel® Core™ 2 Extreme mobile processor" ,
196 : "Intel® Core™ 2 Duo mobile processor" ,
197 : "Intel® Core™ 2 Solo mobile processor" ,
198 : "Intel® Core™ i7 processor" ,
199 : "Dual-Core Intel® Celeron® processor"
} ;
2020-10-07 22:03:19 +03:00
* /
2020-10-07 05:47:28 +03:00
function attemptFetchHardwareInventoryResponse ( stack , name , responses , status ) {
const dev = stack . dev ;
2020-10-16 02:08:36 +03:00
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
2020-10-18 05:23:24 +03:00
if ( status != 200 ) { devTaskCompleted ( dev ) ; return ; }
2020-10-07 05:47:28 +03:00
2020-10-07 22:03:19 +03:00
// Extract basic data
2020-10-07 05:47:28 +03:00
var hw = { }
hw . PlatformGUID = responses [ 'CIM_ComputerSystemPackage' ] . response . PlatformGUID ;
hw . Chassis = responses [ 'CIM_Chassis' ] . response ;
hw . Chips = responses [ 'CIM_Chip' ] . responses ;
hw . Card = responses [ 'CIM_Card' ] . response ;
hw . Bios = responses [ 'CIM_BIOSElement' ] . response ;
hw . Processors = responses [ 'CIM_Processor' ] . responses ;
hw . PhysicalMemory = responses [ 'CIM_PhysicalMemory' ] . responses ;
hw . MediaAccessDevice = responses [ 'CIM_MediaAccessDevice' ] . responses ;
hw . PhysicalPackage = responses [ 'CIM_PhysicalPackage' ] . responses ;
2020-10-07 22:03:19 +03:00
// Convert the hardware data into the same structure as we get from Windows
var hw2 = { hardware : { windows : { } , identifiers : { } } } ;
hw2 . hardware . identifiers . product _uuid = guidToStr ( hw . PlatformGUID ) ;
if ( ( hw . PhysicalMemory != null ) && ( hw . PhysicalMemory . length > 0 ) ) {
var memory = [ ] ;
for ( var i in hw . PhysicalMemory ) {
var m2 = { } , m = hw . PhysicalMemory [ i ] ;
m2 . BankLabel = m . BankLabel ;
m2 . Capacity = m . Capacity ;
2020-10-23 19:45:57 +03:00
if ( typeof m . PartNumber == 'string' ) { m2 . PartNumber = m . PartNumber . trim ( ) ; }
if ( typeof m . PartNumber == 'number' ) { m2 . PartNumber = m . PartNumber ; }
2020-10-18 05:23:24 +03:00
if ( typeof m . SerialNumber == 'string' ) { m2 . SerialNumber = m . SerialNumber . trim ( ) ; }
if ( typeof m . SerialNumber == 'number' ) { m2 . SerialNumber = m . SerialNumber ; }
2020-10-18 09:53:50 +03:00
if ( typeof m . Manufacturer == 'string' ) { m2 . Manufacturer = m . Manufacturer . trim ( ) ; }
2020-10-18 05:23:24 +03:00
if ( typeof m . Manufacturer == 'number' ) { m2 . Manufacturer = m . Manufacturer ; }
2020-10-07 22:03:19 +03:00
memory . push ( m2 ) ;
}
hw2 . hardware . windows . memory = memory ;
}
if ( ( hw . MediaAccessDevice != null ) && ( hw . MediaAccessDevice . length > 0 ) ) {
var drives = [ ] ;
for ( var i in hw . MediaAccessDevice ) {
var m2 = { } , m = hw . MediaAccessDevice [ i ] ;
m2 . Caption = m . DeviceID ;
2020-10-18 05:23:24 +03:00
if ( m . MaxMediaSize ) { m2 . Size = ( m . MaxMediaSize * 1000 ) ; }
2020-10-07 22:03:19 +03:00
drives . push ( m2 ) ;
}
hw2 . hardware . identifiers . storage _devices = drives ;
}
if ( hw . Bios != null ) {
2020-10-23 19:45:57 +03:00
if ( typeof hw . Bios . Manufacturer == 'string' ) { hw2 . hardware . identifiers . bios _vendor = hw . Bios . Manufacturer . trim ( ) ; }
if ( typeof hw . Bios . Manufacturer == 'number' ) { hw2 . hardware . identifiers . bios _vendor = hw . Bios . Manufacturer ; }
2020-10-07 22:03:19 +03:00
hw2 . hardware . identifiers . bios _version = hw . Bios . Version ;
if ( hw . Bios . ReleaseDate && hw . Bios . ReleaseDate . Datetime ) { hw2 . hardware . identifiers . bios _date = hw . Bios . ReleaseDate . Datetime ; }
}
if ( hw . PhysicalPackage != null ) {
2020-10-23 19:45:57 +03:00
if ( typeof hw . Card . Model == 'string' ) { hw2 . hardware . identifiers . board _name = hw . Card . Model . trim ( ) ; }
if ( typeof hw . Card . Model == 'number' ) { hw2 . hardware . identifiers . board _name = hw . Card . Model ; }
if ( typeof hw . Card . Manufacturer == 'string' ) { hw2 . hardware . identifiers . board _vendor = hw . Card . Manufacturer . trim ( ) ; }
if ( typeof hw . Card . Manufacturer == 'number' ) { hw2 . hardware . identifiers . board _vendor = hw . Card . Manufacturer ; }
if ( typeof hw . Card . Version == 'string' ) { hw2 . hardware . identifiers . board _version = hw . Card . Version . trim ( ) ; }
if ( typeof hw . Card . Version == 'number' ) { hw2 . hardware . identifiers . board _version = hw . Card . Version ; }
if ( typeof hw . Card . SerialNumber == 'string' ) { hw2 . hardware . identifiers . board _serial = hw . Card . SerialNumber . trim ( ) ; }
if ( typeof hw . Card . SerialNumber == 'number' ) { hw2 . hardware . identifiers . board _serial = hw . Card . SerialNumber ; }
2020-10-07 22:03:19 +03:00
}
if ( ( hw . Chips != null ) && ( hw . Chips . length > 0 ) ) {
for ( var i in hw . Chips ) {
if ( ( hw . Chips [ i ] . ElementName == 'Managed System Processor Chip' ) && ( hw . Chips [ i ] . Version ) ) {
hw2 . hardware . identifiers . cpu _name = hw . Chips [ i ] . Version ;
}
}
}
// Compute the hash of the document
hw2 . hash = parent . crypto . createHash ( 'sha384' ) . update ( JSON . stringify ( hw2 ) ) . digest ( ) . toString ( 'hex' ) ;
// Fetch system information
parent . db . GetHash ( 'si' + dev . nodeid , function ( err , results ) {
var sysinfohash = null ;
if ( ( results != null ) && ( results . length == 1 ) ) { sysinfohash = results [ 0 ] . hash ; }
if ( sysinfohash != hw2 . hash ) {
// Hardware information has changed, update the database
hw2 . _id = 'si' + dev . nodeid ;
hw2 . domain = dev . nodeid . split ( '/' ) [ 1 ] ;
hw2 . time = Date . now ( ) ;
hw2 . type = 'sysinfo' ;
parent . db . Set ( hw2 ) ;
// Event the new sysinfo hash, this will notify everyone that the sysinfo document was changed
var event = { etype : 'node' , action : 'sysinfohash' , nodeid : dev . nodeid , domain : hw2 . domain , hash : hw2 . hash , nolog : 1 } ;
parent . DispatchEvent ( parent . webserver . CreateMeshDispatchTargets ( dev . meshid , [ dev . nodeid ] ) , obj , event ) ;
}
} ) ;
2020-10-18 05:23:24 +03:00
devTaskCompleted ( dev ) ;
2020-10-07 05:47:28 +03:00
}
2020-10-21 01:15:56 +03:00
//
// Intel AMT Activation
//
function activateIntelAmt ( dev ) {
// Find the Intel AMT policy
const mesh = parent . webserver . meshes [ dev . meshid ] ;
2020-10-23 06:54:18 +03:00
if ( mesh == null ) { dev . consoleMsg ( "Unable to find device group." ) ; removeAmtDevice ( dev ) ; return false ; }
2020-10-21 01:15:56 +03:00
var amtPolicy = 0 ; // 0 = Do nothing, 1 = Deactivate CCM, 2 = CCM, 3 = ACM
2020-11-25 10:17:54 +03:00
var ccmPolicy = 0 ; // Only used when in ACM policy: 0 = Do nothing, 1 = Deactivate CCM, 2 = CCM is ACM fails
if ( mesh . amt != null ) { if ( typeof mesh . amt . type == 'number' ) { amtPolicy = mesh . amt . type ; } if ( typeof mesh . amt . ccm == 'number' ) { ccmPolicy = mesh . amt . ccm ; } }
2020-10-21 01:15:56 +03:00
if ( ( typeof dev . mpsConnection . tag . meiState . OsAdmin != 'object' ) || ( typeof dev . mpsConnection . tag . meiState . OsAdmin . user != 'string' ) || ( typeof dev . mpsConnection . tag . meiState . OsAdmin . pass != 'string' ) ) { amtPolicy = 0 ; }
2020-10-23 06:54:18 +03:00
if ( amtPolicy == 0 ) { removeAmtDevice ( dev ) ; return false ; } // Do nothing, we should not have gotten this CIRA-LMS connection.
2020-10-22 05:13:14 +03:00
if ( amtPolicy == 2 ) { activateIntelAmtCcm ( dev , mesh . amt . password ) ; } // Activate to CCM policy
2020-10-23 23:28:31 +03:00
if ( ( amtPolicy == 3 ) || ( amtPolicy == 4 ) ) { // Activate to ACM policy
2020-10-22 05:13:14 +03:00
var acminfo = checkAcmActivation ( dev ) ;
if ( acminfo == null ) {
2020-11-25 10:17:54 +03:00
// No opportunity to activate to ACM, check if we are in CCM
if ( ( dev . mpsConnection . tag . meiState . Flags & 2 ) != 0 ) {
if ( ( amtPolicy == 3 ) && ( ccmPolicy == 1 ) ) { deactivateIntelAmtCCM ( dev ) ; } // If we are in ACM policy and CCM is not allowed, deactivate it now.
else { return true ; } // We are in CCM, keep going
} else {
// We are not in CCM, go to CCM now
if ( ( amtPolicy == 4 ) || ( ( amtPolicy == 3 ) && ( ccmPolicy == 2 ) ) ) { activateIntelAmtCcm ( dev , mesh . amt . password ) ; } // If we are in full automatic or ACM with CCM allowed, setup CCM.
else { removeAmtDevice ( dev ) ; return false ; } // We are not in CCM and policy restricts use of CCM, so exit now.
}
2020-10-22 05:13:14 +03:00
} else {
2020-10-23 06:54:18 +03:00
// Found a certificate to activate to ACM.
if ( ( dev . mpsConnection . tag . meiState . Flags & 2 ) != 0 ) {
// We are in CCM, deactivate CCM first.
deactivateIntelAmtCCM ( dev ) ;
} else {
// We are not activated now, go to ACM directly.
activateIntelAmtAcm ( dev , mesh . amt . password , acminfo ) ;
}
2020-10-22 05:13:14 +03:00
}
}
2020-10-23 06:54:18 +03:00
return false ;
2020-10-21 01:15:56 +03:00
}
function activateIntelAmtCcm ( dev , password ) {
2020-10-21 04:14:00 +03:00
// Generate a random Intel AMT password if needed
2020-10-21 01:15:56 +03:00
if ( ( password == null ) || ( password == '' ) ) { password = getRandomAmtPassword ( ) ; }
dev . temp = { pass : password } ;
// Setup the WSMAN stack, no TLS
var comm = CreateWsmanComm ( dev . nodeid , 16992 , dev . mpsConnection . tag . meiState . OsAdmin . user , dev . mpsConnection . tag . meiState . OsAdmin . pass , 0 , null , dev . mpsConnection ) ; // No TLS
var wsstack = WsmanStackCreateService ( comm ) ;
dev . amtstack = AmtStackCreateService ( wsstack ) ;
dev . amtstack . dev = dev ;
dev . amtstack . BatchEnum ( null , [ '*AMT_GeneralSettings' , '*IPS_HostBasedSetupService' ] , activateIntelAmtCcmEx1 ) ;
}
function activateIntelAmtCcmEx1 ( stack , name , responses , status ) {
const dev = stack . dev ;
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
if ( status != 200 ) { dev . consoleMsg ( "Failed to get Intel AMT state." ) ; removeAmtDevice ( dev ) ; return ; }
if ( responses [ 'IPS_HostBasedSetupService' ] . response [ 'AllowedControlModes' ] . length != 2 ) { dev . consoleMsg ( "Client control mode activation not allowed." ) ; removeAmtDevice ( dev ) ; return ; }
2020-10-23 00:35:12 +03:00
// Log the activation request, logging is a required step for activation.
2020-10-26 22:46:30 +03:00
var domain = parent . config . domains [ dev . domainid ] ;
if ( domain == null ) { dev . consoleMsg ( "Invalid domain." ) ; removeAmtDevice ( dev ) ; return ; }
2020-10-23 00:35:12 +03:00
if ( parent . certificateOperations . logAmtActivation ( domain , { time : new Date ( ) , action : 'ccmactivate' , domain : dev . domainid , amtUuid : dev . mpsConnection . tag . meiState . UUID , amtRealm : responses [ 'AMT_GeneralSettings' ] . response [ 'DigestRealm' ] , user : 'admin' , password : dev . temp . pass , ipport : dev . mpsConnection . remoteAddr + ':' + dev . mpsConnection . remotePort , nodeid : dev . nodeid , meshid : dev . meshid , computerName : dev . name } ) == false ) {
dev . consoleMsg ( "Unable to log operation." ) ; removeAmtDevice ( dev ) ; return ;
}
// Perform CCM activation
2020-10-21 01:15:56 +03:00
dev . amtstack . IPS _HostBasedSetupService _Setup ( 2 , hex _md5 ( 'admin:' + responses [ 'AMT_GeneralSettings' ] . response [ 'DigestRealm' ] + ':' + dev . temp . pass ) . substring ( 0 , 32 ) , null , null , null , null , activateIntelAmtCcmEx2 ) ;
}
function activateIntelAmtCcmEx2 ( stack , name , responses , status ) {
const dev = stack . dev ;
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
if ( status != 200 ) { dev . consoleMsg ( "Failed to activate Intel AMT to CCM." ) ; removeAmtDevice ( dev ) ; return ; }
// Update the device
dev . aquired = { } ;
dev . aquired . controlMode = 1 ; // 1 = CCM, 2 = ACM
2020-10-23 19:45:57 +03:00
if ( typeof dev . amtstack . wsman . comm . amtVersion == 'string' ) {
var verSplit = dev . amtstack . wsman . comm . amtVersion . split ( '.' ) ;
if ( verSplit . length >= 3 ) { dev . aquired . version = verSplit [ 0 ] + '.' + verSplit [ 1 ] + '.' + verSplit [ 2 ] ; dev . aquired . majorver = parseInt ( verSplit [ 0 ] ) ; dev . aquired . minorver = parseInt ( verSplit [ 1 ] ) ; }
}
2020-10-21 04:14:00 +03:00
if ( ( typeof dev . mpsConnection . tag . meiState . OsHostname == 'string' ) && ( typeof dev . mpsConnection . tag . meiState . OsDnsSuffix == 'string' ) ) {
dev . aquired . host = dev . mpsConnection . tag . meiState . OsHostname + '.' + dev . mpsConnection . tag . meiState . OsDnsSuffix ;
}
2020-10-21 01:15:56 +03:00
dev . aquired . realm = dev . amtstack . wsman . comm . digestRealm ;
2020-10-22 01:36:07 +03:00
dev . intelamt . user = dev . aquired . user = 'admin' ;
dev . intelamt . pass = dev . aquired . pass = dev . temp . pass ;
dev . intelamt . tls = dev . aquired . tls = 0 ;
2020-10-21 01:15:56 +03:00
dev . aquired . lastContact = Date . now ( ) ;
2020-10-22 01:36:07 +03:00
dev . aquired . state = 2 ; // Activated
2020-10-26 22:46:30 +03:00
dev . aquired . warn = 0 ; // Clear all warnings
2020-10-21 23:04:36 +03:00
delete dev . acctry ;
2020-10-22 05:13:14 +03:00
delete dev . temp ;
2020-10-21 01:15:56 +03:00
UpdateDevice ( dev ) ;
// Success, switch to managing this device
2020-10-21 04:14:00 +03:00
obj . parent . mpsserver . SendJsonControl ( dev . mpsConnection , { action : 'mestate' } ) ; // Request an MEI state refresh
2020-10-21 23:04:36 +03:00
dev . consoleMsg ( "Succesfully activated in CCM mode, holding 10 seconds..." ) ;
2020-10-21 01:15:56 +03:00
2020-10-21 23:38:24 +03:00
// Wait 10 seconds before attempting to manage this device in CCM
2020-10-21 01:15:56 +03:00
var f = function doManage ( ) { if ( isAmtDeviceValid ( dev ) ) { attemptInitialContact ( doManage . dev ) ; } }
f . dev = dev ;
2020-10-21 22:19:00 +03:00
setTimeout ( f , 10000 ) ;
}
2020-10-22 05:13:14 +03:00
// Check if this device has any way to be activated in ACM using our server certificates.
function checkAcmActivation ( dev ) {
var domain = parent . config . domains [ dev . domainid ] ;
if ( ( domain == null ) || ( domain . amtacmactivation == null ) || ( domain . amtacmactivation . certs == null ) || ( domain . amtacmactivation . certs . length == 0 ) ) return null ;
const activationCerts = domain . amtacmactivation . certs ;
if ( ( dev . mpsConnection . tag . meiState == null ) || ( dev . mpsConnection . tag . meiState . Hashes == null ) || ( dev . mpsConnection . tag . meiState . Hashes . length == 0 ) ) return null ;
const deviceHashes = dev . mpsConnection . tag . meiState . Hashes ;
// Get the trusted FQDN of the device
var trustedFqdn = null ;
if ( dev . mpsConnection . tag . meiState . OsDnsSuffix != null ) { trustedFqdn = dev . mpsConnection . tag . meiState . OsDnsSuffix ; }
if ( dev . mpsConnection . tag . meiState . DnsSuffix != null ) { trustedFqdn = dev . mpsConnection . tag . meiState . DnsSuffix ; }
if ( trustedFqdn == null ) return null ;
// Find a matching certificate
for ( var i in activationCerts ) {
var cert = activationCerts [ i ] ;
if ( ( cert . cn == '*' ) || ( cert . cn == trustedFqdn ) ) {
for ( var j in deviceHashes ) {
var hashInfo = deviceHashes [ j ] ;
if ( hashInfo . isActive == 1 ) {
if ( ( hashInfo . hashAlgorithmStr == 'SHA256' ) && ( hashInfo . certificateHash . toLowerCase ( ) == cert . sha256 ) ) { return { cert : cert , fqdn : trustedFqdn , hash : cert . sha256 } ; } // Found a match
else if ( ( hashInfo . hashAlgorithmStr == 'SHA1' ) && ( hashInfo . certificateHash . toLowerCase ( ) == cert . sha1 ) ) { return { cert : cert , fqdn : trustedFqdn , hash : cert . sha1 } ; } // Found a match
}
}
}
}
return null ; // Did not find a match
}
// Attempt Intel AMT ACM activation
function activateIntelAmtAcm ( dev , password , acminfo ) {
// Generate a random Intel AMT password if needed
if ( ( password == null ) || ( password == '' ) ) { password = getRandomAmtPassword ( ) ; }
dev . temp = { pass : password , acminfo : acminfo } ;
// Setup the WSMAN stack, no TLS
var comm = CreateWsmanComm ( dev . nodeid , 16992 , dev . mpsConnection . tag . meiState . OsAdmin . user , dev . mpsConnection . tag . meiState . OsAdmin . pass , 0 , null , dev . mpsConnection ) ; // No TLS
var wsstack = WsmanStackCreateService ( comm ) ;
dev . amtstack = AmtStackCreateService ( wsstack ) ;
dev . amtstack . dev = dev ;
dev . amtstack . BatchEnum ( null , [ '*AMT_GeneralSettings' , '*IPS_HostBasedSetupService' ] , activateIntelAmtAcmEx1 ) ;
}
function activateIntelAmtAcmEx1 ( stack , name , responses , status ) {
const dev = stack . dev ;
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
if ( status != 200 ) { dev . consoleMsg ( "Failed to get Intel AMT state." ) ; removeAmtDevice ( dev ) ; return ; }
// Sign the Intel AMT ACM activation request
var info = { nonce : responses [ 'IPS_HostBasedSetupService' ] . response [ 'ConfigurationNonce' ] , realm : responses [ 'AMT_GeneralSettings' ] . response [ 'DigestRealm' ] , fqdn : dev . temp . acminfo . fqdn , hash : dev . temp . acminfo . hash , uuid : dev . mpsConnection . tag . meiState . UUID } ;
2020-10-23 00:35:12 +03:00
var acmdata = parent . certificateOperations . signAcmRequest ( parent . config . domains [ dev . domainid ] , info , 'admin' , dev . temp . pass , dev . mpsConnection . remoteAddr + ':' + dev . mpsConnection . remotePort , dev . nodeid , dev . meshid , dev . name , 0 ) ;
if ( acmdata == null ) { dev . consoleMsg ( "Failed to sign ACM nonce." ) ; removeAmtDevice ( dev ) ; return ; }
if ( acmdata . error != null ) { dev . consoleMsg ( acmdata . errorText ) ; removeAmtDevice ( dev ) ; return ; }
2020-10-22 05:13:14 +03:00
// Log this activation event
var event = { etype : 'node' , action : 'amtactivate' , nodeid : dev . nodeid , domain : dev . domainid , msgid : 58 , msgArgs : [ dev . temp . acminfo . fqdn ] , msg : 'Device requested Intel(R) AMT ACM activation, FQDN: ' + dev . temp . acminfo . fqdn } ;
if ( parent . db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the node. Another event will come.
parent . DispatchEvent ( parent . webserver . CreateMeshDispatchTargets ( dev . meshid , [ dev . nodeid ] ) , obj , event ) ;
// Start the activation process
dev . temp . acmdata = acmdata ;
dev . temp . acmdata . index = 0 ;
dev . consoleMsg ( "Performing ACM activation..." ) ;
activateIntelAmtAcmEx2 ( dev ) ;
}
// Recursive function to inject the provisioning certificates into AMT in the proper order and completes ACM activation
function activateIntelAmtAcmEx2 ( dev ) {
var acmdata = dev . temp . acmdata ;
var leaf = ( acmdata . index == 0 ) , root = ( acmdata . index == ( acmdata . certs . length - 1 ) ) ;
if ( ( acmdata . index < acmdata . certs . length ) && ( acmdata . certs [ acmdata . index ] != null ) ) {
dev . amtstack . IPS _HostBasedSetupService _AddNextCertInChain ( acmdata . certs [ acmdata . index ] , leaf , root ,
function ( stack , name , responses , status ) {
const dev = stack . dev ;
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
if ( status != 200 ) { dev . consoleMsg ( "Failed to set ACM certificate chain (" + status + ")." ) ; removeAmtDevice ( dev ) ; return ; }
if ( responses [ 'Body' ] [ 'ReturnValue' ] != 0 ) { dev . consoleMsg ( "Failed to set ACM certificate chain (ERR/" + responses [ 'Body' ] [ 'ReturnValue' ] + ")." ) ; removeAmtDevice ( dev ) ; return ; }
// Move to the next activation operation
dev . temp . acmdata . index ++ ;
activateIntelAmtAcmEx2 ( dev ) ;
}
) ;
} else {
dev . amtstack . IPS _HostBasedSetupService _AdminSetup ( 2 , acmdata . password , acmdata . nonce , 2 , acmdata . signature ,
function ( stack , name , responses , status ) {
const dev = stack . dev ;
if ( isAmtDeviceValid ( dev ) == false ) return ; // Device no longer exists, ignore this request.
if ( status != 200 ) { dev . consoleMsg ( "Failed to complete ACM activation (" + status + ")." ) ; removeAmtDevice ( dev ) ; return ; }
if ( responses [ 'Body' ] [ 'ReturnValue' ] != 0 ) { dev . consoleMsg ( "Failed to complete ACM activation (ERR/" + responses [ 'Body' ] [ 'ReturnValue' ] + ")." ) ; removeAmtDevice ( dev ) ; return ; }
// Success, switch to managing this device
obj . parent . mpsserver . SendJsonControl ( dev . mpsConnection , { action : 'mestate' } ) ; // Request an MEI state refresh
dev . consoleMsg ( "Succesfully activated in ACM mode, holding 10 seconds..." ) ;
// Update the device
dev . aquired = { } ;
dev . aquired . controlMode = 2 ; // 1 = CCM, 2 = ACM
2020-10-23 19:45:57 +03:00
if ( typeof dev . amtstack . wsman . comm . amtVersion == 'string' ) {
var verSplit = dev . amtstack . wsman . comm . amtVersion . split ( '.' ) ;
if ( verSplit . length >= 3 ) { dev . aquired . version = verSplit [ 0 ] + '.' + verSplit [ 1 ] + '.' + verSplit [ 2 ] ; dev . aquired . majorver = parseInt ( verSplit [ 0 ] ) ; dev . aquired . minorver = parseInt ( verSplit [ 1 ] ) ; }
}
2020-10-22 05:13:14 +03:00
if ( ( typeof dev . mpsConnection . tag . meiState . OsHostname == 'string' ) && ( typeof dev . mpsConnection . tag . meiState . OsDnsSuffix == 'string' ) ) {
dev . aquired . host = dev . mpsConnection . tag . meiState . OsHostname + '.' + dev . mpsConnection . tag . meiState . OsDnsSuffix ;
}
dev . aquired . realm = dev . amtstack . wsman . comm . digestRealm ;
dev . intelamt . user = dev . aquired . user = 'admin' ;
dev . intelamt . pass = dev . aquired . pass = dev . temp . pass ;
dev . intelamt . tls = dev . aquired . tls = 0 ;
dev . aquired . lastContact = Date . now ( ) ;
dev . aquired . state = 2 ; // Activated
delete dev . acctry ;
delete dev . temp ;
UpdateDevice ( dev ) ;
// Wait 10 seconds before attempting to manage this device in CCM
var f = function doManage ( ) { if ( isAmtDeviceValid ( dev ) ) { attemptInitialContact ( doManage . dev ) ; } }
f . dev = dev ;
setTimeout ( f , 10000 ) ;
}
) ;
}
}
2020-10-21 22:19:00 +03:00
//
// Intel AMT CCM deactivation
//
function deactivateIntelAmtCCM ( dev ) {
dev . consoleMsg ( "Deactivating CCM..." ) ;
dev . deactivateCcmPending = 1 ;
dev . controlMsg ( { action : 'deactivate' } ) ;
}
// This is called after the deactivation call
function deactivateIntelAmtCCMEx ( dev , state ) {
if ( state != 0 ) {
dev . consoleMsg ( "Failed to deactivate Intel AMT CCM." ) ;
removeAmtDevice ( dev ) ;
} else {
2020-10-22 01:36:07 +03:00
// Update the device
dev . aquired = { } ;
dev . aquired . controlMode = 0 ; // 1 = CCM, 2 = ACM
dev . aquired . state = 0 ; // Not activated
delete dev . acctry ;
delete dev . amtstack ;
UpdateDevice ( dev ) ;
2020-10-24 00:56:20 +03:00
if ( dev . policy . amtPolicy == 1 ) { // Deactivation policy, we are done.
2020-10-21 22:19:00 +03:00
dev . consoleMsg ( "Deactivation successful." ) ;
dev . consoleMsg ( "Done." ) ;
removeAmtDevice ( dev ) ;
} else {
// Wait 20 seconds before attempting any operation on this device
2020-10-21 23:04:36 +03:00
dev . consoleMsg ( "Deactivation successful, holding for 1 minute..." ) ;
2020-10-21 22:19:00 +03:00
var f = function askMeiState ( ) {
askMeiState . dev . pendingUpdatedMeiState = 1 ;
askMeiState . dev . controlMsg ( { action : 'mestate' } ) ;
}
f . dev = dev ;
2020-10-21 23:04:36 +03:00
setTimeout ( f , 60000 ) ;
2020-10-21 22:19:00 +03:00
}
}
2020-10-21 01:15:56 +03:00
}
2020-10-21 23:04:36 +03:00
2020-10-19 07:06:39 +03:00
//
// General Methods
//
// Called this when a task is completed, when all tasks are completed the call back function will be called.
function devTaskCompleted ( dev ) {
dev . taskCount -- ;
2020-10-21 20:43:55 +03:00
if ( dev . taskCount == 0 ) { var f = dev . taskCompleted ; delete dev . taskCount ; delete dev . taskCompleted ; if ( f != null ) { f ( dev ) ; } }
2020-10-19 07:06:39 +03:00
}
2020-10-07 22:03:19 +03:00
function guidToStr ( g ) { return g . substring ( 6 , 8 ) + g . substring ( 4 , 6 ) + g . substring ( 2 , 4 ) + g . substring ( 0 , 2 ) + '-' + g . substring ( 10 , 12 ) + g . substring ( 8 , 10 ) + '-' + g . substring ( 14 , 16 ) + g . substring ( 12 , 14 ) + '-' + g . substring ( 16 , 20 ) + '-' + g . substring ( 20 ) ; }
2020-10-18 09:53:50 +03:00
// Check which key pair matches the public key in the certificate
function amtcert _linkCertPrivateKey ( certs , keys ) {
for ( var i in certs ) {
var cert = certs [ i ] ;
try {
if ( keys . length == 0 ) return ;
2020-10-19 07:06:39 +03:00
var b = obj . parent . certificateOperations . forge . asn1 . fromDer ( cert . X509CertificateBin ) ;
2020-10-18 09:53:50 +03:00
var a = obj . parent . certificateOperations . forge . pki . certificateFromAsn1 ( b ) . publicKey ;
var publicKeyPEM = obj . parent . certificateOperations . forge . pki . publicKeyToPem ( a ) . substring ( 28 + 32 ) . replace ( /(\r\n|\n|\r)/gm , "" ) ;
for ( var j = 0 ; j < keys . length ; j ++ ) {
if ( publicKeyPEM === ( keys [ j ] [ 'DERKey' ] + '-----END PUBLIC KEY-----' ) ) {
keys [ j ] . XCert = cert ; // Link the key pair to the certificate
cert . XPrivateKey = keys [ j ] ; // Link the certificate to the key pair
}
}
} catch ( e ) { console . log ( e ) ; }
}
}
2020-10-21 01:15:56 +03:00
// Generate a random Intel AMT password
function checkAmtPassword ( p ) { return ( p . length > 7 ) && ( /\d/ . test ( p ) ) && ( /[a-z]/ . test ( p ) ) && ( /[A-Z]/ . test ( p ) ) && ( /\W/ . test ( p ) ) ; }
2020-10-24 01:02:13 +03:00
function getRandomAmtPassword ( ) { var p ; do { p = Buffer . from ( parent . crypto . randomBytes ( 9 ) , 'binary' ) . toString ( 'base64' ) . split ( '/' ) . join ( '@' ) ; } while ( checkAmtPassword ( p ) == false ) ; return p ; }
function getRandomPassword ( ) { return Buffer . from ( parent . crypto . randomBytes ( 9 ) , 'binary' ) . toString ( 'base64' ) . split ( '/' ) . join ( '@' ) ; }
function getRandomLowerCase ( len ) { var r = '' , random = parent . crypto . randomBytes ( len ) ; for ( var i = 0 ; i < len ; i ++ ) { r += String . fromCharCode ( 97 + ( random [ i ] % 26 ) ) ; } return r ; }
2020-10-21 01:15:56 +03:00
2020-10-24 01:02:13 +03:00
function hex _md5 ( str ) { return parent . crypto . createHash ( 'md5' ) . update ( str ) . digest ( 'hex' ) ; }
2020-10-18 09:53:50 +03:00
function Clone ( v ) { return JSON . parse ( JSON . stringify ( v ) ) ; }
2020-10-19 07:06:39 +03:00
function MakeToArray ( v ) { if ( ! v || v == null || typeof v == 'object' ) return v ; return [ v ] ; }
function getItem ( x , y , z ) { for ( var i in x ) { if ( x [ i ] [ y ] == z ) return x [ i ] ; } return null ; }
function IntToStr ( v ) { return String . fromCharCode ( ( v >> 24 ) & 0xFF , ( v >> 16 ) & 0xFF , ( v >> 8 ) & 0xFF , v & 0xFF ) ; }
2020-10-18 09:53:50 +03:00
function parseCertName ( x ) {
var j , r = { } , xx = x . split ( ',' ) ;
for ( var i in xx ) { j = xx [ i ] . indexOf ( '=' ) ; r [ xx [ i ] . substring ( 0 , j ) ] = xx [ i ] . substring ( j + 1 ) ; }
return r ;
}
/ *
function amtcert _signWithCaKey ( DERKey , caPrivateKey , certAttributes , issuerAttributes , extKeyUsage ) {
return amtcert _createCertificate ( certAttributes , caPrivateKey , DERKey , issuerAttributes , extKeyUsage ) ;
}
* /
// --- Extended Key Usage OID's ---
// 1.3.6.1.5.5.7.3.1 = TLS Server certificate
// 1.3.6.1.5.5.7.3.2 = TLS Client certificate
// 2.16.840.1.113741.1.2.1 = Intel AMT Remote Console
// 2.16.840.1.113741.1.2.2 = Intel AMT Local Console
// 2.16.840.1.113741.1.2.3 = Intel AMT Client Setup Certificate (Zero-Touch)
// Generate a certificate with a set of attributes signed by a rootCert. If the rootCert is obmitted, the generated certificate is self-signed.
function amtcert _createCertificate ( certAttributes , caPrivateKey , DERKey , issuerAttributes , extKeyUsage ) {
// Generate a keypair and create an X.509v3 certificate
var keys , cert = obj . parent . certificateOperations . forge . pki . createCertificate ( ) ;
cert . publicKey = obj . parent . certificateOperations . forge . pki . publicKeyFromPem ( '-----BEGIN PUBLIC KEY-----' + DERKey + '-----END PUBLIC KEY-----' ) ;
cert . serialNumber = '' + Math . floor ( ( Math . random ( ) * 100000 ) + 1 ) ;
cert . validity . notBefore = new Date ( 2018 , 0 , 1 ) ;
//cert.validity.notBefore.setFullYear(cert.validity.notBefore.getFullYear() - 1); // Create a certificate that is valid one year before, to make sure out-of-sync clocks don't reject this cert.
cert . validity . notAfter = new Date ( 2049 , 11 , 31 ) ;
//cert.validity.notAfter.setFullYear(cert.validity.notAfter.getFullYear() + 20);
var attrs = [ ] ;
if ( certAttributes [ 'CN' ] ) attrs . push ( { name : 'commonName' , value : certAttributes [ 'CN' ] } ) ;
if ( certAttributes [ 'C' ] ) attrs . push ( { name : 'countryName' , value : certAttributes [ 'C' ] } ) ;
if ( certAttributes [ 'ST' ] ) attrs . push ( { shortName : 'ST' , value : certAttributes [ 'ST' ] } ) ;
if ( certAttributes [ 'O' ] ) attrs . push ( { name : 'organizationName' , value : certAttributes [ 'O' ] } ) ;
cert . setSubject ( attrs ) ;
// Use root attributes
var rootattrs = [ ] ;
if ( issuerAttributes [ 'CN' ] ) rootattrs . push ( { name : 'commonName' , value : issuerAttributes [ 'CN' ] } ) ;
if ( issuerAttributes [ 'C' ] ) rootattrs . push ( { name : 'countryName' , value : issuerAttributes [ 'C' ] } ) ;
if ( issuerAttributes [ 'ST' ] ) rootattrs . push ( { shortName : 'ST' , value : issuerAttributes [ 'ST' ] } ) ;
if ( issuerAttributes [ 'O' ] ) rootattrs . push ( { name : 'organizationName' , value : issuerAttributes [ 'O' ] } ) ;
cert . setIssuer ( rootattrs ) ;
if ( extKeyUsage == null ) { extKeyUsage = { name : 'extKeyUsage' , serverAuth : true , } } else { extKeyUsage . name = 'extKeyUsage' ; }
/ *
{
name : 'extKeyUsage' ,
serverAuth : true ,
clientAuth : true ,
codeSigning : true ,
emailProtection : true ,
timeStamping : true ,
'2.16.840.1.113741.1.2.1' : true
}
* /
// Create a leaf certificate
cert . setExtensions ( [ {
name : 'basicConstraints'
} , {
name : 'keyUsage' ,
keyCertSign : true ,
digitalSignature : true ,
nonRepudiation : true ,
keyEncipherment : true ,
dataEncipherment : true
} , extKeyUsage , {
name : 'nsCertType' ,
client : true ,
server : true ,
email : true ,
objsign : true ,
} , {
name : 'subjectKeyIdentifier'
} ] ) ;
// Self-sign certificate
var privatekey = obj . parent . certificateOperations . forge . pki . privateKeyFromPem ( caPrivateKey ) ;
cert . sign ( privatekey , obj . parent . certificateOperations . forge . md . sha256 . create ( ) ) ;
return cert ;
}
2020-10-07 05:47:28 +03:00
return obj ;
} ;