Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Manhole is in-process service that will accept unix domain socket connections and present thestacktraces for all threads and an interactive prompt.
Uses unix domain sockets, only root or same effective user can connect.
Can run the connection in a thread or in a signal handler (see oneshot_on
option).
Can start the thread listening for connections from a signal handler (see activate_on
option)
Compatible with apps that fork, reinstalls the Manhole thread after fork - had to monkeypatch os.fork/os.forkpty for this.
Compatible with gevent and eventlet with some limitations - you need to either:
oneshot_on
, orgevent.monkey.patch_all(thread=False)
, eventlet.monkey_patch(thread=False)
Note: on eventlet you might <https://github.com/eventlet/eventlet/issues/401>
_ need to setup the hub first to prevent
circular import problems:
.. sourcecode:: python
import eventlet eventlet.hubs.get_hub() # do this first eventlet.monkey_patch(thread=False)
The thread is compatible with apps that use signalfd (will mask all signals for the Manhole threads).
.. code-block:: python
manhole.install(
verbose=True,
verbose_destination=2,
patch_fork=True,
activate_on=None,
oneshot_on=None,
sigmask=manhole.ALL_SIGNALS,
socket_path=None,
reinstall_delay=0.5,
locals=None,
strict=True,
)
verbose
- Set it to False
to squelch the logging.verbose_destination
- Destination for verbose messages. Set it to a file descriptor or handle. Default is
unbuffered stderr (stderr 2
file descriptor).patch_fork
- Set it to False
if you don't want your os.fork
and os.forkpy
monkeypatchedactivate_on
- Set to "USR1"
, "USR2"
or some other signal name, or a number if you want the Manhole thread
to start when this signal is sent. This is desirable in case you don't want the thread active all the time.thread
- Set to True
to start the always-on ManholeThread. Default: True
.
Automatically switched to False
if oneshot_on
or activate_on
are used.oneshot_on
- Set to "USR1"
, "USR2"
or some other signal name, or a number if you want the Manhole to
listen for connection in the signal handler. This is desireable in case you don't want threads at all.sigmask
- Will set the signal mask to the given list (using signalfd.sigprocmask
). No action is done if
signalfd
is not importable. NOTE: This is done so that the Manhole thread doesn't steal any signals;
Normally that is fine because Python will force all the signal handling to be run in the main thread but signalfd
doesn't.socket_path
- Use a specific path for the unix domain socket (instead of /tmp/manhole-<pid>
). This disables
patch_fork
as children cannot reuse the same path.reinstall_delay
- Delay the unix domain socket creation reinstall_delay seconds. This alleviates
cleanup failures when using fork+exec patterns.locals
- Names to add to manhole interactive shell locals.daemon_connection
- The connection thread is daemonic (dies on app exit). Default: False
.redirect_stderr
- Redirect output from stderr to manhole console. Default: True
.strict
- If True
then AlreadyInstalled
will be raised when attempting to install manhole twice.
Default: True
.Manhole can be installed via the PYTHONMANHOLE
environment variable.
This::
PYTHONMANHOLE='' python yourapp.py
Is equivalent to having this in yourapp.py
::
import manhole
manhole.install()
Any extra text in the environment variable is passed to manhole.install()
. Example::
PYTHONMANHOLE='oneshot_on="USR2"' python yourapp.py
sys.__std*__
/sys.std*
are redirected to the UDSverbose_destination
can cause deadlocks. See bug reports:
PyPy <https://github.com/pypy/pypy/issues/1895>
_ and Python 3.4 <http://bugs.python.org/issue22697>
_.By default Python doesn't call the atexit
callbacks with the default SIGTERM handling. This makes manhole leave
stray socket files around. If this is undesirable you should install a custom SIGTERM handler so atexit
is
properly invoked.
Example:
.. code-block:: python
import signal
import sys
def handle_sigterm(signo, frame):
sys.exit(128 + signo) # this will raise SystemExit and cause atexit to be called
signal.signal(signal.SIGTERM, handle_sigterm)
Because uWSGI overrides signal handling Manhole is a bit more tricky to setup. One way is to use "uWSGI signals" (not the POSIX signals) and have the workers check a file for the pid you want to open the Manhole in.
Stick something this in your WSGI application file:
.. sourcecode:: python
from __future__ import print_function
import sys
import os
import manhole
stack_dump_file = '/tmp/manhole-pid'
uwsgi_signal_number = 17
try:
import uwsgi
if not os.path.exists(stack_dump_file):
open(stack_dump_file, 'w')
def open_manhole(dummy_signum):
with open(stack_dump_file, 'r') as fh:
pid = fh.read().strip()
if pid == str(os.getpid()):
inst = manhole.install(strict=False, thread=False)
inst.handle_oneshot(dummy_signum, dummy_signum)
uwsgi.register_signal(uwsgi_signal_number, 'workers', open_manhole)
uwsgi.add_file_monitor(uwsgi_signal_number, stack_dump_file)
print("Listening for stack mahole requests via %r" % (stack_dump_file,), file=sys.stderr)
except ImportError:
print("Not running under uwsgi; unable to configure manhole trigger", file=sys.stderr)
except IOError:
print("IOError creating manhole trigger %r" % (stack_dump_file,), file=sys.stderr)
# somewhere bellow you'd have something like
from django.core.wsgi import get_wsgi_application
application = get_wsgi_application()
# or
def application(environ, start_response):
start_response('200 OK', [('Content-Type', 'text/plain'), ('Content-Length', '2')])
yield b'OK'
To open the Manhole just run echo 1234 > /tmp/manhole-pid
and then manhole-cli 1234
.
:OS: Linux, OS X :Runtime: Python 2.7, 3.4, 3.5, 3.6 or PyPy
manhole <http://twistedmatrix.com/documents/current/api/twisted.conch.manhole.html>
__ - it has colors and
server-side history.wsgi-shell <https://github.com/GrahamDumpleton/wsgi-shell>
_ - spawns a thread.pyrasite <https://github.com/lmacken/pyrasite>
_ - uses gdb to inject code.pydbattach <https://github.com/albertz/pydbattach>
_ - uses gdb to inject code.pystuck <https://github.com/alonho/pystuck>
_ - very similar, uses rpyc <https://github.com/tomerfiliba/rpyc>
_ for
communication.pyringe <https://github.com/google/pyringe>
_ - uses gdb to inject code, more reliable, but relies on dbg
python
builds unfortunatelly.pdb-clone <https://pypi.python.org/pypi/pdb-clone>
_ - uses gdb to inject code, with a different strategy <https://code.google.com/p/pdb-clone/wiki/RemoteDebugging>
_.66
.68
.62
.manhole-cli
more graceful.
Contributed by Anton Ryzhov in 63
.sys.last_type
, sys.last_value
, sys.last_traceback
.
Contributed by Anton Ryzhov in 59
.58
.pid
argument parsing in manhole-cli
to allow using paths with any prefix
(not just /tmp
).sys.getfilesystemencoding()
would be broken after installing a threaded
manhole. See 51
.socket.setdefaulttimeout()
is used.
Contributed by "honnix" in 53
.43
.manhole-cli
so that timeout is actually seconds and not milliseconds.
Contributed by Nir Soffer in 45
.manhole-cli
.
Contributed by Nir Soffer in 46
.49
.connection_handler
option. Now you can conveniently use connection_handler="exec"
.handle_connection_exec
. It now has a clean way to exit (exit()
) and properly closes the socket.connection_handler
install option. Default value is manhole.handle_connection_repl
, and alternate
manhole.handle_connection_exec
is provided (very simple: no output redirection, no stacktrace dumping).manhole-cli
. Now echo foobar | manhole-cli
will wait 1 second for output from manhole
(you can customize this with the --timeout
option).manhole-cli
on Python 3 (exc vars don't leak anymore).strict
mode). Previous install is undone.Changed manhole-cli
:
--signal
argument).PID
argument.PYTHONMANHOLE
environment variable.strict
install option. Set it to false to avoid getting the AlreadyInstalled
exception.manhole-cli
script that emulates socat readline unix-connect:/tmp/manhole-1234
.socket_path
install option (contributed by Nir Soffer
_).reinstall_delay
install option.locals
install option (contributed by Nir Soffer
_).redirect_stderr
install option (contributed by Nir Soffer
_).Nir Soffer
_).Saulius Menkevičius
_)... _Saulius Menkevičius: https://github.com/razzmatazz .. _Nir Soffer: https://github.com/nirs
FAQs
Manhole is in-process service that will accept unix domain socket connections and present thestacktraces for all threads and an interactive prompt.
We found that manhole demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.