scproto.h 6.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225
  1. /**
  2. * @file scproto.h
  3. * @author Ambroz Bizjak <ambrop7@gmail.com>
  4. *
  5. * @section LICENSE
  6. *
  7. * This file is part of BadVPN.
  8. *
  9. * BadVPN is free software: you can redistribute it and/or modify
  10. * it under the terms of the GNU General Public License version 2
  11. * as published by the Free Software Foundation.
  12. *
  13. * BadVPN is distributed in the hope that it will be useful,
  14. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  15. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  16. * GNU General Public License for more details.
  17. *
  18. * You should have received a copy of the GNU General Public License along
  19. * with this program; if not, write to the Free Software Foundation, Inc.,
  20. * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
  21. *
  22. * @section DESCRIPTION
  23. *
  24. * Definitions for SCProto, the protocol that the clients communicate in
  25. * with the server.
  26. *
  27. * All multi-byte integers in structs are little-endian, unless stated otherwise.
  28. *
  29. * A SCProto packet consists of:
  30. * - a header (struct {@link sc_header}) which contains the type of the
  31. * packet
  32. * - the payload
  33. *
  34. * It goes roughly like that:
  35. *
  36. * When the client connects to the server, it sends a "clienthello" packet
  37. * to the server. The packet contains the protocol version the client is using.
  38. * When the server receives the "clienthello" packet, it checks the version.
  39. * If it doesn't match, it disconnects the client. Otherwise the server sends
  40. * the client a "serverhello" packet to the client. That packet contains
  41. * the ID of the client and possibly its IPv4 address as the server sees it
  42. * (zero if not applicable).
  43. *
  44. * The server than proceeds to synchronize the peers' knowledge of each other.
  45. * It does that by sending a "newclient" messages to a client to inform it of
  46. * another peer, and "endclient" messages to inform it that a peer is gone.
  47. * The server forwards messages between synchronized peers to allow them to
  48. * communicate. A peer sends a message to another peer by sending the "outmsg"
  49. * packet to the server, and the server delivers a message to a peer by sending
  50. * it the "inmsg" packet.
  51. *
  52. * The message service is reliable; messages from one client to another are
  53. * expected to arrive unmodified and in the same order. There is, however,
  54. * no flow control. This means that messages can not be used for bulk transfers
  55. * between the clients (and they are not). If the server runs out of buffer for
  56. * messages from one client to another, it will stop forwarding messages, and
  57. * will reset knowledge of the two clients after some delay. Similarly, if one
  58. * of the clients runs out of buffer locally, it will send the "resetpeer"
  59. * packet to make the server reset knowledge.
  60. *
  61. * The messages transport either:
  62. *
  63. * - If the relevant "newclient" packets do not contain the
  64. * SCID_NEWCLIENT_FLAG_SSL flag, then plaintext MsgProto messages.
  65. *
  66. * - If the relevant "newclient" packets do contain the SCID_NEWCLIENT_FLAG_SSL
  67. * flag, then SSL, broken down into packets, PacketProto inside SSL, and finally
  68. * MsgProto inside PacketProto. The master peer (one with higher ID) acts as an
  69. * SSL server, and the other acts as an SSL client. The peers must identify with
  70. * the same certificate they used when connecting to the server, and each peer
  71. * must byte-compare the other's certificate agains the one provided to it by
  72. * by the server in the relevent "newclient" message.
  73. */
  74. #ifndef BADVPN_PROTOCOL_SCPROTO_H
  75. #define BADVPN_PROTOCOL_SCPROTO_H
  76. #include <stdint.h>
  77. #define SC_VERSION 28
  78. #define SC_OLDVERSION_NOSSL 27
  79. #define SC_OLDVERSION_BROKENCERT 26
  80. #define SC_KEEPALIVE_INTERVAL 10000
  81. /**
  82. * SCProto packet header.
  83. * Follows up to SC_MAX_PAYLOAD bytes of payload.
  84. */
  85. struct sc_header {
  86. /**
  87. * Message type.
  88. */
  89. uint8_t type;
  90. } __attribute__((packed));
  91. #define SC_MAX_PAYLOAD 2000
  92. #define SC_MAX_ENC (sizeof(struct sc_header) + SC_MAX_PAYLOAD)
  93. typedef uint16_t peerid_t;
  94. #define SCID_KEEPALIVE 0
  95. #define SCID_CLIENTHELLO 1
  96. #define SCID_SERVERHELLO 2
  97. #define SCID_NEWCLIENT 3
  98. #define SCID_ENDCLIENT 4
  99. #define SCID_OUTMSG 5
  100. #define SCID_INMSG 6
  101. #define SCID_RESETPEER 7
  102. /**
  103. * "clienthello" client packet payload.
  104. * Packet type is SCID_CLIENTHELLO.
  105. */
  106. struct sc_client_hello {
  107. /**
  108. * Protocol version the client is using.
  109. */
  110. uint16_t version;
  111. } __attribute__((packed));
  112. /**
  113. * "serverhello" server packet payload.
  114. * Packet type is SCID_SERVERHELLO.
  115. */
  116. struct sc_server_hello {
  117. /**
  118. * Flags. Not used yet.
  119. */
  120. uint16_t flags;
  121. /**
  122. * Peer ID of the client.
  123. */
  124. peerid_t id;
  125. /**
  126. * IPv4 address of the client as seen by the server
  127. * (network byte order). Zero if not applicable.
  128. */
  129. uint32_t clientAddr;
  130. } __attribute__((packed));
  131. /**
  132. * "newclient" server packet payload.
  133. * Packet type is SCID_NEWCLIENT.
  134. * If the server is using TLS, follows up to SCID_NEWCLIENT_MAX_CERT_LEN
  135. * bytes of the new client's certificate (encoded in DER).
  136. */
  137. struct sc_server_newclient {
  138. /**
  139. * ID of the new peer.
  140. */
  141. peerid_t id;
  142. /**
  143. * Flags. Possible flags:
  144. * - SCID_NEWCLIENT_FLAG_RELAY_SERVER
  145. * You can relay frames to other peers through this peer.
  146. * - SCID_NEWCLIENT_FLAG_RELAY_CLIENT
  147. * You must allow this peer to relay frames to other peers through you.
  148. * - SCID_NEWCLIENT_FLAG_SSL
  149. * SSL must be used to talk to this peer through messages.
  150. */
  151. uint16_t flags;
  152. } __attribute__((packed));
  153. #define SCID_NEWCLIENT_FLAG_RELAY_SERVER 1
  154. #define SCID_NEWCLIENT_FLAG_RELAY_CLIENT 2
  155. #define SCID_NEWCLIENT_FLAG_SSL 4
  156. #define SCID_NEWCLIENT_MAX_CERT_LEN (SC_MAX_PAYLOAD - sizeof(struct sc_server_newclient))
  157. /**
  158. * "endclient" server packet payload.
  159. * Packet type is SCID_ENDCLIENT.
  160. */
  161. struct sc_server_endclient {
  162. /**
  163. * ID of the removed peer.
  164. */
  165. peerid_t id;
  166. } __attribute__((packed));
  167. /**
  168. * "outmsg" client packet header.
  169. * Packet type is SCID_OUTMSG.
  170. * Follows up to SC_MAX_MSGLEN bytes of message payload.
  171. */
  172. struct sc_client_outmsg {
  173. /**
  174. * ID of the destionation peer.
  175. */
  176. peerid_t clientid;
  177. } __attribute__((packed));
  178. /**
  179. * "inmsg" server packet payload.
  180. * Packet type is SCID_INMSG.
  181. * Follows up to SC_MAX_MSGLEN bytes of message payload.
  182. */
  183. struct sc_server_inmsg {
  184. /**
  185. * ID of the source peer.
  186. */
  187. peerid_t clientid;
  188. } __attribute__((packed));
  189. #define _SC_MAX_OUTMSGLEN (SC_MAX_PAYLOAD - sizeof(struct sc_client_outmsg))
  190. #define _SC_MAX_INMSGLEN (SC_MAX_PAYLOAD - sizeof(struct sc_server_inmsg))
  191. #define SC_MAX_MSGLEN (_SC_MAX_OUTMSGLEN < _SC_MAX_INMSGLEN ? _SC_MAX_OUTMSGLEN : _SC_MAX_INMSGLEN)
  192. /**
  193. * "resetpeer" client packet header.
  194. * Packet type is SCID_RESETPEER.
  195. */
  196. struct sc_client_resetpeer {
  197. /**
  198. * ID of the peer to reset.
  199. */
  200. peerid_t clientid;
  201. } __attribute__((packed));
  202. #endif