PeerChat.c 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421
  1. /**
  2. * @file PeerChat.c
  3. * @author Ambroz Bizjak <ambrop7@gmail.com>
  4. *
  5. * @section LICENSE
  6. *
  7. * This file is part of BadVPN.
  8. *
  9. * BadVPN is free software: you can redistribute it and/or modify
  10. * it under the terms of the GNU General Public License version 2
  11. * as published by the Free Software Foundation.
  12. *
  13. * BadVPN is distributed in the hope that it will be useful,
  14. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  15. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  16. * GNU General Public License for more details.
  17. *
  18. * You should have received a copy of the GNU General Public License along
  19. * with this program; if not, write to the Free Software Foundation, Inc.,
  20. * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
  21. */
  22. #include <string.h>
  23. #include <ssl.h>
  24. #include <sslerr.h>
  25. #include <misc/byteorder.h>
  26. #include <security/BRandom.h>
  27. #include "PeerChat.h"
  28. #include <generated/blog_channel_PeerChat.h>
  29. #define PeerLog(_o, ...) BLog_LogViaFunc((_o)->logfunc, (_o)->user, BLOG_CURRENT_CHANNEL, __VA_ARGS__)
  30. static void report_error (PeerChat *o)
  31. {
  32. DebugError_AssertNoError(&o->d_err);
  33. DEBUGERROR(&o->d_err, o->handler_error(o->user))
  34. return;
  35. }
  36. static void recv_job_handler (PeerChat *o)
  37. {
  38. DebugObject_Access(&o->d_obj);
  39. DebugError_AssertNoError(&o->d_err);
  40. ASSERT(o->recv_data_len >= 0)
  41. ASSERT(o->recv_data_len <= SC_MAX_MSGLEN)
  42. int data_len = o->recv_data_len;
  43. // set no received data
  44. o->recv_data_len = -1;
  45. #ifdef PEERCHAT_SIMULATE_ERROR
  46. uint8_t x;
  47. BRandom_randomize(&x, sizeof(x));
  48. if (x < PEERCHAT_SIMULATE_ERROR) {
  49. PeerLog(o, BLOG_ERROR, "simulate error");
  50. report_error(o);
  51. return;
  52. }
  53. #endif
  54. if (o->ssl_mode != PEERCHAT_SSL_NONE) {
  55. // buffer data
  56. if (!SimpleStreamBuffer_Write(&o->ssl_recv_buf, o->recv_data, data_len)) {
  57. PeerLog(o, BLOG_ERROR, "out of recv buffer");
  58. report_error(o);
  59. return;
  60. }
  61. } else {
  62. // call message handler
  63. o->handler_message(o->user, o->recv_data, data_len);
  64. return;
  65. }
  66. }
  67. static void ssl_con_handler (PeerChat *o, int event)
  68. {
  69. DebugObject_Access(&o->d_obj);
  70. DebugError_AssertNoError(&o->d_err);
  71. ASSERT(o->ssl_mode == PEERCHAT_SSL_CLIENT || o->ssl_mode == PEERCHAT_SSL_SERVER)
  72. ASSERT(event == BSSLCONNECTION_EVENT_ERROR)
  73. PeerLog(o, BLOG_ERROR, "SSL error");
  74. report_error(o);
  75. return;
  76. }
  77. static SECStatus client_auth_data_callback (PeerChat *o, PRFileDesc *fd, CERTDistNames *caNames, CERTCertificate **pRetCert, SECKEYPrivateKey **pRetKey)
  78. {
  79. DebugObject_Access(&o->d_obj);
  80. ASSERT(o->ssl_mode == PEERCHAT_SSL_CLIENT)
  81. CERTCertificate *cert = CERT_DupCertificate(o->ssl_cert);
  82. if (!cert) {
  83. PeerLog(o, BLOG_ERROR, "CERT_DupCertificate failed");
  84. goto fail0;
  85. }
  86. SECKEYPrivateKey *key = SECKEY_CopyPrivateKey(o->ssl_key);
  87. if (!key) {
  88. PeerLog(o, BLOG_ERROR, "SECKEY_CopyPrivateKey failed");
  89. goto fail1;
  90. }
  91. *pRetCert = cert;
  92. *pRetKey = key;
  93. return SECSuccess;
  94. fail1:
  95. CERT_DestroyCertificate(cert);
  96. fail0:
  97. return SECFailure;
  98. }
  99. static SECStatus auth_certificate_callback (PeerChat *o, PRFileDesc *fd, PRBool checkSig, PRBool isServer)
  100. {
  101. DebugObject_Access(&o->d_obj);
  102. ASSERT(o->ssl_mode == PEERCHAT_SSL_CLIENT || o->ssl_mode == PEERCHAT_SSL_SERVER)
  103. // This callback is used to bypass checking the server's domain name, as peers
  104. // don't have domain names. We byte-compare the certificate to the one reported
  105. // by the server anyway.
  106. SECStatus ret = SECFailure;
  107. CERTCertificate *cert = SSL_PeerCertificate(o->ssl_prfd);
  108. if (!cert) {
  109. PeerLog(o, BLOG_ERROR, "SSL_PeerCertificate failed");
  110. PORT_SetError(SSL_ERROR_BAD_CERTIFICATE);
  111. goto fail1;
  112. }
  113. SECCertUsage cert_usage = (o->ssl_mode == PEERCHAT_SSL_CLIENT ? certUsageSSLServer : certUsageSSLClient);
  114. if (CERT_VerifyCertNow(CERT_GetDefaultCertDB(), cert, PR_TRUE, cert_usage, SSL_RevealPinArg(o->ssl_prfd)) != SECSuccess) {
  115. goto fail2;
  116. }
  117. // compare to certificate provided by the server
  118. SECItem der = cert->derCert;
  119. if (der.len != o->ssl_peer_cert_len || memcmp(der.data, o->ssl_peer_cert, der.len)) {
  120. PeerLog(o, BLOG_ERROR, "peer certificate doesn't match");
  121. PORT_SetError(SSL_ERROR_BAD_CERTIFICATE);
  122. goto fail2;
  123. }
  124. ret = SECSuccess;
  125. fail2:
  126. CERT_DestroyCertificate(cert);
  127. fail1:
  128. return ret;
  129. }
  130. static void ssl_recv_if_handler_send (PeerChat *o, uint8_t *data, int data_len)
  131. {
  132. DebugObject_Access(&o->d_obj);
  133. DebugError_AssertNoError(&o->d_err);
  134. ASSERT(o->ssl_mode == PEERCHAT_SSL_CLIENT || o->ssl_mode == PEERCHAT_SSL_SERVER)
  135. ASSERT(data_len >= 0)
  136. ASSERT(data_len <= SC_MAX_MSGLEN)
  137. // accept packet
  138. PacketPassInterface_Done(&o->ssl_recv_if);
  139. // call message handler
  140. o->handler_message(o->user, data, data_len);
  141. return;
  142. }
  143. static void ssl_recv_decoder_handler_error (PeerChat *o)
  144. {
  145. DebugObject_Access(&o->d_obj);
  146. DebugError_AssertNoError(&o->d_err);
  147. ASSERT(o->ssl_mode == PEERCHAT_SSL_CLIENT || o->ssl_mode == PEERCHAT_SSL_SERVER)
  148. PeerLog(o, BLOG_ERROR, "decoder error");
  149. report_error(o);
  150. return;
  151. }
  152. int PeerChat_Init (PeerChat *o, peerid_t peer_id, int ssl_mode, CERTCertificate *ssl_cert, SECKEYPrivateKey *ssl_key,
  153. uint8_t *ssl_peer_cert, int ssl_peer_cert_len, BPendingGroup *pg, void *user,
  154. BLog_logfunc logfunc,
  155. PeerChat_handler_error handler_error,
  156. PeerChat_handler_message handler_message)
  157. {
  158. ASSERT(ssl_mode == PEERCHAT_SSL_NONE || ssl_mode == PEERCHAT_SSL_CLIENT || ssl_mode == PEERCHAT_SSL_SERVER)
  159. ASSERT(ssl_mode == PEERCHAT_SSL_NONE || ssl_peer_cert_len >= 0)
  160. ASSERT(logfunc)
  161. ASSERT(handler_error)
  162. ASSERT(handler_message)
  163. // init arguments
  164. o->ssl_mode = ssl_mode;
  165. o->ssl_cert = ssl_cert;
  166. o->ssl_key = ssl_key;
  167. o->ssl_peer_cert = ssl_peer_cert;
  168. o->ssl_peer_cert_len = ssl_peer_cert_len;
  169. o->user = user;
  170. o->logfunc = logfunc;
  171. o->handler_error = handler_error;
  172. o->handler_message = handler_message;
  173. // init copier
  174. PacketCopier_Init(&o->copier, SC_MAX_MSGLEN, pg);
  175. // init SC encoder
  176. SCOutmsgEncoder_Init(&o->sc_encoder, peer_id, PacketCopier_GetOutput(&o->copier), pg);
  177. // init PacketProto encoder
  178. PacketProtoEncoder_Init(&o->pp_encoder, SCOutmsgEncoder_GetOutput(&o->sc_encoder), pg);
  179. // init recv job
  180. BPending_Init(&o->recv_job, pg, (BPending_handler)recv_job_handler, o);
  181. // set no received data
  182. o->recv_data_len = -1;
  183. PacketPassInterface *send_buf_output = PacketCopier_GetInput(&o->copier);
  184. if (o->ssl_mode != PEERCHAT_SSL_NONE) {
  185. // init receive buffer
  186. if (!SimpleStreamBuffer_Init(&o->ssl_recv_buf, PEERCHAT_SSL_RECV_BUF_SIZE, pg)) {
  187. PeerLog(o, BLOG_ERROR, "SimpleStreamBuffer_Init failed");
  188. goto fail1;
  189. }
  190. // init SSL StreamPacketSender
  191. StreamPacketSender_Init(&o->ssl_sp_sender, send_buf_output, pg);
  192. // init SSL bottom prfd
  193. if (!BSSLConnection_MakeBackend(&o->ssl_bottom_prfd, StreamPacketSender_GetInput(&o->ssl_sp_sender), SimpleStreamBuffer_GetOutput(&o->ssl_recv_buf))) {
  194. PeerLog(o, BLOG_ERROR, "BSSLConnection_MakeBackend failed");
  195. goto fail2;
  196. }
  197. // init SSL prfd
  198. if (!(o->ssl_prfd = SSL_ImportFD(NULL, &o->ssl_bottom_prfd))) {
  199. ASSERT_FORCE(PR_Close(&o->ssl_bottom_prfd) == PR_SUCCESS)
  200. PeerLog(o, BLOG_ERROR, "SSL_ImportFD failed");
  201. goto fail2;
  202. }
  203. // set client or server mode
  204. if (SSL_ResetHandshake(o->ssl_prfd, (o->ssl_mode == PEERCHAT_SSL_SERVER ? PR_TRUE : PR_FALSE)) != SECSuccess) {
  205. PeerLog(o, BLOG_ERROR, "SSL_ResetHandshake failed");
  206. goto fail3;
  207. }
  208. if (o->ssl_mode == PEERCHAT_SSL_SERVER) {
  209. // set server certificate
  210. if (SSL_ConfigSecureServer(o->ssl_prfd, o->ssl_cert, o->ssl_key, NSS_FindCertKEAType(o->ssl_cert)) != SECSuccess) {
  211. PeerLog(o, BLOG_ERROR, "SSL_ConfigSecureServer failed");
  212. goto fail3;
  213. }
  214. // set require client certificate
  215. if (SSL_OptionSet(o->ssl_prfd, SSL_REQUEST_CERTIFICATE, PR_TRUE) != SECSuccess) {
  216. PeerLog(o, BLOG_ERROR, "SSL_OptionSet(SSL_REQUEST_CERTIFICATE) failed");
  217. goto fail3;
  218. }
  219. if (SSL_OptionSet(o->ssl_prfd, SSL_REQUIRE_CERTIFICATE, PR_TRUE) != SECSuccess) {
  220. PeerLog(o, BLOG_ERROR, "SSL_OptionSet(SSL_REQUIRE_CERTIFICATE) failed");
  221. goto fail3;
  222. }
  223. } else {
  224. // set client certificate callback
  225. if (SSL_GetClientAuthDataHook(o->ssl_prfd, (SSLGetClientAuthData)client_auth_data_callback, o) != SECSuccess) {
  226. PeerLog(o, BLOG_ERROR, "SSL_GetClientAuthDataHook failed");
  227. goto fail3;
  228. }
  229. }
  230. // set verify peer certificate hook
  231. if (SSL_AuthCertificateHook(o->ssl_prfd, (SSLAuthCertificate)auth_certificate_callback, o) != SECSuccess) {
  232. PeerLog(o, BLOG_ERROR, "SSL_AuthCertificateHook failed");
  233. goto fail3;
  234. }
  235. // init SSL connection
  236. BSSLConnection_Init(&o->ssl_con, o->ssl_prfd, 0, pg, o, (BSSLConnection_handler)ssl_con_handler);
  237. // init SSL PacketStreamSender
  238. PacketStreamSender_Init(&o->ssl_ps_sender, BSSLConnection_GetSendIf(&o->ssl_con), sizeof(struct packetproto_header) + SC_MAX_MSGLEN, pg);
  239. // init SSL copier
  240. PacketCopier_Init(&o->ssl_copier, SC_MAX_MSGLEN, pg);
  241. // init SSL encoder
  242. PacketProtoEncoder_Init(&o->ssl_encoder, PacketCopier_GetOutput(&o->ssl_copier), pg);
  243. // init SSL buffer
  244. if (!SinglePacketBuffer_Init(&o->ssl_buffer, PacketProtoEncoder_GetOutput(&o->ssl_encoder), PacketStreamSender_GetInput(&o->ssl_ps_sender), pg)) {
  245. PeerLog(o, BLOG_ERROR, "SinglePacketBuffer_Init failed");
  246. goto fail4;
  247. }
  248. // init receive interface
  249. PacketPassInterface_Init(&o->ssl_recv_if, SC_MAX_MSGLEN, (PacketPassInterface_handler_send)ssl_recv_if_handler_send, o, pg);
  250. // init receive decoder
  251. if (!PacketProtoDecoder_Init(&o->ssl_recv_decoder, BSSLConnection_GetRecvIf(&o->ssl_con), &o->ssl_recv_if, pg, o, (PacketProtoDecoder_handler_error)ssl_recv_decoder_handler_error)) {
  252. PeerLog(o, BLOG_ERROR, "PacketProtoDecoder_Init failed");
  253. goto fail5;
  254. }
  255. send_buf_output = PacketCopier_GetInput(&o->ssl_copier);
  256. }
  257. // init send writer
  258. BufferWriter_Init(&o->send_writer, SC_MAX_MSGLEN, pg);
  259. // init send buffer
  260. if (!PacketBuffer_Init(&o->send_buf, BufferWriter_GetOutput(&o->send_writer), send_buf_output, PEERCHAT_SEND_BUF_SIZE, pg)) {
  261. PeerLog(o, BLOG_ERROR, "PacketBuffer_Init failed");
  262. goto fail6;
  263. }
  264. DebugError_Init(&o->d_err, pg);
  265. DebugObject_Init(&o->d_obj);
  266. return 1;
  267. fail6:
  268. BufferWriter_Free(&o->send_writer);
  269. if (o->ssl_mode != PEERCHAT_SSL_NONE) {
  270. PacketProtoDecoder_Free(&o->ssl_recv_decoder);
  271. fail5:
  272. PacketPassInterface_Free(&o->ssl_recv_if);
  273. SinglePacketBuffer_Free(&o->ssl_buffer);
  274. fail4:
  275. PacketProtoEncoder_Free(&o->ssl_encoder);
  276. PacketCopier_Free(&o->ssl_copier);
  277. PacketStreamSender_Free(&o->ssl_ps_sender);
  278. BSSLConnection_Free(&o->ssl_con);
  279. fail3:
  280. ASSERT_FORCE(PR_Close(o->ssl_prfd) == PR_SUCCESS)
  281. fail2:
  282. StreamPacketSender_Free(&o->ssl_sp_sender);
  283. SimpleStreamBuffer_Free(&o->ssl_recv_buf);
  284. }
  285. fail1:
  286. BPending_Free(&o->recv_job);
  287. PacketProtoEncoder_Free(&o->pp_encoder);
  288. SCOutmsgEncoder_Free(&o->sc_encoder);
  289. PacketCopier_Free(&o->copier);
  290. return 0;
  291. }
  292. void PeerChat_Free (PeerChat *o)
  293. {
  294. DebugObject_Free(&o->d_obj);
  295. DebugError_Free(&o->d_err);
  296. PacketBuffer_Free(&o->send_buf);
  297. BufferWriter_Free(&o->send_writer);
  298. if (o->ssl_mode != PEERCHAT_SSL_NONE) {
  299. PacketProtoDecoder_Free(&o->ssl_recv_decoder);
  300. PacketPassInterface_Free(&o->ssl_recv_if);
  301. SinglePacketBuffer_Free(&o->ssl_buffer);
  302. PacketProtoEncoder_Free(&o->ssl_encoder);
  303. PacketCopier_Free(&o->ssl_copier);
  304. PacketStreamSender_Free(&o->ssl_ps_sender);
  305. BSSLConnection_Free(&o->ssl_con);
  306. ASSERT_FORCE(PR_Close(o->ssl_prfd) == PR_SUCCESS)
  307. StreamPacketSender_Free(&o->ssl_sp_sender);
  308. SimpleStreamBuffer_Free(&o->ssl_recv_buf);
  309. }
  310. BPending_Free(&o->recv_job);
  311. PacketProtoEncoder_Free(&o->pp_encoder);
  312. SCOutmsgEncoder_Free(&o->sc_encoder);
  313. PacketCopier_Free(&o->copier);
  314. }
  315. PacketRecvInterface * PeerChat_GetSendOutput (PeerChat *o)
  316. {
  317. DebugObject_Access(&o->d_obj);
  318. return PacketProtoEncoder_GetOutput(&o->pp_encoder);
  319. }
  320. void PeerChat_InputReceived (PeerChat *o, uint8_t *data, int data_len)
  321. {
  322. DebugObject_Access(&o->d_obj);
  323. DebugError_AssertNoError(&o->d_err);
  324. ASSERT(o->recv_data_len == -1)
  325. ASSERT(data_len >= 0)
  326. ASSERT(data_len <= SC_MAX_MSGLEN)
  327. // remember data
  328. o->recv_data = data;
  329. o->recv_data_len = data_len;
  330. // set received job
  331. BPending_Set(&o->recv_job);
  332. }
  333. int PeerChat_StartMessage (PeerChat *o, uint8_t **data)
  334. {
  335. DebugObject_Access(&o->d_obj);
  336. DebugError_AssertNoError(&o->d_err);
  337. return BufferWriter_StartPacket(&o->send_writer, data);
  338. }
  339. void PeerChat_EndMessage (PeerChat *o, int data_len)
  340. {
  341. DebugObject_Access(&o->d_obj);
  342. DebugError_AssertNoError(&o->d_err);
  343. ASSERT(data_len >= 0)
  344. ASSERT(data_len <= SC_MAX_MSGLEN)
  345. BufferWriter_EndPacket(&o->send_writer, data_len);
  346. }