2020-09-20 14:16:44 +02:00
|
|
|
/* Copyright (C) 2002-2005 RealVNC Ltd. All Rights Reserved.
|
2021-02-05 11:49:47 +01:00
|
|
|
*
|
2020-09-20 14:16:44 +02:00
|
|
|
* This is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
|
|
* (at your option) any later version.
|
2021-02-05 11:49:47 +01:00
|
|
|
*
|
2020-09-20 14:16:44 +02:00
|
|
|
* This software is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
2021-02-05 11:49:47 +01:00
|
|
|
*
|
2020-09-20 14:16:44 +02:00
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this software; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307,
|
|
|
|
* USA.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
|
|
#include <config.h>
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef WIN32
|
|
|
|
//#include <io.h>
|
|
|
|
#include <winsock2.h>
|
|
|
|
#include <ws2tcpip.h>
|
|
|
|
#define errorNumber WSAGetLastError()
|
|
|
|
#else
|
|
|
|
#define errorNumber errno
|
|
|
|
#define closesocket close
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
#include <netinet/tcp.h>
|
|
|
|
#include <netdb.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#include <sys/un.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <unistd.h>
|
2021-02-05 11:49:47 +01:00
|
|
|
#include <pthread.h>
|
2020-10-01 13:37:51 +02:00
|
|
|
#include <wordexp.h>
|
2021-08-13 11:15:17 +02:00
|
|
|
#include <sys/types.h>
|
|
|
|
#include <unistd.h>
|
2022-07-26 12:38:14 +02:00
|
|
|
#include <openssl/crypto.h>
|
|
|
|
#include <openssl/err.h>
|
|
|
|
#include <openssl/ssl.h>
|
2020-09-20 14:16:44 +02:00
|
|
|
#include "websocket.h"
|
|
|
|
|
2021-03-02 14:23:32 +01:00
|
|
|
#include <network/GetAPI.h>
|
2020-09-20 14:16:44 +02:00
|
|
|
#include <network/TcpSocket.h>
|
2022-07-26 12:38:14 +02:00
|
|
|
#include <network/Udp.h>
|
2020-09-20 14:16:44 +02:00
|
|
|
#include <rfb/LogWriter.h>
|
|
|
|
#include <rfb/Configuration.h>
|
2020-10-01 13:37:51 +02:00
|
|
|
#include <rfb/ServerCore.h>
|
2020-09-20 14:16:44 +02:00
|
|
|
|
|
|
|
#ifdef WIN32
|
|
|
|
#include <os/winerrno.h>
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifndef INADDR_NONE
|
|
|
|
#define INADDR_NONE ((unsigned long)-1)
|
|
|
|
#endif
|
|
|
|
#ifndef INADDR_LOOPBACK
|
|
|
|
#define INADDR_LOOPBACK ((unsigned long)0x7F000001)
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifndef IN6_ARE_ADDR_EQUAL
|
|
|
|
#define IN6_ARE_ADDR_EQUAL(a,b) \
|
|
|
|
(memcmp ((const void*)(a), (const void*)(b), sizeof (struct in6_addr)) == 0)
|
|
|
|
#endif
|
|
|
|
|
|
|
|
// Missing on older Windows and OS X
|
|
|
|
#ifndef AI_NUMERICSERV
|
|
|
|
#define AI_NUMERICSERV 0
|
|
|
|
#endif
|
|
|
|
|
|
|
|
using namespace network;
|
|
|
|
using namespace rdr;
|
|
|
|
|
|
|
|
static rfb::LogWriter vlog("TcpSocket");
|
|
|
|
|
|
|
|
static rfb::BoolParameter UseIPv4("UseIPv4", "Use IPv4 for incoming and outgoing connections.", true);
|
|
|
|
static rfb::BoolParameter UseIPv6("UseIPv6", "Use IPv6 for incoming and outgoing connections.", true);
|
|
|
|
|
|
|
|
rfb::StringParameter httpDir("httpd",
|
|
|
|
"Directory containing files to serve via HTTP",
|
|
|
|
WWWDIR);
|
|
|
|
|
|
|
|
/* Tunnelling support. */
|
|
|
|
int network::findFreeTcpPort (void)
|
|
|
|
{
|
|
|
|
int sock;
|
|
|
|
struct sockaddr_in addr;
|
|
|
|
memset(&addr, 0, sizeof(addr));
|
|
|
|
addr.sin_family = AF_INET;
|
|
|
|
addr.sin_addr.s_addr = INADDR_ANY;
|
|
|
|
|
|
|
|
if ((sock = socket (AF_INET, SOCK_STREAM, 0)) < 0)
|
|
|
|
throw SocketException ("unable to create socket", errorNumber);
|
|
|
|
|
|
|
|
addr.sin_port = 0;
|
|
|
|
if (bind (sock, (struct sockaddr *)&addr, sizeof (addr)) < 0)
|
|
|
|
throw SocketException ("unable to find free port", errorNumber);
|
|
|
|
|
|
|
|
socklen_t n = sizeof(addr);
|
|
|
|
if (getsockname (sock, (struct sockaddr *)&addr, &n) < 0)
|
|
|
|
throw SocketException ("unable to get port number", errorNumber);
|
|
|
|
|
|
|
|
closesocket (sock);
|
|
|
|
return ntohs(addr.sin_port);
|
|
|
|
}
|
|
|
|
|
|
|
|
int network::getSockPort(int sock)
|
|
|
|
{
|
|
|
|
vnc_sockaddr_t sa;
|
|
|
|
socklen_t sa_size = sizeof(sa);
|
|
|
|
if (getsockname(sock, &sa.u.sa, &sa_size) < 0)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
switch (sa.u.sa.sa_family) {
|
|
|
|
case AF_INET6:
|
|
|
|
return ntohs(sa.u.sin6.sin6_port);
|
|
|
|
default:
|
|
|
|
return ntohs(sa.u.sin.sin_port);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
WebSocket::WebSocket(int sock) : Socket(sock)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
char* WebSocket::getPeerAddress() {
|
2020-10-12 13:45:31 +02:00
|
|
|
struct sockaddr_un addr;
|
|
|
|
socklen_t len = sizeof(struct sockaddr_un);
|
|
|
|
if (getpeername(getFd(), (struct sockaddr *) &addr, &len) != 0) {
|
|
|
|
vlog.error("unable to get peer name for socket");
|
|
|
|
return rfb::strDup("websocket");
|
|
|
|
}
|
|
|
|
return rfb::strDup(addr.sun_path + 1);
|
2020-09-20 14:16:44 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
char* WebSocket::getPeerEndpoint() {
|
2020-10-12 13:45:31 +02:00
|
|
|
char buf[1024];
|
|
|
|
sprintf(buf, "%s::websocket", getPeerAddress());
|
|
|
|
|
|
|
|
return rfb::strDup(buf);
|
2020-09-20 14:16:44 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// -=- TcpSocket
|
|
|
|
|
|
|
|
TcpSocket::TcpSocket(int sock) : Socket(sock)
|
|
|
|
{
|
|
|
|
// Disable Nagle's algorithm, to reduce latency
|
|
|
|
enableNagles(false);
|
|
|
|
}
|
|
|
|
|
|
|
|
TcpSocket::TcpSocket(const char *host, int port)
|
|
|
|
{
|
|
|
|
int sock, err, result;
|
|
|
|
struct addrinfo *ai, *current, hints;
|
|
|
|
|
|
|
|
// - Create a socket
|
|
|
|
|
|
|
|
memset(&hints, 0, sizeof(struct addrinfo));
|
|
|
|
hints.ai_family = AF_UNSPEC;
|
|
|
|
hints.ai_socktype = SOCK_STREAM;
|
|
|
|
hints.ai_canonname = NULL;
|
|
|
|
hints.ai_addr = NULL;
|
|
|
|
hints.ai_next = NULL;
|
|
|
|
|
|
|
|
if ((result = getaddrinfo(host, NULL, &hints, &ai)) != 0) {
|
2020-03-10 13:33:01 +01:00
|
|
|
throw GAIException("unable to resolve host by name", result);
|
2020-09-20 14:16:44 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
sock = -1;
|
|
|
|
err = 0;
|
|
|
|
for (current = ai; current != NULL; current = current->ai_next) {
|
|
|
|
int family;
|
|
|
|
vnc_sockaddr_t sa;
|
|
|
|
socklen_t salen;
|
|
|
|
char ntop[NI_MAXHOST];
|
|
|
|
|
|
|
|
family = current->ai_family;
|
|
|
|
|
|
|
|
switch (family) {
|
|
|
|
case AF_INET:
|
|
|
|
if (!UseIPv4)
|
|
|
|
continue;
|
|
|
|
break;
|
|
|
|
case AF_INET6:
|
|
|
|
if (!UseIPv6)
|
|
|
|
continue;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
salen = current->ai_addrlen;
|
|
|
|
memcpy(&sa, current->ai_addr, salen);
|
|
|
|
|
|
|
|
if (family == AF_INET)
|
|
|
|
sa.u.sin.sin_port = htons(port);
|
|
|
|
else
|
|
|
|
sa.u.sin6.sin6_port = htons(port);
|
|
|
|
|
|
|
|
getnameinfo(&sa.u.sa, salen, ntop, sizeof(ntop), NULL, 0, NI_NUMERICHOST);
|
|
|
|
vlog.debug("Connecting to %s [%s] port %d", host, ntop, port);
|
|
|
|
|
|
|
|
sock = socket (family, SOCK_STREAM, 0);
|
|
|
|
if (sock == -1) {
|
|
|
|
err = errorNumber;
|
|
|
|
freeaddrinfo(ai);
|
|
|
|
throw SocketException("unable to create socket", err);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Attempt to connect to the remote host */
|
|
|
|
while ((result = connect(sock, &sa.u.sa, salen)) == -1) {
|
|
|
|
err = errorNumber;
|
|
|
|
#ifndef WIN32
|
|
|
|
if (err == EINTR)
|
|
|
|
continue;
|
|
|
|
#endif
|
|
|
|
vlog.debug("Failed to connect to address %s port %d: %d",
|
|
|
|
ntop, port, err);
|
|
|
|
closesocket(sock);
|
|
|
|
sock = -1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (result == 0)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
freeaddrinfo(ai);
|
|
|
|
|
|
|
|
if (sock == -1) {
|
|
|
|
if (err == 0)
|
|
|
|
throw Exception("No useful address for host");
|
|
|
|
else
|
2020-03-05 09:35:35 +01:00
|
|
|
throw SocketException("unable to connect to socket", err);
|
2020-09-20 14:16:44 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Take proper ownership of the socket
|
|
|
|
setFd(sock);
|
|
|
|
|
|
|
|
// Disable Nagle's algorithm, to reduce latency
|
|
|
|
enableNagles(false);
|
|
|
|
}
|
|
|
|
|
|
|
|
char* TcpSocket::getPeerAddress() {
|
|
|
|
vnc_sockaddr_t sa;
|
|
|
|
socklen_t sa_size = sizeof(sa);
|
|
|
|
|
|
|
|
if (getpeername(getFd(), &sa.u.sa, &sa_size) != 0) {
|
|
|
|
vlog.error("unable to get peer name for socket");
|
|
|
|
return rfb::strDup("");
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sa.u.sa.sa_family == AF_INET6) {
|
|
|
|
char buffer[INET6_ADDRSTRLEN + 2];
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
buffer[0] = '[';
|
|
|
|
|
|
|
|
ret = getnameinfo(&sa.u.sa, sizeof(sa.u.sin6),
|
|
|
|
buffer + 1, sizeof(buffer) - 2, NULL, 0,
|
|
|
|
NI_NUMERICHOST);
|
|
|
|
if (ret != 0) {
|
|
|
|
vlog.error("unable to convert peer name to a string");
|
|
|
|
return rfb::strDup("");
|
|
|
|
}
|
|
|
|
|
|
|
|
strcat(buffer, "]");
|
|
|
|
|
|
|
|
return rfb::strDup(buffer);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sa.u.sa.sa_family == AF_INET) {
|
|
|
|
char *name;
|
|
|
|
|
|
|
|
name = inet_ntoa(sa.u.sin.sin_addr);
|
|
|
|
if (name == NULL) {
|
|
|
|
vlog.error("unable to convert peer name to a string");
|
|
|
|
return rfb::strDup("");
|
|
|
|
}
|
|
|
|
|
|
|
|
return rfb::strDup(name);
|
|
|
|
}
|
|
|
|
|
|
|
|
vlog.error("unknown address family for socket");
|
|
|
|
return rfb::strDup("");
|
|
|
|
}
|
|
|
|
|
|
|
|
char* TcpSocket::getPeerEndpoint() {
|
|
|
|
rfb::CharArray address; address.buf = getPeerAddress();
|
|
|
|
vnc_sockaddr_t sa;
|
|
|
|
socklen_t sa_size = sizeof(sa);
|
|
|
|
int port;
|
|
|
|
|
|
|
|
getpeername(getFd(), &sa.u.sa, &sa_size);
|
|
|
|
|
|
|
|
if (sa.u.sa.sa_family == AF_INET6)
|
|
|
|
port = ntohs(sa.u.sin6.sin6_port);
|
|
|
|
else if (sa.u.sa.sa_family == AF_INET)
|
|
|
|
port = ntohs(sa.u.sin.sin_port);
|
|
|
|
else
|
|
|
|
port = 0;
|
|
|
|
|
|
|
|
int buflen = strlen(address.buf) + 32;
|
|
|
|
char* buffer = new char[buflen];
|
|
|
|
sprintf(buffer, "%s::%d", address.buf, port);
|
|
|
|
return buffer;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool TcpSocket::enableNagles(bool enable) {
|
|
|
|
int one = enable ? 0 : 1;
|
|
|
|
if (setsockopt(getFd(), IPPROTO_TCP, TCP_NODELAY,
|
|
|
|
(char *)&one, sizeof(one)) < 0) {
|
|
|
|
int e = errorNumber;
|
|
|
|
vlog.error("unable to setsockopt TCP_NODELAY: %d", e);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool TcpSocket::cork(bool enable) {
|
|
|
|
#ifndef TCP_CORK
|
|
|
|
return false;
|
|
|
|
#else
|
|
|
|
int one = enable ? 1 : 0;
|
|
|
|
if (setsockopt(getFd(), IPPROTO_TCP, TCP_CORK, (char *)&one, sizeof(one)) < 0)
|
|
|
|
return false;
|
|
|
|
return true;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
TcpListener::TcpListener(int sock) : SocketListener(sock)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
TcpListener::TcpListener(const struct sockaddr *listenaddr,
|
|
|
|
socklen_t listenaddrlen)
|
|
|
|
{
|
|
|
|
int one = 1;
|
|
|
|
vnc_sockaddr_t sa;
|
|
|
|
int sock;
|
|
|
|
|
|
|
|
if ((sock = socket (listenaddr->sa_family, SOCK_STREAM, 0)) < 0)
|
|
|
|
throw SocketException("unable to create listening socket", errorNumber);
|
|
|
|
|
|
|
|
memcpy (&sa, listenaddr, listenaddrlen);
|
|
|
|
#ifdef IPV6_V6ONLY
|
|
|
|
if (listenaddr->sa_family == AF_INET6) {
|
|
|
|
if (setsockopt (sock, IPPROTO_IPV6, IPV6_V6ONLY, (char*)&one, sizeof(one))) {
|
|
|
|
int e = errorNumber;
|
|
|
|
closesocket(sock);
|
|
|
|
throw SocketException("unable to set IPV6_V6ONLY", e);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif /* defined(IPV6_V6ONLY) */
|
|
|
|
|
|
|
|
#ifdef FD_CLOEXEC
|
|
|
|
// - By default, close the socket on exec()
|
|
|
|
fcntl(sock, F_SETFD, FD_CLOEXEC);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
// SO_REUSEADDR is broken on Windows. It allows binding to a port
|
|
|
|
// that already has a listening socket on it. SO_EXCLUSIVEADDRUSE
|
|
|
|
// might do what we want, but requires investigation.
|
|
|
|
#ifndef WIN32
|
|
|
|
if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR,
|
|
|
|
(char *)&one, sizeof(one)) < 0) {
|
|
|
|
int e = errorNumber;
|
|
|
|
closesocket(sock);
|
|
|
|
throw SocketException("unable to create listening socket", e);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if (bind(sock, &sa.u.sa, listenaddrlen) == -1) {
|
|
|
|
int e = errorNumber;
|
|
|
|
closesocket(sock);
|
|
|
|
throw SocketException("failed to bind socket", e);
|
|
|
|
}
|
|
|
|
|
|
|
|
listen(sock);
|
|
|
|
}
|
|
|
|
|
|
|
|
Socket* TcpListener::createSocket(int fd) {
|
|
|
|
return new TcpSocket(fd);
|
|
|
|
}
|
|
|
|
|
|
|
|
void TcpListener::getMyAddresses(std::list<char*>* result) {
|
|
|
|
struct addrinfo *ai, *current, hints;
|
|
|
|
|
|
|
|
initSockets();
|
|
|
|
|
|
|
|
memset(&hints, 0, sizeof(struct addrinfo));
|
|
|
|
hints.ai_flags = AI_PASSIVE | AI_NUMERICSERV;
|
|
|
|
hints.ai_family = AF_UNSPEC;
|
|
|
|
hints.ai_socktype = SOCK_STREAM;
|
|
|
|
hints.ai_canonname = NULL;
|
|
|
|
hints.ai_addr = NULL;
|
|
|
|
hints.ai_next = NULL;
|
|
|
|
|
|
|
|
// Windows doesn't like NULL for service, so specify something
|
|
|
|
if ((getaddrinfo(NULL, "1", &hints, &ai)) != 0)
|
|
|
|
return;
|
|
|
|
|
|
|
|
for (current= ai; current != NULL; current = current->ai_next) {
|
|
|
|
switch (current->ai_family) {
|
|
|
|
case AF_INET:
|
|
|
|
if (!UseIPv4)
|
|
|
|
continue;
|
|
|
|
break;
|
|
|
|
case AF_INET6:
|
|
|
|
if (!UseIPv6)
|
|
|
|
continue;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
char *addr = new char[INET6_ADDRSTRLEN];
|
|
|
|
|
|
|
|
getnameinfo(current->ai_addr, current->ai_addrlen, addr, INET6_ADDRSTRLEN,
|
|
|
|
NULL, 0, NI_NUMERICHOST);
|
|
|
|
|
|
|
|
result->push_back(addr);
|
|
|
|
}
|
|
|
|
|
|
|
|
freeaddrinfo(ai);
|
|
|
|
}
|
|
|
|
|
|
|
|
int TcpListener::getMyPort() {
|
|
|
|
return getSockPort(getFd());
|
|
|
|
}
|
|
|
|
|
|
|
|
extern settings_t settings;
|
|
|
|
|
2021-03-02 14:23:32 +01:00
|
|
|
static uint8_t *screenshotCb(void *messager, uint16_t w, uint16_t h, const uint8_t q,
|
|
|
|
const uint8_t dedup,
|
|
|
|
uint32_t *len, uint8_t *staging)
|
|
|
|
{
|
|
|
|
GetAPIMessager *msgr = (GetAPIMessager *) messager;
|
|
|
|
return msgr->netGetScreenshot(w, h, q, dedup, *len, staging);
|
|
|
|
}
|
|
|
|
|
2021-03-03 13:55:14 +01:00
|
|
|
static uint8_t adduserCb(void *messager, const char name[], const char pw[],
|
2022-01-28 13:24:38 +01:00
|
|
|
const uint8_t read, const uint8_t write, const uint8_t owner)
|
2021-03-03 13:55:14 +01:00
|
|
|
{
|
|
|
|
GetAPIMessager *msgr = (GetAPIMessager *) messager;
|
2022-01-28 13:24:38 +01:00
|
|
|
return msgr->netAddUser(name, pw, read, write, owner);
|
2021-03-03 13:55:14 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static uint8_t removeCb(void *messager, const char name[])
|
|
|
|
{
|
|
|
|
GetAPIMessager *msgr = (GetAPIMessager *) messager;
|
|
|
|
return msgr->netRemoveUser(name);
|
|
|
|
}
|
|
|
|
|
2022-01-17 18:10:24 +01:00
|
|
|
static uint8_t updateUserCb(void *messager, const char name[], const uint64_t mask,
|
2022-01-24 17:42:29 +01:00
|
|
|
const char password[],
|
2022-01-28 13:24:38 +01:00
|
|
|
const uint8_t read, const uint8_t write, const uint8_t owner)
|
2022-01-17 18:10:24 +01:00
|
|
|
{
|
|
|
|
GetAPIMessager *msgr = (GetAPIMessager *) messager;
|
2022-01-28 13:24:38 +01:00
|
|
|
return msgr->netUpdateUser(name, mask, password, read, write, owner);
|
2022-01-17 18:10:24 +01:00
|
|
|
}
|
|
|
|
|
2022-01-24 17:42:29 +01:00
|
|
|
static uint8_t addOrUpdateUserCb(void *messager, const struct kasmpasswd_entry_t *entry)
|
2021-03-03 13:55:14 +01:00
|
|
|
{
|
|
|
|
GetAPIMessager *msgr = (GetAPIMessager *) messager;
|
2022-01-24 17:42:29 +01:00
|
|
|
return msgr->netAddOrUpdateUser(entry);
|
2021-03-03 13:55:14 +01:00
|
|
|
}
|
|
|
|
|
2022-01-17 18:10:24 +01:00
|
|
|
static void getUsersCb(void *messager, const char **ptr)
|
|
|
|
{
|
|
|
|
GetAPIMessager *msgr = (GetAPIMessager *) messager;
|
|
|
|
msgr->netGetUsers(ptr);
|
|
|
|
}
|
|
|
|
|
2021-07-26 17:58:29 +02:00
|
|
|
static void bottleneckStatsCb(void *messager, char *buf, uint32_t len)
|
|
|
|
{
|
|
|
|
GetAPIMessager *msgr = (GetAPIMessager *) messager;
|
|
|
|
msgr->netGetBottleneckStats(buf, len);
|
|
|
|
}
|
|
|
|
|
2021-07-27 14:33:48 +02:00
|
|
|
static void frameStatsCb(void *messager, char *buf, uint32_t len)
|
|
|
|
{
|
|
|
|
GetAPIMessager *msgr = (GetAPIMessager *) messager;
|
|
|
|
msgr->netGetFrameStats(buf, len);
|
|
|
|
}
|
|
|
|
|
2022-01-28 13:24:38 +01:00
|
|
|
static void resetFrameStatsCb(void *messager)
|
|
|
|
{
|
|
|
|
GetAPIMessager *msgr = (GetAPIMessager *) messager;
|
|
|
|
msgr->netResetFrameStatsCall();
|
|
|
|
}
|
|
|
|
|
2021-07-27 14:33:48 +02:00
|
|
|
static uint8_t requestFrameStatsNoneCb(void *messager)
|
|
|
|
{
|
|
|
|
GetAPIMessager *msgr = (GetAPIMessager *) messager;
|
|
|
|
return msgr->netRequestFrameStats(GetAPIMessager::WANT_FRAME_STATS_SERVERONLY, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
static uint8_t requestFrameStatsOwnerCb(void *messager)
|
|
|
|
{
|
|
|
|
GetAPIMessager *msgr = (GetAPIMessager *) messager;
|
|
|
|
return msgr->netRequestFrameStats(GetAPIMessager::WANT_FRAME_STATS_OWNER, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
static uint8_t requestFrameStatsAllCb(void *messager)
|
|
|
|
{
|
|
|
|
GetAPIMessager *msgr = (GetAPIMessager *) messager;
|
|
|
|
return msgr->netRequestFrameStats(GetAPIMessager::WANT_FRAME_STATS_ALL, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
static uint8_t requestFrameStatsOneCb(void *messager, const char *client)
|
|
|
|
{
|
|
|
|
GetAPIMessager *msgr = (GetAPIMessager *) messager;
|
|
|
|
return msgr->netRequestFrameStats(GetAPIMessager::WANT_FRAME_STATS_SPECIFIC, client);
|
|
|
|
}
|
|
|
|
|
|
|
|
static uint8_t ownerConnectedCb(void *messager)
|
|
|
|
{
|
|
|
|
GetAPIMessager *msgr = (GetAPIMessager *) messager;
|
|
|
|
return msgr->netOwnerConnected();
|
|
|
|
}
|
|
|
|
|
|
|
|
static uint8_t numActiveUsersCb(void *messager)
|
|
|
|
{
|
|
|
|
GetAPIMessager *msgr = (GetAPIMessager *) messager;
|
|
|
|
return msgr->netNumActiveUsers();
|
|
|
|
}
|
|
|
|
|
|
|
|
static uint8_t getClientFrameStatsNumCb(void *messager)
|
|
|
|
{
|
|
|
|
GetAPIMessager *msgr = (GetAPIMessager *) messager;
|
|
|
|
return msgr->netGetClientFrameStatsNum();
|
|
|
|
}
|
|
|
|
|
|
|
|
static uint8_t serverFrameStatsReadyCb(void *messager)
|
|
|
|
{
|
|
|
|
GetAPIMessager *msgr = (GetAPIMessager *) messager;
|
|
|
|
return msgr->netServerFrameStatsReady();
|
|
|
|
}
|
|
|
|
|
2022-07-26 12:38:14 +02:00
|
|
|
#if OPENSSL_VERSION_NUMBER < 0x1010000f
|
|
|
|
|
|
|
|
static pthread_mutex_t *sslmutex;
|
|
|
|
|
|
|
|
static void openssl_lock(int mode, int n, const char *, int)
|
|
|
|
{
|
|
|
|
if (mode & CRYPTO_LOCK)
|
|
|
|
pthread_mutex_lock(&sslmutex[n]);
|
|
|
|
else
|
|
|
|
pthread_mutex_unlock(&sslmutex[n]);
|
|
|
|
}
|
|
|
|
|
|
|
|
static unsigned long openssl_id()
|
|
|
|
{
|
|
|
|
return pthread_self();
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
static void openssl_threads() {
|
|
|
|
|
|
|
|
SSL_library_init();
|
|
|
|
OpenSSL_add_all_algorithms();
|
|
|
|
SSL_load_error_strings();
|
|
|
|
ERR_load_BIO_strings();
|
|
|
|
ERR_load_crypto_strings();
|
|
|
|
|
|
|
|
#if OPENSSL_VERSION_NUMBER < 0x1010000f
|
|
|
|
|
|
|
|
sslmutex = (pthread_mutex_t *) calloc(CRYPTO_num_locks(), sizeof(pthread_mutex_t));
|
|
|
|
unsigned i;
|
|
|
|
for (i = 0; i < (unsigned) CRYPTO_num_locks(); i++)
|
|
|
|
pthread_mutex_init(&sslmutex[i], NULL);
|
|
|
|
|
|
|
|
CRYPTO_set_locking_callback(openssl_lock);
|
|
|
|
CRYPTO_set_id_callback(openssl_id);
|
|
|
|
|
|
|
|
#endif
|
|
|
|
}
|
2021-07-26 17:58:29 +02:00
|
|
|
|
2020-09-20 14:16:44 +02:00
|
|
|
WebsocketListener::WebsocketListener(const struct sockaddr *listenaddr,
|
|
|
|
socklen_t listenaddrlen,
|
2021-01-15 12:07:53 +01:00
|
|
|
bool sslonly, const char *cert, const char *certkey,
|
2021-03-25 10:25:30 +01:00
|
|
|
bool disablebasicauth,
|
2020-09-20 14:16:44 +02:00
|
|
|
const char *httpdir)
|
|
|
|
{
|
|
|
|
int one = 1;
|
|
|
|
vnc_sockaddr_t sa;
|
|
|
|
int sock;
|
|
|
|
|
|
|
|
if ((sock = socket (listenaddr->sa_family, SOCK_STREAM, 0)) < 0)
|
|
|
|
throw SocketException("unable to create listening socket", errorNumber);
|
|
|
|
|
|
|
|
memcpy (&sa, listenaddr, listenaddrlen);
|
|
|
|
#ifdef IPV6_V6ONLY
|
|
|
|
if (listenaddr->sa_family == AF_INET6) {
|
|
|
|
if (setsockopt (sock, IPPROTO_IPV6, IPV6_V6ONLY, (char*)&one, sizeof(one))) {
|
|
|
|
int e = errorNumber;
|
|
|
|
closesocket(sock);
|
|
|
|
throw SocketException("unable to set IPV6_V6ONLY", e);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif /* defined(IPV6_V6ONLY) */
|
|
|
|
|
|
|
|
#ifdef FD_CLOEXEC
|
|
|
|
// - By default, close the socket on exec()
|
|
|
|
fcntl(sock, F_SETFD, FD_CLOEXEC);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
// SO_REUSEADDR is broken on Windows. It allows binding to a port
|
|
|
|
// that already has a listening socket on it. SO_EXCLUSIVEADDRUSE
|
|
|
|
// might do what we want, but requires investigation.
|
|
|
|
#ifndef WIN32
|
|
|
|
if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR,
|
|
|
|
(char *)&one, sizeof(one)) < 0) {
|
|
|
|
int e = errorNumber;
|
|
|
|
closesocket(sock);
|
|
|
|
throw SocketException("unable to create listening socket", e);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if (bind(sock, &sa.u.sa, listenaddrlen) == -1) {
|
|
|
|
int e = errorNumber;
|
|
|
|
closesocket(sock);
|
2021-08-13 11:15:17 +02:00
|
|
|
throw SocketException("failed to bind socket, is someone else on our -websocketPort?", e);
|
2020-09-20 14:16:44 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
listen(sock); // sets the internal fd
|
|
|
|
|
|
|
|
//
|
|
|
|
// External TCP socket now created. Create the internal ones
|
|
|
|
//
|
|
|
|
internalSocket = socket(AF_UNIX, SOCK_STREAM, 0);
|
|
|
|
|
2021-08-13 11:15:17 +02:00
|
|
|
char sockname[32];
|
|
|
|
sprintf(sockname, ".KasmVNCSock%u", getpid());
|
|
|
|
|
2020-09-20 14:16:44 +02:00
|
|
|
struct sockaddr_un addr;
|
|
|
|
addr.sun_family = AF_UNIX;
|
2021-08-13 11:15:17 +02:00
|
|
|
strcpy(addr.sun_path, sockname);
|
2020-09-20 14:16:44 +02:00
|
|
|
addr.sun_path[0] = '\0';
|
|
|
|
|
|
|
|
if (bind(internalSocket, (struct sockaddr *) &addr,
|
2021-08-13 11:15:17 +02:00
|
|
|
sizeof(sa_family_t) + strlen(sockname))) {
|
2020-09-20 14:16:44 +02:00
|
|
|
throw SocketException("failed to bind socket", errorNumber);
|
|
|
|
}
|
|
|
|
|
|
|
|
listen(internalSocket);
|
|
|
|
|
2020-10-01 13:37:51 +02:00
|
|
|
settings.passwdfile = NULL;
|
|
|
|
|
|
|
|
wordexp_t wexp;
|
|
|
|
if (!wordexp(rfb::Server::kasmPasswordFile, &wexp, WRDE_NOCMD))
|
|
|
|
settings.passwdfile = strdup(wexp.we_wordv[0]);
|
|
|
|
wordfree(&wexp);
|
|
|
|
|
2021-03-25 10:25:30 +01:00
|
|
|
settings.disablebasicauth = disablebasicauth;
|
2020-09-20 14:16:44 +02:00
|
|
|
settings.cert = cert;
|
2021-01-15 12:07:53 +01:00
|
|
|
settings.key = certkey;
|
2020-09-20 14:16:44 +02:00
|
|
|
settings.ssl_only = sslonly;
|
|
|
|
settings.verbose = vlog.getLevel() >= vlog.LEVEL_DEBUG;
|
|
|
|
settings.httpdir = NULL;
|
|
|
|
if (httpdir && httpdir[0])
|
|
|
|
settings.httpdir = realpath(httpdir, NULL);
|
|
|
|
|
|
|
|
settings.listen_sock = sock;
|
|
|
|
|
2021-03-03 13:55:14 +01:00
|
|
|
settings.messager = messager = new GetAPIMessager(settings.passwdfile);
|
2021-03-02 14:23:32 +01:00
|
|
|
settings.screenshotCb = screenshotCb;
|
2021-03-03 13:55:14 +01:00
|
|
|
settings.adduserCb = adduserCb;
|
|
|
|
settings.removeCb = removeCb;
|
2022-01-17 18:10:24 +01:00
|
|
|
settings.updateUserCb = updateUserCb;
|
2022-01-24 17:42:29 +01:00
|
|
|
settings.addOrUpdateUserCb = addOrUpdateUserCb;
|
2022-01-17 18:10:24 +01:00
|
|
|
settings.getUsersCb = getUsersCb;
|
2021-07-26 17:58:29 +02:00
|
|
|
settings.bottleneckStatsCb = bottleneckStatsCb;
|
2021-07-27 14:33:48 +02:00
|
|
|
settings.frameStatsCb = frameStatsCb;
|
2022-01-28 13:24:38 +01:00
|
|
|
settings.resetFrameStatsCb = resetFrameStatsCb;
|
2021-07-27 14:33:48 +02:00
|
|
|
|
|
|
|
settings.requestFrameStatsNoneCb = requestFrameStatsNoneCb;
|
|
|
|
settings.requestFrameStatsOwnerCb = requestFrameStatsOwnerCb;
|
|
|
|
settings.requestFrameStatsAllCb = requestFrameStatsAllCb;
|
|
|
|
settings.requestFrameStatsOneCb = requestFrameStatsOneCb;
|
|
|
|
|
|
|
|
settings.ownerConnectedCb = ownerConnectedCb;
|
|
|
|
settings.numActiveUsersCb = numActiveUsersCb;
|
|
|
|
settings.getClientFrameStatsNumCb = getClientFrameStatsNumCb;
|
|
|
|
settings.serverFrameStatsReadyCb = serverFrameStatsReadyCb;
|
2021-03-02 14:23:32 +01:00
|
|
|
|
2022-07-26 12:38:14 +02:00
|
|
|
openssl_threads();
|
|
|
|
|
2020-09-20 14:16:44 +02:00
|
|
|
pthread_t tid;
|
|
|
|
pthread_create(&tid, NULL, start_server, NULL);
|
2022-07-26 12:38:14 +02:00
|
|
|
|
|
|
|
uint16_t *nport = (uint16_t *) calloc(1, sizeof(uint16_t));
|
2022-08-01 16:44:26 +02:00
|
|
|
if (rfb::Server::udpPort)
|
|
|
|
*nport = rfb::Server::udpPort;
|
|
|
|
else
|
|
|
|
*nport = ntohs(sa.u.sin.sin_port);
|
2022-07-26 12:38:14 +02:00
|
|
|
pthread_create(&tid, NULL, udpserver, nport);
|
2020-09-20 14:16:44 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
Socket* WebsocketListener::createSocket(int fd) {
|
|
|
|
return new WebSocket(fd);
|
|
|
|
}
|
|
|
|
|
|
|
|
void WebsocketListener::getMyAddresses(std::list<char*>* result) {
|
|
|
|
struct addrinfo *ai, *current, hints;
|
|
|
|
|
|
|
|
initSockets();
|
|
|
|
|
|
|
|
memset(&hints, 0, sizeof(struct addrinfo));
|
|
|
|
hints.ai_flags = AI_PASSIVE | AI_NUMERICSERV;
|
|
|
|
hints.ai_family = AF_UNSPEC;
|
|
|
|
hints.ai_socktype = SOCK_STREAM;
|
|
|
|
hints.ai_canonname = NULL;
|
|
|
|
hints.ai_addr = NULL;
|
|
|
|
hints.ai_next = NULL;
|
|
|
|
|
|
|
|
// Windows doesn't like NULL for service, so specify something
|
|
|
|
if ((getaddrinfo(NULL, "1", &hints, &ai)) != 0)
|
|
|
|
return;
|
|
|
|
|
|
|
|
for (current= ai; current != NULL; current = current->ai_next) {
|
|
|
|
switch (current->ai_family) {
|
|
|
|
case AF_INET:
|
|
|
|
if (!UseIPv4)
|
|
|
|
continue;
|
|
|
|
break;
|
|
|
|
case AF_INET6:
|
|
|
|
if (!UseIPv6)
|
|
|
|
continue;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
char *addr = new char[INET6_ADDRSTRLEN];
|
|
|
|
|
|
|
|
getnameinfo(current->ai_addr, current->ai_addrlen, addr, INET6_ADDRSTRLEN,
|
|
|
|
NULL, 0, NI_NUMERICHOST);
|
|
|
|
|
|
|
|
result->push_back(addr);
|
|
|
|
}
|
|
|
|
|
|
|
|
freeaddrinfo(ai);
|
|
|
|
}
|
|
|
|
|
|
|
|
int WebsocketListener::getMyPort() {
|
|
|
|
return getSockPort(getFd());
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void network::createLocalTcpListeners(std::list<SocketListener*> *listeners,
|
|
|
|
int port)
|
|
|
|
{
|
|
|
|
struct addrinfo ai[2];
|
|
|
|
vnc_sockaddr_t sa[2];
|
|
|
|
|
|
|
|
memset(ai, 0, sizeof(ai));
|
|
|
|
memset(sa, 0, sizeof(sa));
|
|
|
|
|
|
|
|
sa[0].u.sin.sin_family = AF_INET;
|
|
|
|
sa[0].u.sin.sin_port = htons (port);
|
|
|
|
sa[0].u.sin.sin_addr.s_addr = htonl (INADDR_LOOPBACK);
|
|
|
|
|
|
|
|
ai[0].ai_family = sa[0].u.sin.sin_family;
|
|
|
|
ai[0].ai_addr = &sa[0].u.sa;
|
|
|
|
ai[0].ai_addrlen = sizeof(sa[0].u.sin);
|
|
|
|
ai[0].ai_next = &ai[1];
|
|
|
|
|
|
|
|
sa[1].u.sin6.sin6_family = AF_INET6;
|
|
|
|
sa[1].u.sin6.sin6_port = htons (port);
|
|
|
|
sa[1].u.sin6.sin6_addr = in6addr_loopback;
|
|
|
|
|
|
|
|
ai[1].ai_family = sa[1].u.sin6.sin6_family;
|
|
|
|
ai[1].ai_addr = &sa[1].u.sa;
|
|
|
|
ai[1].ai_addrlen = sizeof(sa[1].u.sin6);
|
|
|
|
ai[1].ai_next = NULL;
|
|
|
|
|
|
|
|
createTcpListeners(listeners, ai);
|
|
|
|
}
|
|
|
|
|
|
|
|
void network::createTcpListeners(std::list<SocketListener*> *listeners,
|
|
|
|
const char *addr,
|
|
|
|
int port)
|
|
|
|
{
|
|
|
|
struct addrinfo *ai, hints;
|
|
|
|
char service[16];
|
|
|
|
int result;
|
|
|
|
|
|
|
|
initSockets();
|
|
|
|
|
|
|
|
memset(&hints, 0, sizeof(struct addrinfo));
|
|
|
|
hints.ai_flags = AI_PASSIVE | AI_NUMERICSERV;
|
|
|
|
hints.ai_family = AF_UNSPEC;
|
|
|
|
hints.ai_socktype = SOCK_STREAM;
|
|
|
|
hints.ai_canonname = NULL;
|
|
|
|
hints.ai_addr = NULL;
|
|
|
|
hints.ai_next = NULL;
|
|
|
|
|
|
|
|
snprintf (service, sizeof (service) - 1, "%d", port);
|
|
|
|
service[sizeof (service) - 1] = '\0';
|
|
|
|
if ((result = getaddrinfo(addr, service, &hints, &ai)) != 0)
|
2020-03-10 13:33:01 +01:00
|
|
|
throw GAIException("unable to resolve listening address", result);
|
2020-09-20 14:16:44 +02:00
|
|
|
|
|
|
|
try {
|
|
|
|
createTcpListeners(listeners, ai);
|
|
|
|
} catch(...) {
|
|
|
|
freeaddrinfo(ai);
|
|
|
|
throw;
|
|
|
|
}
|
2020-08-17 14:02:28 +02:00
|
|
|
|
|
|
|
freeaddrinfo(ai);
|
2020-09-20 14:16:44 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void network::createTcpListeners(std::list<SocketListener*> *listeners,
|
|
|
|
const struct addrinfo *ai)
|
|
|
|
{
|
|
|
|
const struct addrinfo *current;
|
|
|
|
std::list<SocketListener*> new_listeners;
|
|
|
|
|
|
|
|
initSockets();
|
|
|
|
|
|
|
|
for (current = ai; current != NULL; current = current->ai_next) {
|
|
|
|
switch (current->ai_family) {
|
|
|
|
case AF_INET:
|
|
|
|
if (!UseIPv4)
|
|
|
|
continue;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case AF_INET6:
|
|
|
|
if (!UseIPv6)
|
|
|
|
continue;
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
new_listeners.push_back(new TcpListener(current->ai_addr,
|
|
|
|
current->ai_addrlen));
|
|
|
|
} catch (SocketException& e) {
|
|
|
|
// Ignore this if it is due to lack of address family support on
|
|
|
|
// the interface or on the system
|
|
|
|
if (e.err != EADDRNOTAVAIL && e.err != EAFNOSUPPORT) {
|
|
|
|
// Otherwise, report the error
|
|
|
|
while (!new_listeners.empty()) {
|
|
|
|
delete new_listeners.back();
|
|
|
|
new_listeners.pop_back();
|
|
|
|
}
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (new_listeners.empty ())
|
|
|
|
throw SocketException("createTcpListeners: no addresses available",
|
|
|
|
EADDRNOTAVAIL);
|
|
|
|
|
|
|
|
listeners->splice (listeners->end(), new_listeners);
|
|
|
|
}
|
|
|
|
|
|
|
|
void network::createWebsocketListeners(std::list<SocketListener*> *listeners,
|
|
|
|
const struct addrinfo *ai,
|
2021-01-15 12:07:53 +01:00
|
|
|
bool sslonly, const char *cert, const char *certkey,
|
2021-03-25 10:25:30 +01:00
|
|
|
bool disablebasicauth,
|
2020-09-20 14:16:44 +02:00
|
|
|
const char *httpdir)
|
|
|
|
{
|
|
|
|
const struct addrinfo *current;
|
|
|
|
std::list<SocketListener*> new_listeners;
|
|
|
|
|
|
|
|
initSockets();
|
|
|
|
|
|
|
|
for (current = ai; current != NULL; current = current->ai_next) {
|
|
|
|
switch (current->ai_family) {
|
|
|
|
case AF_INET:
|
|
|
|
if (!UseIPv4)
|
|
|
|
continue;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case AF_INET6:
|
|
|
|
if (!UseIPv6)
|
|
|
|
continue;
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
new_listeners.push_back(new WebsocketListener(current->ai_addr,
|
|
|
|
current->ai_addrlen,
|
2021-03-25 10:25:30 +01:00
|
|
|
sslonly, cert, certkey, disablebasicauth,
|
2020-09-20 14:16:44 +02:00
|
|
|
httpdir));
|
|
|
|
} catch (SocketException& e) {
|
|
|
|
// Ignore this if it is due to lack of address family support on
|
|
|
|
// the interface or on the system
|
|
|
|
if (e.err != EADDRNOTAVAIL && e.err != EAFNOSUPPORT) {
|
|
|
|
// Otherwise, report the error
|
|
|
|
while (!new_listeners.empty()) {
|
|
|
|
delete new_listeners.back();
|
|
|
|
new_listeners.pop_back();
|
|
|
|
}
|
|
|
|
throw;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (new_listeners.empty ())
|
|
|
|
throw SocketException("createWebsocketListeners: no addresses available",
|
|
|
|
EADDRNOTAVAIL);
|
|
|
|
|
|
|
|
listeners->splice (listeners->end(), new_listeners);
|
|
|
|
}
|
|
|
|
|
|
|
|
void network::createWebsocketListeners(std::list<SocketListener*> *listeners,
|
|
|
|
int port,
|
|
|
|
const char *addr,
|
|
|
|
bool sslonly,
|
|
|
|
const char *cert,
|
2021-01-15 12:07:53 +01:00
|
|
|
const char *certkey,
|
2021-03-25 10:25:30 +01:00
|
|
|
bool disablebasicauth,
|
2020-09-20 14:16:44 +02:00
|
|
|
const char *httpdir)
|
|
|
|
{
|
|
|
|
if (addr && !strcmp(addr, "local")) {
|
|
|
|
struct addrinfo ai[2];
|
|
|
|
vnc_sockaddr_t sa[2];
|
|
|
|
|
|
|
|
memset(ai, 0, sizeof(ai));
|
|
|
|
memset(sa, 0, sizeof(sa));
|
|
|
|
|
|
|
|
sa[0].u.sin.sin_family = AF_INET;
|
|
|
|
sa[0].u.sin.sin_port = htons (port);
|
|
|
|
sa[0].u.sin.sin_addr.s_addr = htonl (INADDR_LOOPBACK);
|
|
|
|
|
|
|
|
ai[0].ai_family = sa[0].u.sin.sin_family;
|
|
|
|
ai[0].ai_addr = &sa[0].u.sa;
|
|
|
|
ai[0].ai_addrlen = sizeof(sa[0].u.sin);
|
|
|
|
ai[0].ai_next = &ai[1];
|
|
|
|
|
|
|
|
sa[1].u.sin6.sin6_family = AF_INET6;
|
|
|
|
sa[1].u.sin6.sin6_port = htons (port);
|
|
|
|
sa[1].u.sin6.sin6_addr = in6addr_loopback;
|
|
|
|
|
|
|
|
ai[1].ai_family = sa[1].u.sin6.sin6_family;
|
|
|
|
ai[1].ai_addr = &sa[1].u.sa;
|
|
|
|
ai[1].ai_addrlen = sizeof(sa[1].u.sin6);
|
|
|
|
ai[1].ai_next = NULL;
|
|
|
|
|
2021-03-25 10:25:30 +01:00
|
|
|
createWebsocketListeners(listeners, ai, sslonly, cert, certkey, disablebasicauth, httpdir);
|
2020-09-20 14:16:44 +02:00
|
|
|
} else {
|
|
|
|
struct addrinfo *ai, hints;
|
|
|
|
char service[16];
|
|
|
|
int result;
|
|
|
|
|
|
|
|
initSockets();
|
|
|
|
|
|
|
|
memset(&hints, 0, sizeof(struct addrinfo));
|
|
|
|
hints.ai_flags = AI_PASSIVE | AI_NUMERICSERV;
|
|
|
|
hints.ai_family = AF_UNSPEC;
|
|
|
|
hints.ai_socktype = SOCK_STREAM;
|
|
|
|
hints.ai_canonname = NULL;
|
|
|
|
hints.ai_addr = NULL;
|
|
|
|
hints.ai_next = NULL;
|
|
|
|
|
|
|
|
snprintf (service, sizeof (service) - 1, "%d", port);
|
|
|
|
service[sizeof (service) - 1] = '\0';
|
|
|
|
if ((result = getaddrinfo(addr, service, &hints, &ai)) != 0)
|
|
|
|
throw rdr::Exception("unable to resolve listening address: %s",
|
|
|
|
gai_strerror(result));
|
|
|
|
|
|
|
|
try {
|
2021-03-25 10:25:30 +01:00
|
|
|
createWebsocketListeners(listeners, ai, sslonly, cert, certkey, disablebasicauth, httpdir);
|
2020-09-20 14:16:44 +02:00
|
|
|
} catch(...) {
|
|
|
|
freeaddrinfo(ai);
|
|
|
|
throw;
|
|
|
|
}
|
2022-06-24 19:27:33 +02:00
|
|
|
|
|
|
|
freeaddrinfo(ai);
|
2020-09-20 14:16:44 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
TcpFilter::TcpFilter(const char* spec) {
|
|
|
|
rfb::CharArray tmp;
|
|
|
|
tmp.buf = rfb::strDup(spec);
|
|
|
|
while (tmp.buf) {
|
|
|
|
rfb::CharArray first;
|
|
|
|
rfb::strSplit(tmp.buf, ',', &first.buf, &tmp.buf);
|
|
|
|
if (strlen(first.buf))
|
|
|
|
filter.push_back(parsePattern(first.buf));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
TcpFilter::~TcpFilter() {
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static bool
|
|
|
|
patternMatchIP(const TcpFilter::Pattern& pattern, vnc_sockaddr_t *sa) {
|
|
|
|
switch (pattern.address.u.sa.sa_family) {
|
|
|
|
unsigned long address;
|
|
|
|
|
|
|
|
case AF_INET:
|
|
|
|
if (sa->u.sa.sa_family != AF_INET)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
address = sa->u.sin.sin_addr.s_addr;
|
|
|
|
if (address == htonl (INADDR_NONE)) return false;
|
|
|
|
return ((pattern.address.u.sin.sin_addr.s_addr &
|
|
|
|
pattern.mask.u.sin.sin_addr.s_addr) ==
|
|
|
|
(address & pattern.mask.u.sin.sin_addr.s_addr));
|
|
|
|
|
|
|
|
case AF_INET6:
|
|
|
|
if (sa->u.sa.sa_family != AF_INET6)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
for (unsigned int n = 0; n < 16; n++) {
|
|
|
|
unsigned int bits = (n + 1) * 8;
|
|
|
|
unsigned int mask;
|
|
|
|
if (pattern.prefixlen > bits)
|
|
|
|
mask = 0xff;
|
|
|
|
else {
|
|
|
|
unsigned int lastbits = 0xff;
|
|
|
|
lastbits <<= bits - pattern.prefixlen;
|
|
|
|
mask = lastbits & 0xff;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((pattern.address.u.sin6.sin6_addr.s6_addr[n] & mask) !=
|
|
|
|
(sa->u.sin6.sin6_addr.s6_addr[n] & mask))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if (mask < 0xff)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
|
|
|
|
case AF_UNSPEC:
|
|
|
|
// Any address matches
|
|
|
|
return true;
|
|
|
|
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
TcpFilter::verifyConnection(Socket* s) {
|
|
|
|
rfb::CharArray name;
|
|
|
|
vnc_sockaddr_t sa;
|
|
|
|
socklen_t sa_size = sizeof(sa);
|
|
|
|
|
|
|
|
if (getpeername(s->getFd(), &sa.u.sa, &sa_size) != 0)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
name.buf = s->getPeerAddress();
|
|
|
|
std::list<TcpFilter::Pattern>::iterator i;
|
|
|
|
for (i=filter.begin(); i!=filter.end(); i++) {
|
|
|
|
if (patternMatchIP(*i, &sa)) {
|
|
|
|
switch ((*i).action) {
|
|
|
|
case Accept:
|
|
|
|
vlog.debug("ACCEPT %s", name.buf);
|
|
|
|
return true;
|
|
|
|
case Query:
|
|
|
|
vlog.debug("QUERY %s", name.buf);
|
|
|
|
s->setRequiresQuery();
|
|
|
|
return true;
|
|
|
|
case Reject:
|
|
|
|
vlog.debug("REJECT %s", name.buf);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
vlog.debug("[REJECT] %s", name.buf);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
TcpFilter::Pattern TcpFilter::parsePattern(const char* p) {
|
|
|
|
TcpFilter::Pattern pattern;
|
|
|
|
|
|
|
|
rfb::CharArray addr, pref;
|
|
|
|
bool prefix_specified;
|
|
|
|
int family;
|
|
|
|
|
|
|
|
initSockets();
|
|
|
|
|
|
|
|
prefix_specified = rfb::strSplit(&p[1], '/', &addr.buf, &pref.buf);
|
|
|
|
if (addr.buf[0] == '\0') {
|
|
|
|
// Match any address
|
|
|
|
memset (&pattern.address, 0, sizeof (pattern.address));
|
|
|
|
pattern.address.u.sa.sa_family = AF_UNSPEC;
|
|
|
|
pattern.prefixlen = 0;
|
|
|
|
} else {
|
|
|
|
struct addrinfo hints;
|
|
|
|
struct addrinfo *ai;
|
|
|
|
char *p = addr.buf;
|
|
|
|
int result;
|
|
|
|
memset (&hints, 0, sizeof (hints));
|
|
|
|
hints.ai_family = AF_UNSPEC;
|
|
|
|
hints.ai_flags = AI_NUMERICHOST;
|
|
|
|
|
|
|
|
// Take out brackets, if present
|
|
|
|
if (*p == '[') {
|
|
|
|
size_t len;
|
|
|
|
p++;
|
|
|
|
len = strlen (p);
|
|
|
|
if (len > 0 && p[len - 1] == ']')
|
|
|
|
p[len - 1] = '\0';
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((result = getaddrinfo (p, NULL, &hints, &ai)) != 0) {
|
2020-03-10 13:33:01 +01:00
|
|
|
throw GAIException("unable to resolve host by name", result);
|
2020-09-20 14:16:44 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
memcpy (&pattern.address.u.sa, ai->ai_addr, ai->ai_addrlen);
|
|
|
|
freeaddrinfo (ai);
|
|
|
|
|
|
|
|
family = pattern.address.u.sa.sa_family;
|
|
|
|
|
|
|
|
if (prefix_specified) {
|
|
|
|
if (family == AF_INET &&
|
|
|
|
rfb::strContains(pref.buf, '.')) {
|
|
|
|
throw Exception("mask no longer supported for filter, "
|
|
|
|
"use prefix instead");
|
|
|
|
}
|
|
|
|
|
|
|
|
pattern.prefixlen = (unsigned int) atoi(pref.buf);
|
|
|
|
} else {
|
|
|
|
switch (family) {
|
|
|
|
case AF_INET:
|
|
|
|
pattern.prefixlen = 32;
|
|
|
|
break;
|
|
|
|
case AF_INET6:
|
|
|
|
pattern.prefixlen = 128;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
throw Exception("unknown address family");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
family = pattern.address.u.sa.sa_family;
|
|
|
|
|
|
|
|
if (pattern.prefixlen > (family == AF_INET ? 32: 128))
|
|
|
|
throw Exception("invalid prefix length for filter address: %u",
|
|
|
|
pattern.prefixlen);
|
|
|
|
|
|
|
|
// Compute mask from address and prefix length
|
|
|
|
memset (&pattern.mask, 0, sizeof (pattern.mask));
|
|
|
|
switch (family) {
|
|
|
|
unsigned long mask;
|
|
|
|
case AF_INET:
|
|
|
|
mask = 0;
|
|
|
|
for (unsigned int i=0; i<pattern.prefixlen; i++)
|
|
|
|
mask |= 1<<(31-i);
|
|
|
|
pattern.mask.u.sin.sin_addr.s_addr = htonl(mask);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case AF_INET6:
|
|
|
|
for (unsigned int n = 0; n < 16; n++) {
|
|
|
|
unsigned int bits = (n + 1) * 8;
|
|
|
|
if (pattern.prefixlen > bits)
|
|
|
|
pattern.mask.u.sin6.sin6_addr.s6_addr[n] = 0xff;
|
|
|
|
else {
|
|
|
|
unsigned int lastbits = 0xff;
|
|
|
|
lastbits <<= bits - pattern.prefixlen;
|
|
|
|
pattern.mask.u.sin6.sin6_addr.s6_addr[n] = lastbits & 0xff;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case AF_UNSPEC:
|
|
|
|
// No mask to compute
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
; /* not reached */
|
|
|
|
}
|
|
|
|
|
|
|
|
switch(p[0]) {
|
|
|
|
case '+': pattern.action = TcpFilter::Accept; break;
|
|
|
|
case '-': pattern.action = TcpFilter::Reject; break;
|
|
|
|
case '?': pattern.action = TcpFilter::Query; break;
|
|
|
|
};
|
|
|
|
|
|
|
|
return pattern;
|
|
|
|
}
|
|
|
|
|
|
|
|
char* TcpFilter::patternToStr(const TcpFilter::Pattern& p) {
|
|
|
|
rfb::CharArray addr;
|
|
|
|
char buffer[INET6_ADDRSTRLEN + 2];
|
|
|
|
|
|
|
|
if (p.address.u.sa.sa_family == AF_INET) {
|
|
|
|
getnameinfo(&p.address.u.sa, sizeof(p.address.u.sin),
|
|
|
|
buffer, sizeof (buffer), NULL, 0, NI_NUMERICHOST);
|
|
|
|
addr.buf = rfb::strDup(buffer);
|
|
|
|
} else if (p.address.u.sa.sa_family == AF_INET6) {
|
|
|
|
buffer[0] = '[';
|
|
|
|
getnameinfo(&p.address.u.sa, sizeof(p.address.u.sin6),
|
|
|
|
buffer + 1, sizeof (buffer) - 2, NULL, 0, NI_NUMERICHOST);
|
|
|
|
strcat(buffer, "]");
|
|
|
|
addr.buf = rfb::strDup(buffer);
|
|
|
|
} else if (p.address.u.sa.sa_family == AF_UNSPEC)
|
|
|
|
addr.buf = rfb::strDup("");
|
|
|
|
|
|
|
|
char action;
|
|
|
|
switch (p.action) {
|
|
|
|
case Accept: action = '+'; break;
|
|
|
|
case Reject: action = '-'; break;
|
|
|
|
default:
|
|
|
|
case Query: action = '?'; break;
|
|
|
|
};
|
|
|
|
size_t resultlen = (1 // action
|
|
|
|
+ strlen (addr.buf) // address
|
|
|
|
+ 1 // slash
|
|
|
|
+ 3 // prefix length, max 128
|
|
|
|
+ 1); // terminating nul
|
|
|
|
char* result = new char[resultlen];
|
|
|
|
if (addr.buf[0] == '\0')
|
|
|
|
snprintf(result, resultlen, "%c", action);
|
|
|
|
else
|
|
|
|
snprintf(result, resultlen, "%c%s/%u", action, addr.buf, p.prefixlen);
|
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|