KasmVNC/common/rfb/Security.cxx

215 lines
6.0 KiB
C++
Raw Normal View History

2020-09-20 14:16:44 +02:00
/* Copyright (C) 2002-2005 RealVNC Ltd. All Rights Reserved.
* Copyright (C) 2010 TigerVNC Team
*
* This is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This software is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this software; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307,
* USA.
*/
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif
#include <assert.h>
#include <stdlib.h>
#include <string.h>
#include <rfb/CSecurityNone.h>
#include <rfb/CSecurityStack.h>
#include <rfb/CSecurityVeNCrypt.h>
#include <rfb/CSecurityVncAuth.h>
#include <rfb/CSecurityPlain.h>
#include <rdr/Exception.h>
#include <rfb/LogWriter.h>
#include <rfb/Security.h>
#include <rfb/SSecurityNone.h>
#include <rfb/SSecurityStack.h>
#include <rfb/SSecurityPlain.h>
#include <rfb/SSecurityVncAuth.h>
#include <rfb/SSecurityVeNCrypt.h>
#ifdef HAVE_GNUTLS
#include <rfb/CSecurityTLS.h>
#include <rfb/SSecurityTLS.h>
#endif
#include <rfb/util.h>
using namespace rdr;
using namespace rfb;
using namespace std;
static LogWriter vlog("Security");
#ifdef HAVE_GNUTLS
StringParameter Security::GnuTLSPriority("GnuTLSPriority",
"GnuTLS priority string that controls the TLS sessions handshake algorithms",
"NORMAL");
#endif
Security::Security()
{
}
Security::Security(StringParameter &secTypes)
{
char *secTypesStr;
secTypesStr = secTypes.getData();
enabledSecTypes = parseSecTypes(secTypesStr);
delete [] secTypesStr;
}
const std::list<rdr::U8> Security::GetEnabledSecTypes(void)
{
list<rdr::U8> result;
list<U32>::iterator i;
/* Partial workaround for Vino's stupid behaviour. It doesn't allow
* the basic authentication types as part of the VeNCrypt handshake,
* making it impossible for a client to do opportunistic encryption.
* At least make it possible to connect when encryption is explicitly
* disabled. */
for (i = enabledSecTypes.begin(); i != enabledSecTypes.end(); i++) {
if (*i >= 0x100) {
result.push_back(secTypeVeNCrypt);
break;
}
}
for (i = enabledSecTypes.begin(); i != enabledSecTypes.end(); i++)
if (*i < 0x100)
result.push_back(*i);
return result;
}
const std::list<rdr::U32> Security::GetEnabledExtSecTypes(void)
{
list<rdr::U32> result;
list<U32>::iterator i;
for (i = enabledSecTypes.begin(); i != enabledSecTypes.end(); i++)
if (*i != secTypeVeNCrypt) /* Do not include VeNCrypt type to avoid loops */
result.push_back(*i);
return result;
}
void Security::EnableSecType(U32 secType)
{
list<U32>::iterator i;
for (i = enabledSecTypes.begin(); i != enabledSecTypes.end(); i++)
if (*i == secType)
return;
enabledSecTypes.push_back(secType);
}
bool Security::IsSupported(U32 secType)
{
list<U32>::iterator i;
for (i = enabledSecTypes.begin(); i != enabledSecTypes.end(); i++)
if (*i == secType)
return true;
if (secType == secTypeVeNCrypt)
return true;
return false;
}
char *Security::ToString(void)
{
list<U32>::iterator i;
static char out[128]; /* Should be enough */
bool firstpass = true;
const char *name;
memset(out, 0, sizeof(out));
for (i = enabledSecTypes.begin(); i != enabledSecTypes.end(); i++) {
name = secTypeName(*i);
if (name[0] == '[') /* Unknown security type */
continue;
if (!firstpass)
strncat(out, ",", sizeof(out) - 1);
else
firstpass = false;
strncat(out, name, sizeof(out) - 1);
}
return out;
}
rdr::U32 rfb::secTypeNum(const char* name)
{
if (strcasecmp(name, "None") == 0) return secTypeNone;
if (strcasecmp(name, "VncAuth") == 0) return secTypeVncAuth;
if (strcasecmp(name, "Tight") == 0) return secTypeTight;
if (strcasecmp(name, "RA2") == 0) return secTypeRA2;
if (strcasecmp(name, "RA2ne") == 0) return secTypeRA2ne;
if (strcasecmp(name, "SSPI") == 0) return secTypeSSPI;
if (strcasecmp(name, "SSPIne") == 0) return secTypeSSPIne;
if (strcasecmp(name, "VeNCrypt") == 0) return secTypeVeNCrypt;
/* VeNCrypt subtypes */
if (strcasecmp(name, "Plain") == 0) return secTypePlain;
if (strcasecmp(name, "TLSNone") == 0) return secTypeTLSNone;
if (strcasecmp(name, "TLSVnc") == 0) return secTypeTLSVnc;
if (strcasecmp(name, "TLSPlain") == 0) return secTypeTLSPlain;
if (strcasecmp(name, "X509None") == 0) return secTypeX509None;
if (strcasecmp(name, "X509Vnc") == 0) return secTypeX509Vnc;
if (strcasecmp(name, "X509Plain") == 0) return secTypeX509Plain;
return secTypeInvalid;
}
const char* rfb::secTypeName(rdr::U32 num)
{
switch (num) {
case secTypeNone: return "None";
case secTypeVncAuth: return "VncAuth";
case secTypeTight: return "Tight";
case secTypeRA2: return "RA2";
case secTypeRA2ne: return "RA2ne";
case secTypeSSPI: return "SSPI";
case secTypeSSPIne: return "SSPIne";
case secTypeVeNCrypt: return "VeNCrypt";
/* VeNCrypt subtypes */
case secTypePlain: return "Plain";
case secTypeTLSNone: return "TLSNone";
case secTypeTLSVnc: return "TLSVnc";
case secTypeTLSPlain: return "TLSPlain";
case secTypeX509None: return "X509None";
case secTypeX509Vnc: return "X509Vnc";
case secTypeX509Plain: return "X509Plain";
default: return "[unknown secType]";
}
}
std::list<rdr::U32> rfb::parseSecTypes(const char* types_)
{
std::list<rdr::U32> result;
CharArray types(strDup(types_)), type;
while (types.buf) {
strSplit(types.buf, ',', &type.buf, &types.buf);
rdr::U32 typeNum = secTypeNum(type.buf);
if (typeNum != secTypeInvalid)
result.push_back(typeNum);
}
return result;
}