/* Copyright (C) 2002-2005 RealVNC Ltd. All Rights Reserved. * Copyright (C) 2010 TigerVNC Team * * This is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This software is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this software; if not, write to the Free Software * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, * USA. */ #ifdef HAVE_CONFIG_H #include #endif #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #ifdef HAVE_GNUTLS #include #include #endif #include using namespace rdr; using namespace rfb; using namespace std; static LogWriter vlog("Security"); #ifdef HAVE_GNUTLS StringParameter Security::GnuTLSPriority("GnuTLSPriority", "GnuTLS priority string that controls the TLS session’s handshake algorithms", "NORMAL"); #endif Security::Security() { } Security::Security(StringParameter &secTypes) { char *secTypesStr; secTypesStr = secTypes.getData(); enabledSecTypes = parseSecTypes(secTypesStr); delete [] secTypesStr; } const std::list Security::GetEnabledSecTypes(void) { list result; list::iterator i; /* Partial workaround for Vino's stupid behaviour. It doesn't allow * the basic authentication types as part of the VeNCrypt handshake, * making it impossible for a client to do opportunistic encryption. * At least make it possible to connect when encryption is explicitly * disabled. */ for (i = enabledSecTypes.begin(); i != enabledSecTypes.end(); i++) { if (*i >= 0x100) { result.push_back(secTypeVeNCrypt); break; } } for (i = enabledSecTypes.begin(); i != enabledSecTypes.end(); i++) if (*i < 0x100) result.push_back(*i); return result; } const std::list Security::GetEnabledExtSecTypes(void) { list result; list::iterator i; for (i = enabledSecTypes.begin(); i != enabledSecTypes.end(); i++) if (*i != secTypeVeNCrypt) /* Do not include VeNCrypt type to avoid loops */ result.push_back(*i); return result; } void Security::EnableSecType(U32 secType) { list::iterator i; for (i = enabledSecTypes.begin(); i != enabledSecTypes.end(); i++) if (*i == secType) return; enabledSecTypes.push_back(secType); } bool Security::IsSupported(U32 secType) { list::iterator i; for (i = enabledSecTypes.begin(); i != enabledSecTypes.end(); i++) if (*i == secType) return true; if (secType == secTypeVeNCrypt) return true; return false; } char *Security::ToString(void) { list::iterator i; static char out[128]; /* Should be enough */ bool firstpass = true; const char *name; memset(out, 0, sizeof(out)); for (i = enabledSecTypes.begin(); i != enabledSecTypes.end(); i++) { name = secTypeName(*i); if (name[0] == '[') /* Unknown security type */ continue; if (!firstpass) strncat(out, ",", sizeof(out) - 1); else firstpass = false; strncat(out, name, sizeof(out) - 1); } return out; } rdr::U32 rfb::secTypeNum(const char* name) { if (strcasecmp(name, "None") == 0) return secTypeNone; if (strcasecmp(name, "VncAuth") == 0) return secTypeVncAuth; if (strcasecmp(name, "Tight") == 0) return secTypeTight; if (strcasecmp(name, "RA2") == 0) return secTypeRA2; if (strcasecmp(name, "RA2ne") == 0) return secTypeRA2ne; if (strcasecmp(name, "SSPI") == 0) return secTypeSSPI; if (strcasecmp(name, "SSPIne") == 0) return secTypeSSPIne; if (strcasecmp(name, "VeNCrypt") == 0) return secTypeVeNCrypt; /* VeNCrypt subtypes */ if (strcasecmp(name, "Plain") == 0) return secTypePlain; if (strcasecmp(name, "TLSNone") == 0) return secTypeTLSNone; if (strcasecmp(name, "TLSVnc") == 0) return secTypeTLSVnc; if (strcasecmp(name, "TLSPlain") == 0) return secTypeTLSPlain; if (strcasecmp(name, "X509None") == 0) return secTypeX509None; if (strcasecmp(name, "X509Vnc") == 0) return secTypeX509Vnc; if (strcasecmp(name, "X509Plain") == 0) return secTypeX509Plain; return secTypeInvalid; } const char* rfb::secTypeName(rdr::U32 num) { switch (num) { case secTypeNone: return "None"; case secTypeVncAuth: return "VncAuth"; case secTypeTight: return "Tight"; case secTypeRA2: return "RA2"; case secTypeRA2ne: return "RA2ne"; case secTypeSSPI: return "SSPI"; case secTypeSSPIne: return "SSPIne"; case secTypeVeNCrypt: return "VeNCrypt"; /* VeNCrypt subtypes */ case secTypePlain: return "Plain"; case secTypeTLSNone: return "TLSNone"; case secTypeTLSVnc: return "TLSVnc"; case secTypeTLSPlain: return "TLSPlain"; case secTypeX509None: return "X509None"; case secTypeX509Vnc: return "X509Vnc"; case secTypeX509Plain: return "X509Plain"; default: return "[unknown secType]"; } } std::list rfb::parseSecTypes(const char* types_) { std::list result; CharArray types(strDup(types_)), type; while (types.buf) { strSplit(types.buf, ',', &type.buf, &types.buf); rdr::U32 typeNum = secTypeNum(type.buf); if (typeNum != secTypeInvalid) result.push_back(typeNum); } return result; }