1 #if defined(NO_BUFFER) || defined(NO_IP) || defined(NO_OPENSSL)
2 # error "Badness, NO_BUFFER, NO_IP or NO_OPENSSL is defined, turn them *off*"
3 #endif
4 
5 /* Include our bits'n'pieces */
6 #include "tunala.h"
7 
8 /********************************************/
9 /* Our local types that specify our "world" */
10 /********************************************/
11 
12 /*
13  * These represent running "tunnels". Eg. if you wanted to do SSL in a
14  * "message-passing" scanario, the "int" file-descriptors might be replaced
15  * by thread or process IDs, and the "select" code might be replaced by
16  * message handling code. Whatever.
17  */
18 typedef struct _tunala_item_t {
19     /*
20      * The underlying SSL state machine. This is a data-only processing unit
21      * and we communicate with it by talking to its four "buffers".
22      */
23     state_machine_t sm;
24     /*
25      * The file-descriptors for the "dirty" (encrypted) side of the SSL
26      * setup. In actuality, this is typically a socket and both values are
27      * identical.
28      */
29     int dirty_read, dirty_send;
30     /*
31      * The file-descriptors for the "clean" (unencrypted) side of the SSL
32      * setup. These could be stdin/stdout, a socket (both values the same),
33      * or whatever you like.
34      */
35     int clean_read, clean_send;
36 } tunala_item_t;
37 
38 /*
39  * This structure is used as the data for running the main loop. Namely, in a
40  * network format such as this, it is stuff for select() - but as pointed out,
41  * when moving the real-world to somewhere else, this might be replaced by
42  * something entirely different. It's basically the stuff that controls when
43  * it's time to do some "work".
44  */
45 typedef struct _select_sets_t {
46     int max;                    /* As required as the first argument to
47                                  * select() */
48     fd_set reads, sends, excepts; /* As passed to select() */
49 } select_sets_t;
50 typedef struct _tunala_selector_t {
51     select_sets_t last_selected; /* Results of the last select() */
52     select_sets_t next_select;  /* What we'll next select on */
53 } tunala_selector_t;
54 
55 /*
56  * This structure is *everything*. We do it to avoid the use of globals so
57  * that, for example, it would be easier to shift things around between
58  * async-IO, thread-based, or multi-fork()ed (or combinations thereof).
59  */
60 typedef struct _tunala_world_t {
61     /* The file-descriptor we "listen" on for new connections */
62     int listen_fd;
63     /* The array of tunnels */
64     tunala_item_t *tunnels;
65     /* the number of tunnels in use and allocated, respectively */
66     unsigned int tunnels_used, tunnels_size;
67     /* Our outside "loop" context stuff */
68     tunala_selector_t selector;
69     /*
70      * Our SSL_CTX, which is configured as the SSL client or server and has
71      * the various cert-settings and callbacks configured.
72      */
73     SSL_CTX *ssl_ctx;
74     /*
75      * Simple flag with complex logic :-) Indicates whether we're an SSL
76      * server or an SSL client.
77      */
78     int server_mode;
79 } tunala_world_t;
80 
81 /*****************************/
82 /* Internal static functions */
83 /*****************************/
84 
85 static SSL_CTX *initialise_ssl_ctx(int server_mode, const char *engine_id,
86                                    const char *CAfile, const char *cert,
87                                    const char *key, const char *dcert,
88                                    const char *dkey, const char *cipher_list,
89                                    const char *dh_file,
90                                    const char *dh_special, int tmp_rsa,
91                                    int ctx_options, int out_state,
92                                    int out_verify, int verify_mode,
93                                    unsigned int verify_depth);
94 static void selector_init(tunala_selector_t * selector);
95 static void selector_add_listener(tunala_selector_t * selector, int fd);
96 static void selector_add_tunala(tunala_selector_t * selector,
97                                 tunala_item_t * t);
98 static int selector_select(tunala_selector_t * selector);
99 /*
100  * This returns -1 for error, 0 for no new connections, or 1 for success, in
101  * which case *newfd is populated.
102  */
103 static int selector_get_listener(tunala_selector_t * selector, int fd,
104                                  int *newfd);
105 static int tunala_world_new_item(tunala_world_t * world, int fd,
106                                  const char *ip, unsigned short port,
107                                  int flipped);
108 static void tunala_world_del_item(tunala_world_t * world, unsigned int idx);
109 static int tunala_item_io(tunala_selector_t * selector, tunala_item_t * item);
110 
111 /*********************************************/
112 /* MAIN FUNCTION (and its utility functions) */
113 /*********************************************/
114 
115 static const char *def_proxyhost = "127.0.0.1:443";
116 static const char *def_listenhost = "127.0.0.1:8080";
117 static int def_max_tunnels = 50;
118 static const char *def_cacert = NULL;
119 static const char *def_cert = NULL;
120 static const char *def_key = NULL;
121 static const char *def_dcert = NULL;
122 static const char *def_dkey = NULL;
123 static const char *def_engine_id = NULL;
124 static int def_server_mode = 0;
125 static int def_flipped = 0;
126 static const char *def_cipher_list = NULL;
127 static const char *def_dh_file = NULL;
128 static const char *def_dh_special = NULL;
129 static int def_tmp_rsa = 1;
130 static int def_ctx_options = 0;
131 static int def_verify_mode = 0;
132 static unsigned int def_verify_depth = 10;
133 static int def_out_state = 0;
134 static unsigned int def_out_verify = 0;
135 static int def_out_totals = 0;
136 static int def_out_conns = 0;
137 
138 static const char *helpstring =
139     "\n'Tunala' (A tunneler with a New Zealand accent)\n"
140     "Usage: tunala [options], where options are from;\n"
141     " -listen [host:]<port>  (default = 127.0.0.1:8080)\n"
142     " -proxy <host>:<port>   (default = 127.0.0.1:443)\n"
143     " -maxtunnels <num>      (default = 50)\n"
144     " -cacert <path|NULL>    (default = NULL)\n"
145     " -cert <path|NULL>      (default = NULL)\n"
146     " -key <path|NULL>       (default = whatever '-cert' is)\n"
147     " -dcert <path|NULL>     (usually for DSA, default = NULL)\n"
148     " -dkey <path|NULL>      (usually for DSA, default = whatever '-dcert' is)\n"
149     " -engine <id|NULL>      (default = NULL)\n"
150     " -server <0|1>          (default = 0, ie. an SSL client)\n"
151     " -flipped <0|1>         (makes SSL servers be network clients, and vice versa)\n"
152     " -cipher <list>         (specifies cipher list to use)\n"
153     " -dh_file <path>        (a PEM file containing DH parameters to use)\n"
154     " -dh_special <NULL|generate|standard> (see below: def=NULL)\n"
155     " -no_tmp_rsa            (don't generate temporary RSA keys)\n"
156     " -no_ssl2               (disable SSLv2)\n"
157     " -no_ssl3               (disable SSLv3)\n"
158     " -no_tls1               (disable TLSv1)\n"
159     " -v_peer                (verify the peer certificate)\n"
160     " -v_strict              (do not continue if peer doesn't authenticate)\n"
161     " -v_once                (no verification in renegotiates)\n"
162     " -v_depth <num>         (limit certificate chain depth, default = 10)\n"
163     " -out_conns             (prints client connections and disconnections)\n"
164     " -out_state             (prints SSL handshake states)\n"
165     " -out_verify <0|1|2|3>  (prints certificate verification states: def=1)\n"
166     " -out_totals            (prints out byte-totals when a tunnel closes)\n"
167     " -<h|help|?>            (displays this help screen)\n"
168     "Notes:\n"
169     "(1) It is recommended to specify a cert+key when operating as an SSL server.\n"
170     "    If you only specify '-cert', the same file must contain a matching\n"
171     "    private key.\n"
172     "(2) Either dh_file or dh_special can be used to specify where DH parameters\n"
173     "    will be obtained from (or '-dh_special NULL' for the default choice) but\n"
174     "    you cannot specify both. For dh_special, 'generate' will create new DH\n"
175     "    parameters on startup, and 'standard' will use embedded parameters\n"
176     "    instead.\n"
177     "(3) Normally an ssl client connects to an ssl server - so that an 'ssl client\n"
178     "    tunala' listens for 'clean' client connections and proxies ssl, and an\n"
179     "    'ssl server tunala' listens for ssl connections and proxies 'clean'. With\n"
180     "    '-flipped 1', this behaviour is reversed so that an 'ssl server tunala'\n"
181     "    listens for clean client connections and proxies ssl (but participating\n"
182     "    as an ssl *server* in the SSL/TLS protocol), and an 'ssl client tunala'\n"
183     "    listens for ssl connections (participating as an ssl *client* in the\n"
184     "    SSL/TLS protocol) and proxies 'clean' to the end destination. This can\n"
185     "    be useful for allowing network access to 'servers' where only the server\n"
186     "    needs to authenticate the client (ie. the other way is not required).\n"
187     "    Even with client and server authentication, this 'technique' mitigates\n"
188     "    some DoS (denial-of-service) potential as it will be the network client\n"
189     "    having to perform the first private key operation rather than the other\n"
190     "    way round.\n"
191     "(4) The 'technique' used by setting '-flipped 1' is probably compatible with\n"
192     "    absolutely nothing except another complimentary instance of 'tunala'\n"
193     "    running with '-flipped 1'. :-)\n";
194 
195 /*
196  * Default DH parameters for use with "-dh_special standard" ... stolen
197  * striaght from s_server.
198  */
199 static unsigned char dh512_p[] = {
200     0xDA, 0x58, 0x3C, 0x16, 0xD9, 0x85, 0x22, 0x89, 0xD0, 0xE4, 0xAF, 0x75,
201     0x6F, 0x4C, 0xCA, 0x92, 0xDD, 0x4B, 0xE5, 0x33, 0xB8, 0x04, 0xFB, 0x0F,
202     0xED, 0x94, 0xEF, 0x9C, 0x8A, 0x44, 0x03, 0xED, 0x57, 0x46, 0x50, 0xD3,
203     0x69, 0x99, 0xDB, 0x29, 0xD7, 0x76, 0x27, 0x6B, 0xA2, 0xD3, 0xD4, 0x12,
204     0xE2, 0x18, 0xF4, 0xDD, 0x1E, 0x08, 0x4C, 0xF6, 0xD8, 0x00, 0x3E, 0x7C,
205     0x47, 0x74, 0xE8, 0x33,
206 };
207 
208 static unsigned char dh512_g[] = {
209     0x02,
210 };
211 
212 /*
213  * And the function that parses the above "standard" parameters, again,
214  * straight out of s_server.
215  */
get_dh512(void)216 static DH *get_dh512(void)
217 {
218     DH *dh = NULL;
219 
220     if ((dh = DH_new()) == NULL)
221         return (NULL);
222     dh->p = BN_bin2bn(dh512_p, sizeof(dh512_p), NULL);
223     dh->g = BN_bin2bn(dh512_g, sizeof(dh512_g), NULL);
224     if ((dh->p == NULL) || (dh->g == NULL))
225         return (NULL);
226     return (dh);
227 }
228 
229 /* Various help/error messages used by main() */
usage(const char * errstr,int isunknownarg)230 static int usage(const char *errstr, int isunknownarg)
231 {
232     if (isunknownarg)
233         fprintf(stderr, "Error: unknown argument '%s'\n", errstr);
234     else
235         fprintf(stderr, "Error: %s\n", errstr);
236     fprintf(stderr, "%s\n", helpstring);
237     return 1;
238 }
239 
err_str0(const char * str0)240 static int err_str0(const char *str0)
241 {
242     fprintf(stderr, "%s\n", str0);
243     return 1;
244 }
245 
err_str1(const char * fmt,const char * str1)246 static int err_str1(const char *fmt, const char *str1)
247 {
248     fprintf(stderr, fmt, str1);
249     fprintf(stderr, "\n");
250     return 1;
251 }
252 
parse_max_tunnels(const char * s,unsigned int * maxtunnels)253 static int parse_max_tunnels(const char *s, unsigned int *maxtunnels)
254 {
255     unsigned long l;
256     if (!int_strtoul(s, &l) || (l < 1) || (l > 1024)) {
257         fprintf(stderr, "Error, '%s' is an invalid value for "
258                 "maxtunnels\n", s);
259         return 0;
260     }
261     *maxtunnels = (unsigned int)l;
262     return 1;
263 }
264 
parse_server_mode(const char * s,int * servermode)265 static int parse_server_mode(const char *s, int *servermode)
266 {
267     unsigned long l;
268     if (!int_strtoul(s, &l) || (l > 1)) {
269         fprintf(stderr, "Error, '%s' is an invalid value for the "
270                 "server mode\n", s);
271         return 0;
272     }
273     *servermode = (int)l;
274     return 1;
275 }
276 
parse_dh_special(const char * s,const char ** dh_special)277 static int parse_dh_special(const char *s, const char **dh_special)
278 {
279     if ((strcmp(s, "NULL") == 0) || (strcmp(s, "generate") == 0) ||
280         (strcmp(s, "standard") == 0)) {
281         *dh_special = s;
282         return 1;
283     }
284     fprintf(stderr, "Error, '%s' is an invalid value for 'dh_special'\n", s);
285     return 0;
286 }
287 
parse_verify_level(const char * s,unsigned int * verify_level)288 static int parse_verify_level(const char *s, unsigned int *verify_level)
289 {
290     unsigned long l;
291     if (!int_strtoul(s, &l) || (l > 3)) {
292         fprintf(stderr, "Error, '%s' is an invalid value for "
293                 "out_verify\n", s);
294         return 0;
295     }
296     *verify_level = (unsigned int)l;
297     return 1;
298 }
299 
parse_verify_depth(const char * s,unsigned int * verify_depth)300 static int parse_verify_depth(const char *s, unsigned int *verify_depth)
301 {
302     unsigned long l;
303     if (!int_strtoul(s, &l) || (l < 1) || (l > 50)) {
304         fprintf(stderr, "Error, '%s' is an invalid value for "
305                 "verify_depth\n", s);
306         return 0;
307     }
308     *verify_depth = (unsigned int)l;
309     return 1;
310 }
311 
312 /* Some fprintf format strings used when tunnels close */
313 static const char *io_stats_dirty =
314     "    SSL traffic;   %8lu bytes in, %8lu bytes out\n";
315 static const char *io_stats_clean =
316     "    clear traffic; %8lu bytes in, %8lu bytes out\n";
317 
main(int argc,char * argv[])318 int main(int argc, char *argv[])
319 {
320     unsigned int loop;
321     int newfd;
322     tunala_world_t world;
323     tunala_item_t *t_item;
324     const char *proxy_ip;
325     unsigned short proxy_port;
326     /* Overridables */
327     const char *proxyhost = def_proxyhost;
328     const char *listenhost = def_listenhost;
329     unsigned int max_tunnels = def_max_tunnels;
330     const char *cacert = def_cacert;
331     const char *cert = def_cert;
332     const char *key = def_key;
333     const char *dcert = def_dcert;
334     const char *dkey = def_dkey;
335     const char *engine_id = def_engine_id;
336     int server_mode = def_server_mode;
337     int flipped = def_flipped;
338     const char *cipher_list = def_cipher_list;
339     const char *dh_file = def_dh_file;
340     const char *dh_special = def_dh_special;
341     int tmp_rsa = def_tmp_rsa;
342     int ctx_options = def_ctx_options;
343     int verify_mode = def_verify_mode;
344     unsigned int verify_depth = def_verify_depth;
345     int out_state = def_out_state;
346     unsigned int out_verify = def_out_verify;
347     int out_totals = def_out_totals;
348     int out_conns = def_out_conns;
349 
350 /* Parse command-line arguments */
351  next_arg:
352     argc--;
353     argv++;
354     if (argc > 0) {
355         if (strcmp(*argv, "-listen") == 0) {
356             if (argc < 2)
357                 return usage("-listen requires an argument", 0);
358             argc--;
359             argv++;
360             listenhost = *argv;
361             goto next_arg;
362         } else if (strcmp(*argv, "-proxy") == 0) {
363             if (argc < 2)
364                 return usage("-proxy requires an argument", 0);
365             argc--;
366             argv++;
367             proxyhost = *argv;
368             goto next_arg;
369         } else if (strcmp(*argv, "-maxtunnels") == 0) {
370             if (argc < 2)
371                 return usage("-maxtunnels requires an argument", 0);
372             argc--;
373             argv++;
374             if (!parse_max_tunnels(*argv, &max_tunnels))
375                 return 1;
376             goto next_arg;
377         } else if (strcmp(*argv, "-cacert") == 0) {
378             if (argc < 2)
379                 return usage("-cacert requires an argument", 0);
380             argc--;
381             argv++;
382             if (strcmp(*argv, "NULL") == 0)
383                 cacert = NULL;
384             else
385                 cacert = *argv;
386             goto next_arg;
387         } else if (strcmp(*argv, "-cert") == 0) {
388             if (argc < 2)
389                 return usage("-cert requires an argument", 0);
390             argc--;
391             argv++;
392             if (strcmp(*argv, "NULL") == 0)
393                 cert = NULL;
394             else
395                 cert = *argv;
396             goto next_arg;
397         } else if (strcmp(*argv, "-key") == 0) {
398             if (argc < 2)
399                 return usage("-key requires an argument", 0);
400             argc--;
401             argv++;
402             if (strcmp(*argv, "NULL") == 0)
403                 key = NULL;
404             else
405                 key = *argv;
406             goto next_arg;
407         } else if (strcmp(*argv, "-dcert") == 0) {
408             if (argc < 2)
409                 return usage("-dcert requires an argument", 0);
410             argc--;
411             argv++;
412             if (strcmp(*argv, "NULL") == 0)
413                 dcert = NULL;
414             else
415                 dcert = *argv;
416             goto next_arg;
417         } else if (strcmp(*argv, "-dkey") == 0) {
418             if (argc < 2)
419                 return usage("-dkey requires an argument", 0);
420             argc--;
421             argv++;
422             if (strcmp(*argv, "NULL") == 0)
423                 dkey = NULL;
424             else
425                 dkey = *argv;
426             goto next_arg;
427         } else if (strcmp(*argv, "-engine") == 0) {
428             if (argc < 2)
429                 return usage("-engine requires an argument", 0);
430             argc--;
431             argv++;
432             engine_id = *argv;
433             goto next_arg;
434         } else if (strcmp(*argv, "-server") == 0) {
435             if (argc < 2)
436                 return usage("-server requires an argument", 0);
437             argc--;
438             argv++;
439             if (!parse_server_mode(*argv, &server_mode))
440                 return 1;
441             goto next_arg;
442         } else if (strcmp(*argv, "-flipped") == 0) {
443             if (argc < 2)
444                 return usage("-flipped requires an argument", 0);
445             argc--;
446             argv++;
447             if (!parse_server_mode(*argv, &flipped))
448                 return 1;
449             goto next_arg;
450         } else if (strcmp(*argv, "-cipher") == 0) {
451             if (argc < 2)
452                 return usage("-cipher requires an argument", 0);
453             argc--;
454             argv++;
455             cipher_list = *argv;
456             goto next_arg;
457         } else if (strcmp(*argv, "-dh_file") == 0) {
458             if (argc < 2)
459                 return usage("-dh_file requires an argument", 0);
460             if (dh_special)
461                 return usage("cannot mix -dh_file with " "-dh_special", 0);
462             argc--;
463             argv++;
464             dh_file = *argv;
465             goto next_arg;
466         } else if (strcmp(*argv, "-dh_special") == 0) {
467             if (argc < 2)
468                 return usage("-dh_special requires an argument", 0);
469             if (dh_file)
470                 return usage("cannot mix -dh_file with " "-dh_special", 0);
471             argc--;
472             argv++;
473             if (!parse_dh_special(*argv, &dh_special))
474                 return 1;
475             goto next_arg;
476         } else if (strcmp(*argv, "-no_tmp_rsa") == 0) {
477             tmp_rsa = 0;
478             goto next_arg;
479         } else if (strcmp(*argv, "-no_ssl2") == 0) {
480             ctx_options |= SSL_OP_NO_SSLv2;
481             goto next_arg;
482         } else if (strcmp(*argv, "-no_ssl3") == 0) {
483             ctx_options |= SSL_OP_NO_SSLv3;
484             goto next_arg;
485         } else if (strcmp(*argv, "-no_tls1") == 0) {
486             ctx_options |= SSL_OP_NO_TLSv1;
487             goto next_arg;
488         } else if (strcmp(*argv, "-v_peer") == 0) {
489             verify_mode |= SSL_VERIFY_PEER;
490             goto next_arg;
491         } else if (strcmp(*argv, "-v_strict") == 0) {
492             verify_mode |= SSL_VERIFY_FAIL_IF_NO_PEER_CERT;
493             goto next_arg;
494         } else if (strcmp(*argv, "-v_once") == 0) {
495             verify_mode |= SSL_VERIFY_CLIENT_ONCE;
496             goto next_arg;
497         } else if (strcmp(*argv, "-v_depth") == 0) {
498             if (argc < 2)
499                 return usage("-v_depth requires an argument", 0);
500             argc--;
501             argv++;
502             if (!parse_verify_depth(*argv, &verify_depth))
503                 return 1;
504             goto next_arg;
505         } else if (strcmp(*argv, "-out_state") == 0) {
506             out_state = 1;
507             goto next_arg;
508         } else if (strcmp(*argv, "-out_verify") == 0) {
509             if (argc < 2)
510                 return usage("-out_verify requires an argument", 0);
511             argc--;
512             argv++;
513             if (!parse_verify_level(*argv, &out_verify))
514                 return 1;
515             goto next_arg;
516         } else if (strcmp(*argv, "-out_totals") == 0) {
517             out_totals = 1;
518             goto next_arg;
519         } else if (strcmp(*argv, "-out_conns") == 0) {
520             out_conns = 1;
521             goto next_arg;
522         } else if ((strcmp(*argv, "-h") == 0) ||
523                    (strcmp(*argv, "-help") == 0) ||
524                    (strcmp(*argv, "-?") == 0)) {
525             fprintf(stderr, "%s\n", helpstring);
526             return 0;
527         } else
528             return usage(*argv, 1);
529     }
530     /* Run any sanity checks we want here */
531     if (!cert && !dcert && server_mode)
532         fprintf(stderr, "WARNING: you are running an SSL server without "
533                 "a certificate - this may not work!\n");
534 
535     /* Initialise network stuff */
536     if (!ip_initialise())
537         return err_str0("ip_initialise failed");
538     /* Create the SSL_CTX */
539     if ((world.ssl_ctx = initialise_ssl_ctx(server_mode, engine_id,
540                                             cacert, cert, key, dcert, dkey,
541                                             cipher_list, dh_file, dh_special,
542                                             tmp_rsa, ctx_options, out_state,
543                                             out_verify, verify_mode,
544                                             verify_depth)) == NULL)
545         return err_str1("initialise_ssl_ctx(engine_id=%s) failed",
546                         (engine_id == NULL) ? "NULL" : engine_id);
547     if (engine_id)
548         fprintf(stderr, "Info, engine '%s' initialised\n", engine_id);
549     /* Create the listener */
550     if ((world.listen_fd = ip_create_listener(listenhost)) == -1)
551         return err_str1("ip_create_listener(%s) failed", listenhost);
552     fprintf(stderr, "Info, listening on '%s'\n", listenhost);
553     if (!ip_parse_address(proxyhost, &proxy_ip, &proxy_port, 0))
554         return err_str1("ip_parse_address(%s) failed", proxyhost);
555     fprintf(stderr, "Info, proxying to '%s' (%d.%d.%d.%d:%d)\n", proxyhost,
556             (int)proxy_ip[0], (int)proxy_ip[1],
557             (int)proxy_ip[2], (int)proxy_ip[3], (int)proxy_port);
558     fprintf(stderr, "Info, set maxtunnels to %d\n", (int)max_tunnels);
559     fprintf(stderr, "Info, set to operate as an SSL %s\n",
560             (server_mode ? "server" : "client"));
561     /* Initialise the rest of the stuff */
562     world.tunnels_used = world.tunnels_size = 0;
563     world.tunnels = NULL;
564     world.server_mode = server_mode;
565     selector_init(&world.selector);
566 
567 /* We're ready to loop */
568  main_loop:
569     /* Should we listen for *new* tunnels? */
570     if (world.tunnels_used < max_tunnels)
571         selector_add_listener(&world.selector, world.listen_fd);
572     /* We should add in our existing tunnels */
573     for (loop = 0; loop < world.tunnels_used; loop++)
574         selector_add_tunala(&world.selector, world.tunnels + loop);
575     /* Now do the select */
576     switch (selector_select(&world.selector)) {
577     case -1:
578         if (errno != EINTR) {
579             fprintf(stderr, "selector_select returned a " "badness error.\n");
580             goto shouldnt_happen;
581         }
582         fprintf(stderr, "Warn, selector interrupted by a signal\n");
583         goto main_loop;
584     case 0:
585         fprintf(stderr, "Warn, selector_select returned 0 - signal?" "?\n");
586         goto main_loop;
587     default:
588         break;
589     }
590     /* Accept new connection if we should and can */
591     if ((world.tunnels_used < max_tunnels)
592         && (selector_get_listener(&world.selector, world.listen_fd, &newfd) ==
593             1)) {
594         /* We have a new connection */
595         if (!tunala_world_new_item(&world, newfd, proxy_ip,
596                                    proxy_port, flipped))
597             fprintf(stderr, "tunala_world_new_item failed\n");
598         else if (out_conns)
599             fprintf(stderr, "Info, new tunnel opened, now up to "
600                     "%d\n", world.tunnels_used);
601     }
602     /*
603      * Give each tunnel its moment, note the while loop is because it makes
604      * the logic easier than with "for" to deal with an array that may shift
605      * because of deletes.
606      */
607     loop = 0;
608     t_item = world.tunnels;
609     while (loop < world.tunnels_used) {
610         if (!tunala_item_io(&world.selector, t_item)) {
611             /*
612              * We're closing whether for reasons of an error or a natural
613              * close. Don't increment loop or t_item because the next item is
614              * moving to us!
615              */
616             if (!out_totals)
617                 goto skip_totals;
618             fprintf(stderr, "Tunnel closing, traffic stats follow\n");
619             /* Display the encrypted (over the network) stats */
620             fprintf(stderr, io_stats_dirty,
621                     buffer_total_in(state_machine_get_buffer
622                                     (&t_item->sm, SM_DIRTY_IN)),
623                     buffer_total_out(state_machine_get_buffer
624                                      (&t_item->sm, SM_DIRTY_OUT)));
625             /*
626              * Display the local (tunnelled) stats. NB: Data we *receive* is
627              * data sent *out* of the state_machine on its 'clean' side.
628              * Hence the apparent back-to-front OUT/IN mixup here :-)
629              */
630             fprintf(stderr, io_stats_clean,
631                     buffer_total_out(state_machine_get_buffer
632                                      (&t_item->sm, SM_CLEAN_OUT)),
633                     buffer_total_in(state_machine_get_buffer
634                                     (&t_item->sm, SM_CLEAN_IN)));
635  skip_totals:
636             tunala_world_del_item(&world, loop);
637             if (out_conns)
638                 fprintf(stderr, "Info, tunnel closed, down to %d\n",
639                         world.tunnels_used);
640         } else {
641             /* Move to the next item */
642             loop++;
643             t_item++;
644         }
645     }
646     goto main_loop;
647     /* Should never get here */
648  shouldnt_happen:
649     abort();
650     return 1;
651 }
652 
653 /****************/
654 /* OpenSSL bits */
655 /****************/
656 
ctx_set_cert(SSL_CTX * ctx,const char * cert,const char * key)657 static int ctx_set_cert(SSL_CTX *ctx, const char *cert, const char *key)
658 {
659     FILE *fp = NULL;
660     X509 *x509 = NULL;
661     EVP_PKEY *pkey = NULL;
662     int toret = 0;              /* Assume an error */
663 
664     /* cert */
665     if (cert) {
666         if ((fp = fopen(cert, "r")) == NULL) {
667             fprintf(stderr, "Error opening cert file '%s'\n", cert);
668             goto err;
669         }
670         if (!PEM_read_X509(fp, &x509, NULL, NULL)) {
671             fprintf(stderr, "Error reading PEM cert from '%s'\n", cert);
672             goto err;
673         }
674         if (!SSL_CTX_use_certificate(ctx, x509)) {
675             fprintf(stderr, "Error, cert in '%s' can not be used\n", cert);
676             goto err;
677         }
678         /* Clear the FILE* for reuse in the "key" code */
679         fclose(fp);
680         fp = NULL;
681         fprintf(stderr, "Info, operating with cert in '%s'\n", cert);
682         /*
683          * If a cert was given without matching key, we assume the same file
684          * contains the required key.
685          */
686         if (!key)
687             key = cert;
688     } else {
689         if (key)
690             fprintf(stderr, "Error, can't specify a key without a "
691                     "corresponding certificate\n");
692         else
693             fprintf(stderr, "Error, ctx_set_cert called with " "NULLs!\n");
694         goto err;
695     }
696     /* key */
697     if (key) {
698         if ((fp = fopen(key, "r")) == NULL) {
699             fprintf(stderr, "Error opening key file '%s'\n", key);
700             goto err;
701         }
702         if (!PEM_read_PrivateKey(fp, &pkey, NULL, NULL)) {
703             fprintf(stderr, "Error reading PEM key from '%s'\n", key);
704             goto err;
705         }
706         if (!SSL_CTX_use_PrivateKey(ctx, pkey)) {
707             fprintf(stderr, "Error, key in '%s' can not be used\n", key);
708             goto err;
709         }
710         fprintf(stderr, "Info, operating with key in '%s'\n", key);
711     } else
712         fprintf(stderr, "Info, operating without a cert or key\n");
713     /* Success */
714     toret = 1;
715  err:
716     if (x509)
717         X509_free(x509);
718     if (pkey)
719         EVP_PKEY_free(pkey);
720     if (fp)
721         fclose(fp);
722     return toret;
723 }
724 
ctx_set_dh(SSL_CTX * ctx,const char * dh_file,const char * dh_special)725 static int ctx_set_dh(SSL_CTX *ctx, const char *dh_file,
726                       const char *dh_special)
727 {
728     DH *dh = NULL;
729     FILE *fp = NULL;
730 
731     if (dh_special) {
732         if (strcmp(dh_special, "NULL") == 0)
733             return 1;
734         if (strcmp(dh_special, "standard") == 0) {
735             if ((dh = get_dh512()) == NULL) {
736                 fprintf(stderr, "Error, can't parse 'standard'"
737                         " DH parameters\n");
738                 return 0;
739             }
740             fprintf(stderr, "Info, using 'standard' DH parameters\n");
741             goto do_it;
742         }
743         if (strcmp(dh_special, "generate") != 0)
744             /*
745              * This shouldn't happen - screening values is handled in main().
746              */
747             abort();
748         fprintf(stderr, "Info, generating DH parameters ... ");
749         fflush(stderr);
750         if (!(dh = DH_new()) || !DH_generate_parameters_ex(dh, 512,
751                                                            DH_GENERATOR_5,
752                                                            NULL)) {
753             fprintf(stderr, "error!\n");
754             if (dh)
755                 DH_free(dh);
756             return 0;
757         }
758         fprintf(stderr, "complete\n");
759         goto do_it;
760     }
761     /* So, we're loading dh_file */
762     if ((fp = fopen(dh_file, "r")) == NULL) {
763         fprintf(stderr, "Error, couldn't open '%s' for DH parameters\n",
764                 dh_file);
765         return 0;
766     }
767     dh = PEM_read_DHparams(fp, NULL, NULL, NULL);
768     fclose(fp);
769     if (dh == NULL) {
770         fprintf(stderr, "Error, could not parse DH parameters from '%s'\n",
771                 dh_file);
772         return 0;
773     }
774     fprintf(stderr, "Info, using DH parameters from file '%s'\n", dh_file);
775  do_it:
776     SSL_CTX_set_tmp_dh(ctx, dh);
777     DH_free(dh);
778     return 1;
779 }
780 
initialise_ssl_ctx(int server_mode,const char * engine_id,const char * CAfile,const char * cert,const char * key,const char * dcert,const char * dkey,const char * cipher_list,const char * dh_file,const char * dh_special,int tmp_rsa,int ctx_options,int out_state,int out_verify,int verify_mode,unsigned int verify_depth)781 static SSL_CTX *initialise_ssl_ctx(int server_mode, const char *engine_id,
782                                    const char *CAfile, const char *cert,
783                                    const char *key, const char *dcert,
784                                    const char *dkey, const char *cipher_list,
785                                    const char *dh_file,
786                                    const char *dh_special, int tmp_rsa,
787                                    int ctx_options, int out_state,
788                                    int out_verify, int verify_mode,
789                                    unsigned int verify_depth)
790 {
791     SSL_CTX *ctx = NULL, *ret = NULL;
792     const SSL_METHOD *meth;
793     ENGINE *e = NULL;
794 
795     OpenSSL_add_ssl_algorithms();
796     SSL_load_error_strings();
797 
798     meth = (server_mode ? SSLv23_server_method() : SSLv23_client_method());
799     if (meth == NULL)
800         goto err;
801     if (engine_id) {
802         ENGINE_load_builtin_engines();
803         if ((e = ENGINE_by_id(engine_id)) == NULL) {
804             fprintf(stderr, "Error obtaining '%s' engine, openssl "
805                     "errors follow\n", engine_id);
806             goto err;
807         }
808         if (!ENGINE_set_default(e, ENGINE_METHOD_ALL)) {
809             fprintf(stderr, "Error assigning '%s' engine, openssl "
810                     "errors follow\n", engine_id);
811             goto err;
812         }
813         ENGINE_free(e);
814     }
815     if ((ctx = SSL_CTX_new(meth)) == NULL)
816         goto err;
817     /* cacert */
818     if (CAfile) {
819         if (!X509_STORE_load_locations(SSL_CTX_get_cert_store(ctx),
820                                        CAfile, NULL)) {
821             fprintf(stderr, "Error loading CA cert(s) in '%s'\n", CAfile);
822             goto err;
823         }
824         fprintf(stderr, "Info, operating with CA cert(s) in '%s'\n", CAfile);
825     } else
826         fprintf(stderr, "Info, operating without a CA cert(-list)\n");
827     if (!SSL_CTX_set_default_verify_paths(ctx)) {
828         fprintf(stderr, "Error setting default verify paths\n");
829         goto err;
830     }
831 
832     /* cert and key */
833     if ((cert || key) && !ctx_set_cert(ctx, cert, key))
834         goto err;
835     /* dcert and dkey */
836     if ((dcert || dkey) && !ctx_set_cert(ctx, dcert, dkey))
837         goto err;
838     /* temporary RSA key generation */
839     if (tmp_rsa)
840         SSL_CTX_set_tmp_rsa_callback(ctx, cb_generate_tmp_rsa);
841 
842     /* cipher_list */
843     if (cipher_list) {
844         if (!SSL_CTX_set_cipher_list(ctx, cipher_list)) {
845             fprintf(stderr, "Error setting cipher list '%s'\n", cipher_list);
846             goto err;
847         }
848         fprintf(stderr, "Info, set cipher list '%s'\n", cipher_list);
849     } else
850         fprintf(stderr, "Info, operating with default cipher list\n");
851 
852     /* dh_file & dh_special */
853     if ((dh_file || dh_special) && !ctx_set_dh(ctx, dh_file, dh_special))
854         goto err;
855 
856     /* ctx_options */
857     SSL_CTX_set_options(ctx, ctx_options);
858 
859     /* out_state (output of SSL handshake states to screen). */
860     if (out_state)
861         cb_ssl_info_set_output(stderr);
862 
863     /* out_verify */
864     if (out_verify > 0) {
865         cb_ssl_verify_set_output(stderr);
866         cb_ssl_verify_set_level(out_verify);
867     }
868 
869     /* verify_depth */
870     cb_ssl_verify_set_depth(verify_depth);
871 
872     /* Success! (includes setting verify_mode) */
873     SSL_CTX_set_info_callback(ctx, cb_ssl_info);
874     SSL_CTX_set_verify(ctx, verify_mode, cb_ssl_verify);
875     ret = ctx;
876  err:
877     if (!ret) {
878         ERR_print_errors_fp(stderr);
879         if (ctx)
880             SSL_CTX_free(ctx);
881     }
882     return ret;
883 }
884 
885 /*****************/
886 /* Selector bits */
887 /*****************/
888 
selector_sets_init(select_sets_t * s)889 static void selector_sets_init(select_sets_t * s)
890 {
891     s->max = 0;
892     FD_ZERO(&s->reads);
893     FD_ZERO(&s->sends);
894     FD_ZERO(&s->excepts);
895 }
896 
selector_init(tunala_selector_t * selector)897 static void selector_init(tunala_selector_t * selector)
898 {
899     selector_sets_init(&selector->last_selected);
900     selector_sets_init(&selector->next_select);
901 }
902 
903 #define SEL_EXCEPTS 0x00
904 #define SEL_READS   0x01
905 #define SEL_SENDS   0x02
selector_add_raw_fd(tunala_selector_t * s,int fd,int flags)906 static void selector_add_raw_fd(tunala_selector_t * s, int fd, int flags)
907 {
908     FD_SET(fd, &s->next_select.excepts);
909     if (flags & SEL_READS)
910         FD_SET(fd, &s->next_select.reads);
911     if (flags & SEL_SENDS)
912         FD_SET(fd, &s->next_select.sends);
913     /* Adjust "max" */
914     if (s->next_select.max < (fd + 1))
915         s->next_select.max = fd + 1;
916 }
917 
selector_add_listener(tunala_selector_t * selector,int fd)918 static void selector_add_listener(tunala_selector_t * selector, int fd)
919 {
920     selector_add_raw_fd(selector, fd, SEL_READS);
921 }
922 
selector_add_tunala(tunala_selector_t * s,tunala_item_t * t)923 static void selector_add_tunala(tunala_selector_t * s, tunala_item_t * t)
924 {
925     /* Set clean read if sm.clean_in is not full */
926     if (t->clean_read != -1) {
927         selector_add_raw_fd(s, t->clean_read,
928                             (buffer_full(state_machine_get_buffer(&t->sm,
929                                                                   SM_CLEAN_IN))
930                              ? SEL_EXCEPTS : SEL_READS));
931     }
932     /* Set clean send if sm.clean_out is not empty */
933     if (t->clean_send != -1) {
934         selector_add_raw_fd(s, t->clean_send,
935                             (buffer_empty(state_machine_get_buffer(&t->sm,
936                                                                    SM_CLEAN_OUT))
937                              ? SEL_EXCEPTS : SEL_SENDS));
938     }
939     /* Set dirty read if sm.dirty_in is not full */
940     if (t->dirty_read != -1) {
941         selector_add_raw_fd(s, t->dirty_read,
942                             (buffer_full(state_machine_get_buffer(&t->sm,
943                                                                   SM_DIRTY_IN))
944                              ? SEL_EXCEPTS : SEL_READS));
945     }
946     /* Set dirty send if sm.dirty_out is not empty */
947     if (t->dirty_send != -1) {
948         selector_add_raw_fd(s, t->dirty_send,
949                             (buffer_empty(state_machine_get_buffer(&t->sm,
950                                                                    SM_DIRTY_OUT))
951                              ? SEL_EXCEPTS : SEL_SENDS));
952     }
953 }
954 
selector_select(tunala_selector_t * selector)955 static int selector_select(tunala_selector_t * selector)
956 {
957     memcpy(&selector->last_selected, &selector->next_select,
958            sizeof(select_sets_t));
959     selector_sets_init(&selector->next_select);
960     return select(selector->last_selected.max,
961                   &selector->last_selected.reads,
962                   &selector->last_selected.sends,
963                   &selector->last_selected.excepts, NULL);
964 }
965 
966 /*
967  * This returns -1 for error, 0 for no new connections, or 1 for success, in
968  * which case *newfd is populated.
969  */
selector_get_listener(tunala_selector_t * selector,int fd,int * newfd)970 static int selector_get_listener(tunala_selector_t * selector, int fd,
971                                  int *newfd)
972 {
973     if (FD_ISSET(fd, &selector->last_selected.excepts))
974         return -1;
975     if (!FD_ISSET(fd, &selector->last_selected.reads))
976         return 0;
977     if ((*newfd = ip_accept_connection(fd)) == -1)
978         return -1;
979     return 1;
980 }
981 
982 /************************/
983 /* "Tunala" world stuff */
984 /************************/
985 
tunala_world_make_room(tunala_world_t * world)986 static int tunala_world_make_room(tunala_world_t * world)
987 {
988     unsigned int newsize;
989     tunala_item_t *newarray;
990 
991     if (world->tunnels_used < world->tunnels_size)
992         return 1;
993     newsize = (world->tunnels_size == 0 ? 16 :
994                ((world->tunnels_size * 3) / 2));
995     if ((newarray = malloc(newsize * sizeof(tunala_item_t))) == NULL)
996         return 0;
997     memset(newarray, 0, newsize * sizeof(tunala_item_t));
998     if (world->tunnels_used > 0)
999         memcpy(newarray, world->tunnels,
1000                world->tunnels_used * sizeof(tunala_item_t));
1001     if (world->tunnels_size > 0)
1002         free(world->tunnels);
1003     /* migrate */
1004     world->tunnels = newarray;
1005     world->tunnels_size = newsize;
1006     return 1;
1007 }
1008 
tunala_world_new_item(tunala_world_t * world,int fd,const char * ip,unsigned short port,int flipped)1009 static int tunala_world_new_item(tunala_world_t * world, int fd,
1010                                  const char *ip, unsigned short port,
1011                                  int flipped)
1012 {
1013     tunala_item_t *item;
1014     int newfd;
1015     SSL *new_ssl = NULL;
1016 
1017     if (!tunala_world_make_room(world))
1018         return 0;
1019     if ((new_ssl = SSL_new(world->ssl_ctx)) == NULL) {
1020         fprintf(stderr, "Error creating new SSL\n");
1021         ERR_print_errors_fp(stderr);
1022         return 0;
1023     }
1024     item = world->tunnels + (world->tunnels_used++);
1025     state_machine_init(&item->sm);
1026     item->clean_read = item->clean_send =
1027         item->dirty_read = item->dirty_send = -1;
1028     if ((newfd = ip_create_connection_split(ip, port)) == -1)
1029         goto err;
1030     /*
1031      * Which way round? If we're a server, "fd" is the dirty side and the
1032      * connection we open is the clean one. For a client, it's the other way
1033      * around. Unless, of course, we're "flipped" in which case everything
1034      * gets reversed. :-)
1035      */
1036     if ((world->server_mode && !flipped) || (!world->server_mode && flipped)) {
1037         item->dirty_read = item->dirty_send = fd;
1038         item->clean_read = item->clean_send = newfd;
1039     } else {
1040         item->clean_read = item->clean_send = fd;
1041         item->dirty_read = item->dirty_send = newfd;
1042     }
1043     /*
1044      * We use the SSL's "app_data" to indicate a call-back induced "kill"
1045      */
1046     SSL_set_app_data(new_ssl, NULL);
1047     if (!state_machine_set_SSL(&item->sm, new_ssl, world->server_mode))
1048         goto err;
1049     return 1;
1050  err:
1051     tunala_world_del_item(world, world->tunnels_used - 1);
1052     return 0;
1053 
1054 }
1055 
tunala_world_del_item(tunala_world_t * world,unsigned int idx)1056 static void tunala_world_del_item(tunala_world_t * world, unsigned int idx)
1057 {
1058     tunala_item_t *item = world->tunnels + idx;
1059     if (item->clean_read != -1)
1060         close(item->clean_read);
1061     if (item->clean_send != item->clean_read)
1062         close(item->clean_send);
1063     item->clean_read = item->clean_send = -1;
1064     if (item->dirty_read != -1)
1065         close(item->dirty_read);
1066     if (item->dirty_send != item->dirty_read)
1067         close(item->dirty_send);
1068     item->dirty_read = item->dirty_send = -1;
1069     state_machine_close(&item->sm);
1070     /* OK, now we fix the item array */
1071     if (idx + 1 < world->tunnels_used)
1072         /* We need to scroll entries to the left */
1073         memmove(world->tunnels + idx,
1074                 world->tunnels + (idx + 1),
1075                 (world->tunnels_used - (idx + 1)) * sizeof(tunala_item_t));
1076     world->tunnels_used--;
1077 }
1078 
tunala_item_io(tunala_selector_t * selector,tunala_item_t * item)1079 static int tunala_item_io(tunala_selector_t * selector, tunala_item_t * item)
1080 {
1081     int c_r, c_s, d_r, d_s;     /* Four boolean flags */
1082 
1083     /* Take ourselves out of the gene-pool if there was an except */
1084     if ((item->clean_read != -1) && FD_ISSET(item->clean_read,
1085                                              &selector->
1086                                              last_selected.excepts))
1087         return 0;
1088     if ((item->clean_send != -1) && FD_ISSET(item->clean_send,
1089                                              &selector->
1090                                              last_selected.excepts))
1091         return 0;
1092     if ((item->dirty_read != -1) && FD_ISSET(item->dirty_read,
1093                                              &selector->
1094                                              last_selected.excepts))
1095         return 0;
1096     if ((item->dirty_send != -1) && FD_ISSET(item->dirty_send,
1097                                              &selector->
1098                                              last_selected.excepts))
1099         return 0;
1100     /* Grab our 4 IO flags */
1101     c_r = c_s = d_r = d_s = 0;
1102     if (item->clean_read != -1)
1103         c_r = FD_ISSET(item->clean_read, &selector->last_selected.reads);
1104     if (item->clean_send != -1)
1105         c_s = FD_ISSET(item->clean_send, &selector->last_selected.sends);
1106     if (item->dirty_read != -1)
1107         d_r = FD_ISSET(item->dirty_read, &selector->last_selected.reads);
1108     if (item->dirty_send != -1)
1109         d_s = FD_ISSET(item->dirty_send, &selector->last_selected.sends);
1110     /* If no IO has happened for us, skip needless data looping */
1111     if (!c_r && !c_s && !d_r && !d_s)
1112         return 1;
1113     if (c_r)
1114         c_r = (buffer_from_fd(state_machine_get_buffer(&item->sm,
1115                                                        SM_CLEAN_IN),
1116                               item->clean_read) <= 0);
1117     if (c_s)
1118         c_s = (buffer_to_fd(state_machine_get_buffer(&item->sm,
1119                                                      SM_CLEAN_OUT),
1120                             item->clean_send) <= 0);
1121     if (d_r)
1122         d_r = (buffer_from_fd(state_machine_get_buffer(&item->sm,
1123                                                        SM_DIRTY_IN),
1124                               item->dirty_read) <= 0);
1125     if (d_s)
1126         d_s = (buffer_to_fd(state_machine_get_buffer(&item->sm,
1127                                                      SM_DIRTY_OUT),
1128                             item->dirty_send) <= 0);
1129     /* If any of the flags is non-zero, that means they need closing */
1130     if (c_r) {
1131         close(item->clean_read);
1132         if (item->clean_send == item->clean_read)
1133             item->clean_send = -1;
1134         item->clean_read = -1;
1135     }
1136     if (c_s && (item->clean_send != -1)) {
1137         close(item->clean_send);
1138         if (item->clean_send == item->clean_read)
1139             item->clean_read = -1;
1140         item->clean_send = -1;
1141     }
1142     if (d_r) {
1143         close(item->dirty_read);
1144         if (item->dirty_send == item->dirty_read)
1145             item->dirty_send = -1;
1146         item->dirty_read = -1;
1147     }
1148     if (d_s && (item->dirty_send != -1)) {
1149         close(item->dirty_send);
1150         if (item->dirty_send == item->dirty_read)
1151             item->dirty_read = -1;
1152         item->dirty_send = -1;
1153     }
1154     /*
1155      * This function name is attributed to the term donated by David Schwartz
1156      * on openssl-dev, message-ID:
1157      * <NCBBLIEPOCNJOAEKBEAKEEDGLIAA.davids@webmaster.com>. :-)
1158      */
1159     if (!state_machine_churn(&item->sm))
1160         /*
1161          * If the SSL closes, it will also zero-out the _in buffers and will
1162          * in future process just outgoing data. As and when the outgoing
1163          * data has gone, it will return zero here to tell us to bail out.
1164          */
1165         return 0;
1166     /* Otherwise, we return zero if both sides are dead. */
1167     if (((item->clean_read == -1) || (item->clean_send == -1)) &&
1168         ((item->dirty_read == -1) || (item->dirty_send == -1)))
1169         return 0;
1170     /*
1171      * If only one side closed, notify the SSL of this so it can take
1172      * appropriate action.
1173      */
1174     if ((item->clean_read == -1) || (item->clean_send == -1)) {
1175         if (!state_machine_close_clean(&item->sm))
1176             return 0;
1177     }
1178     if ((item->dirty_read == -1) || (item->dirty_send == -1)) {
1179         if (!state_machine_close_dirty(&item->sm))
1180             return 0;
1181     }
1182     return 1;
1183 }
1184