aboutsummaryrefslogtreecommitdiff
path: root/server.c
diff options
context:
space:
mode:
authorToni Uhlig <matzeton@googlemail.com>2020-05-22 13:43:46 +0200
committerToni Uhlig <matzeton@googlemail.com>2020-05-22 14:48:29 +0200
commitc394c09330760985d282cb866a06dea6294012aa (patch)
tree5a120d309ef25552b719844474993184a8707608 /server.c
first public release
Signed-off-by: Toni Uhlig <matzeton@googlemail.com>
Diffstat (limited to 'server.c')
-rw-r--r--server.c368
1 files changed, 368 insertions, 0 deletions
diff --git a/server.c b/server.c
new file mode 100644
index 0000000..d679c87
--- /dev/null
+++ b/server.c
@@ -0,0 +1,368 @@
+#include <arpa/inet.h>
+#include <errno.h>
+#include <event2/buffer.h>
+#include <event2/bufferevent.h>
+#include <event2/event.h>
+#include <event2/listener.h>
+#include <event2/util.h>
+#include <fcntl.h>
+#include <netdb.h>
+#include <netinet/in.h>
+#include <signal.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <sys/socket.h>
+#include <sys/types.h>
+#include <unistd.h>
+
+#include "common-event2.h"
+#include "common-sodium.h"
+#include "logging.h"
+#include "protocol.h"
+#include "utils.h"
+
+static struct cmd_options opts = {.key_string = NULL, .key_length = 0, .host = NULL, .port = 0, .filepath = NULL};
+static int data_fd = -1;
+
+static void recv_data(uint8_t const * const buffer, size_t size)
+{
+ ssize_t bytes_written;
+
+ if (data_fd >= 0) {
+ bytes_written = write(data_fd, buffer, size);
+ if (bytes_written < 0) {
+ LOG(WARNING, "Closing file descriptor %d aka %s: %s", data_fd, opts.filepath, strerror(errno));
+ close(data_fd);
+ data_fd = -1;
+ } else {
+ LOG(NOTICE, "Recv DATA: %zd", bytes_written);
+ }
+ }
+}
+
+enum recv_return protocol_request_client_auth(struct connection * const state,
+ struct protocol_header const * const buffer,
+ size_t * const processed)
+{
+ struct protocol_client_auth const * const auth_pkt = (struct protocol_client_auth *)buffer;
+
+ (void)processed;
+ LOG(NOTICE, "Client AUTH with protocol version 0x%X", state->used_protocol_version);
+
+ /* user/pass authentication part - exemplary */
+ if (strncmp(auth_pkt->login, "username", sizeof(auth_pkt->login)) == 0 &&
+ strncmp(auth_pkt->passphrase, "passphrase", sizeof(auth_pkt->passphrase)) == 0) {
+
+ LOG(NOTICE,
+ "Username '%.*s' with passphrase '%.*s' logged in",
+ sizeof(auth_pkt->login),
+ auth_pkt->login,
+ sizeof(auth_pkt->passphrase),
+ auth_pkt->passphrase);
+ } else {
+ LOG(ERROR, "Authentication failed, username/passphrase mismatch");
+ return RECV_FATAL_UNAUTH;
+ }
+
+ log_bin2hex_sodium("Client AUTH with PublicKey", auth_pkt->client_publickey, sizeof(auth_pkt->client_publickey));
+
+ if (generate_session_keypair_sodium(state) != 0) {
+ LOG(ERROR, "Client session keypair generation failed");
+ return RECV_FATAL;
+ }
+ crypto_secretstream_xchacha20poly1305_init_pull(&state->crypto_rx_state,
+ auth_pkt->server_rx_header,
+ state->session_keys->rx);
+
+ if (ev_protocol_server_helo(state, "Welcome.") != 0) {
+ LOG(ERROR, "Server AUTH response failed");
+ return RECV_FATAL;
+ }
+ if (ev_setup_generic_timer((struct ev_user_data *)state->user_data, PING_INTERVAL) != 0) {
+ LOG(ERROR, "Timer init failed");
+ return RECV_FATAL;
+ }
+
+ state->state = CONNECTION_AUTH_SUCCESS;
+ return RECV_SUCCESS;
+}
+
+enum recv_return protocol_request_server_helo(struct connection * const state,
+ struct protocol_header const * const buffer,
+ size_t * const processed)
+{
+ (void)state;
+ (void)buffer;
+ (void)processed;
+ return RECV_CALLBACK_NOT_IMPLEMENTED;
+}
+
+enum recv_return protocol_request_data(struct connection * const state,
+ struct protocol_header const * const buffer,
+ size_t * const processed)
+{
+ struct protocol_data const * const data_pkt = (struct protocol_data *)buffer;
+ char response[32];
+
+ (void)state;
+ (void)processed;
+ LOG(NOTICE, "Received DATA with size: %u", data_pkt->header.body_size);
+ log_bin2hex_sodium("DATA", data_pkt->payload, data_pkt->header.body_size);
+ recv_data(data_pkt->payload, data_pkt->header.body_size);
+ snprintf(response, sizeof(response), "DATA OK: RECEIVED %u BYTES", data_pkt->header.body_size);
+ if (ev_protocol_data(state, (uint8_t *)response, sizeof(response)) != 0) {
+ return RECV_FATAL;
+ }
+ return RECV_SUCCESS;
+}
+
+enum recv_return protocol_request_ping(struct connection * const state,
+ struct protocol_header const * const buffer,
+ size_t * const processed)
+{
+ struct protocol_ping const * const ping_pkt = (struct protocol_ping *)buffer;
+
+ (void)processed;
+ LOG(NOTICE,
+ "Received PING with timestamp: %.*s / %lluus",
+ sizeof(ping_pkt->timestamp),
+ ping_pkt->timestamp,
+ state->last_ping_recv_usec);
+ if (state->latency_usec > 0.0) {
+ LOG(NOTICE, "PING-PONG latency: %.02lfms", state->latency_usec / 1000.0);
+ }
+
+ if (ev_protocol_pong(state) != 0) {
+ return RECV_FATAL;
+ } else {
+ return RECV_SUCCESS;
+ }
+}
+
+enum recv_return protocol_request_pong(struct connection * const state,
+ struct protocol_header const * const buffer,
+ size_t * const processed)
+{
+ struct protocol_pong const * const pong_pkt = (struct protocol_pong *)buffer;
+
+ (void)processed;
+ LOG(NOTICE,
+ "Received PONG with timestamp: %.*s / %lluus / %zu outstanding PONG's",
+ sizeof(pong_pkt->timestamp),
+ pong_pkt->timestamp,
+ state->last_pong_recv_usec,
+ state->awaiting_pong);
+
+ return RECV_SUCCESS;
+}
+
+void on_disconnect(struct connection * const state)
+{
+ (void)state;
+}
+
+static void event_cb(struct bufferevent * bev, short events, void * con)
+{
+ struct connection * const c = (struct connection *)con;
+ char events_string[64] = {0};
+
+ ev_events_to_string(events, events_string, sizeof(events_string));
+ LOG(LP_DEBUG, "Event(s): 0x%02X (%s)", events, events_string);
+
+ if (events & BEV_EVENT_ERROR) {
+ LOG(ERROR, "Error from bufferevent: %s", strerror(errno));
+ return;
+ }
+ if (events & (BEV_EVENT_EOF | BEV_EVENT_ERROR)) {
+ LOG(NOTICE, "Client closed connection");
+ ev_disconnect(c);
+ return;
+ }
+ if (events & EV_TIMEOUT) {
+ LOG(NOTICE, "Timeout");
+ bufferevent_enable(bev, EV_READ | EV_WRITE);
+ ev_disconnect(c);
+ return;
+ }
+}
+
+static void accept_conn_cb(
+ struct evconnlistener * listener, evutil_socket_t fd, struct sockaddr * address, int socklen, void * user_data)
+{
+ struct connection * c;
+ struct event_base * base;
+ struct bufferevent * bev;
+ char ip_str[INET6_ADDRSTRLEN + 1];
+ struct longterm_keypair const * my_keypair;
+
+ (void)address;
+ (void)socklen;
+
+ if (user_data == NULL) {
+ return;
+ }
+ my_keypair = (struct longterm_keypair *)user_data;
+
+ base = evconnlistener_get_base(listener);
+ bev = bufferevent_socket_new(base, fd, BEV_OPT_CLOSE_ON_FREE | BEV_OPT_DEFER_CALLBACKS | BEV_OPT_UNLOCK_CALLBACKS);
+
+ if (bev == NULL) {
+ return;
+ }
+
+ c = new_connection_from_client(my_keypair);
+ if (c == NULL) {
+ bufferevent_free(bev);
+ return;
+ }
+
+ if (ev_setup_user_data(bev, c) != 0 ||
+ ev_setup_generic_timer((struct ev_user_data *)c->user_data, AUTHENTICATION_TIMEOUT) != 0) {
+ ev_disconnect(c);
+ return;
+ }
+
+ bufferevent_setcb(bev, ev_read_cb, ev_write_cb, event_cb, c);
+ if (bufferevent_enable(bev, EV_READ | EV_WRITE) != 0) {
+ ev_disconnect(c);
+ return;
+ }
+ ev_set_io_timeouts(bev);
+
+ if (inet_ntop(AF_INET, &((struct sockaddr_in *)address)->sin_addr, ip_str, INET_ADDRSTRLEN) == NULL &&
+ inet_ntop(AF_INET6, &((struct sockaddr_in6 *)address)->sin6_addr, ip_str, INET6_ADDRSTRLEN) == NULL) {
+ ip_str[0] = '\0';
+ }
+ LOG(NOTICE, "Accepted %s:%u", ip_str, ntohs(((struct sockaddr_in6 *)address)->sin6_port));
+}
+
+static void accept_error_cb(struct evconnlistener * listener, void * ctx)
+{
+ struct event_base * base = evconnlistener_get_base(listener);
+ int err = EVUTIL_SOCKET_ERROR();
+
+ (void)ctx;
+ LOG(ERROR, "Got an error %d (%s) on the listener.", err, evutil_socket_error_to_string(err));
+ event_base_loopexit(base, NULL);
+}
+
+static void cleanup(struct event_base ** const ev_base,
+ struct evconnlistener ** const ev_listener,
+ struct event ** const ev_sig,
+ struct longterm_keypair ** const my_keypair)
+{
+ if (*my_keypair != NULL) {
+ free(*my_keypair);
+ }
+ if (*ev_sig != NULL) {
+ event_free(*ev_sig);
+ }
+ if (*ev_listener != NULL) {
+ evconnlistener_free(*ev_listener);
+ }
+ if (*ev_base != NULL) {
+ event_base_free(*ev_base);
+ }
+ *my_keypair = NULL;
+ *ev_sig = NULL;
+ *ev_listener = NULL;
+ *ev_base = NULL;
+}
+
+__attribute__((noreturn)) static void cleanup_and_exit(struct event_base ** const ev_base,
+ struct evconnlistener ** const ev_listener,
+ struct event ** const ev_sigint,
+ struct longterm_keypair ** const my_keypair,
+ int exit_code)
+{
+ LOG(LP_DEBUG, "Cleanup and exit with exit code: %d", exit_code);
+ cleanup(ev_base, ev_listener, ev_sigint, my_keypair);
+ exit(exit_code);
+}
+
+int main(int argc, char ** argv)
+{
+ struct longterm_keypair * my_keypair = NULL;
+ struct event_base * ev_base = NULL;
+ struct event * ev_sig = NULL;
+ struct evconnlistener * ev_listener = NULL;
+ struct sockaddr_in sin;
+
+ char ip_str[INET6_ADDRSTRLEN + 1];
+
+ parse_cmdline(&opts, argc, argv);
+ if (opts.key_string != NULL && opts.key_length != crypto_kx_PUBLICKEYBYTES * 2 /* hex string */) {
+ LOG(ERROR, "Invalid server private key length: %zu", opts.key_length);
+ return 1;
+ }
+ if (opts.filepath != NULL) {
+ data_fd = open(opts.filepath, O_WRONLY | O_CREAT, S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH);
+ if (data_fd < 0) {
+ LOG(ERROR, "File '%s' open() error: %s", opts.filepath, strerror(errno));
+ return 1;
+ }
+ }
+ if (opts.port <= 0 || opts.port > 65535) {
+ LOG(ERROR, "Invalid port: %d", opts.port);
+ return 2;
+ }
+
+ srandom(time(NULL));
+
+ if (sodium_init() != 0) {
+ LOG(ERROR, "Sodium init failed");
+ return 2;
+ }
+
+ if (init_sockaddr_inet(&sin, opts.host, opts.port, ip_str) != 0) {
+ return 3;
+ }
+ LOG(NOTICE, "Listen on %s:%u", ip_str, opts.port);
+
+ if (opts.key_string != NULL) {
+ my_keypair = generate_keypair_from_secretkey_hexstr_sodium(opts.key_string, opts.key_length);
+ } else {
+ LOG(NOTICE, "No private key set via command line, generating a new keypair..");
+ my_keypair = generate_keypair_sodium();
+ }
+ if (my_keypair == NULL) {
+ LOG(ERROR, "Sodium keypair generation failed");
+ cleanup_and_exit(&ev_base, &ev_listener, &ev_sig, &my_keypair, 4);
+ }
+ if (opts.key_string == NULL) {
+ log_bin2hex_sodium("Server PrivateKey", my_keypair->secretkey, sizeof(my_keypair->secretkey));
+ }
+ log_bin2hex_sodium("Server PublicKey", my_keypair->publickey, sizeof(my_keypair->publickey));
+
+ ev_base = event_base_new();
+ if (ev_base == NULL) {
+ LOG(ERROR, "Couldn't open event base");
+ cleanup_and_exit(&ev_base, &ev_listener, &ev_sig, &my_keypair, 5);
+ }
+
+ ev_sig = evsignal_new(ev_base, SIGINT, ev_sighandler, event_self_cbarg());
+ if (ev_sig == NULL) {
+ cleanup_and_exit(&ev_base, &ev_listener, &ev_sig, &my_keypair, 6);
+ }
+ if (event_add(ev_sig, NULL) != 0) {
+ cleanup_and_exit(&ev_base, &ev_listener, &ev_sig, &my_keypair, 7);
+ }
+
+ ev_listener = evconnlistener_new_bind(ev_base,
+ accept_conn_cb,
+ my_keypair,
+ LEV_OPT_CLOSE_ON_FREE | LEV_OPT_REUSEABLE,
+ -1,
+ (struct sockaddr *)&sin,
+ sizeof(sin));
+ if (ev_listener == NULL) {
+ LOG(ERROR, "Couldn't create listener: %s", strerror(errno));
+ cleanup_and_exit(&ev_base, &ev_listener, &ev_sig, &my_keypair, 8);
+ }
+ evconnlistener_set_error_cb(ev_listener, accept_error_cb);
+ event_base_dispatch(ev_base);
+
+ LOG(NOTICE, "shutdown");
+ cleanup_and_exit(&ev_base, &ev_listener, &ev_sig, &my_keypair, 0);
+}