| 1 | /* |
| 2 | Copyright (c) 2007-2016 Contributors as noted in the AUTHORS file |
| 3 | |
| 4 | This file is part of libzmq, the ZeroMQ core engine in C++. |
| 5 | |
| 6 | libzmq is free software; you can redistribute it and/or modify it under |
| 7 | the terms of the GNU Lesser General Public License (LGPL) as published |
| 8 | by the Free Software Foundation; either version 3 of the License, or |
| 9 | (at your option) any later version. |
| 10 | |
| 11 | As a special exception, the Contributors give you permission to link |
| 12 | this library with independent modules to produce an executable, |
| 13 | regardless of the license terms of these independent modules, and to |
| 14 | copy and distribute the resulting executable under terms of your choice, |
| 15 | provided that you also meet, for each linked independent module, the |
| 16 | terms and conditions of the license of that module. An independent |
| 17 | module is a module which is not derived from or based on this library. |
| 18 | If you modify this library, you must extend this exception to your |
| 19 | version of the library. |
| 20 | |
| 21 | libzmq is distributed in the hope that it will be useful, but WITHOUT |
| 22 | ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or |
| 23 | FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public |
| 24 | License for more details. |
| 25 | |
| 26 | You should have received a copy of the GNU Lesser General Public License |
| 27 | along with this program. If not, see <http://www.gnu.org/licenses/>. |
| 28 | */ |
| 29 | |
| 30 | #include "precompiled.hpp" |
| 31 | #include <new> |
| 32 | #include <string> |
| 33 | |
| 34 | #include "macros.hpp" |
| 35 | #include "socks_connecter.hpp" |
| 36 | #include "random.hpp" |
| 37 | #include "err.hpp" |
| 38 | #include "ip.hpp" |
| 39 | #include "tcp.hpp" |
| 40 | #include "address.hpp" |
| 41 | #include "tcp_address.hpp" |
| 42 | #include "session_base.hpp" |
| 43 | #include "socks.hpp" |
| 44 | |
| 45 | #ifndef ZMQ_HAVE_WINDOWS |
| 46 | #include <unistd.h> |
| 47 | #include <sys/types.h> |
| 48 | #include <sys/socket.h> |
| 49 | #if defined ZMQ_HAVE_VXWORKS |
| 50 | #include <sockLib.h> |
| 51 | #endif |
| 52 | #endif |
| 53 | |
| 54 | zmq::socks_connecter_t::socks_connecter_t (class io_thread_t *io_thread_, |
| 55 | class session_base_t *session_, |
| 56 | const options_t &options_, |
| 57 | address_t *addr_, |
| 58 | address_t *proxy_addr_, |
| 59 | bool delayed_start_) : |
| 60 | stream_connecter_base_t ( |
| 61 | io_thread_, session_, options_, addr_, delayed_start_), |
| 62 | _proxy_addr (proxy_addr_), |
| 63 | _auth_method (socks_no_auth_required), |
| 64 | _status (unplugged) |
| 65 | { |
| 66 | zmq_assert (_addr->protocol == protocol_name::tcp); |
| 67 | _proxy_addr->to_string (_endpoint); |
| 68 | } |
| 69 | |
| 70 | zmq::socks_connecter_t::~socks_connecter_t () |
| 71 | { |
| 72 | LIBZMQ_DELETE (_proxy_addr); |
| 73 | } |
| 74 | |
| 75 | void zmq::socks_connecter_t::set_auth_method_none () |
| 76 | { |
| 77 | _auth_method = socks_no_auth_required; |
| 78 | _auth_username.clear (); |
| 79 | _auth_password.clear (); |
| 80 | } |
| 81 | |
| 82 | void zmq::socks_connecter_t::set_auth_method_basic ( |
| 83 | const std::string &username_, const std::string &password_) |
| 84 | { |
| 85 | _auth_method = socks_basic_auth; |
| 86 | _auth_username = username_; |
| 87 | _auth_password = password_; |
| 88 | } |
| 89 | |
| 90 | void zmq::socks_connecter_t::in_event () |
| 91 | { |
| 92 | int expected_status = -1; |
| 93 | zmq_assert (_status != unplugged); |
| 94 | |
| 95 | if (_status == waiting_for_choice) { |
| 96 | int rc = _choice_decoder.input (_s); |
| 97 | if (rc == 0 || rc == -1) |
| 98 | error (); |
| 99 | else if (_choice_decoder.message_ready ()) { |
| 100 | const socks_choice_t choice = _choice_decoder.decode (); |
| 101 | rc = process_server_response (choice); |
| 102 | if (rc == -1) |
| 103 | error (); |
| 104 | else { |
| 105 | if (choice.method == socks_basic_auth) |
| 106 | expected_status = sending_basic_auth_request; |
| 107 | else |
| 108 | expected_status = sending_request; |
| 109 | } |
| 110 | } |
| 111 | } else if (_status == waiting_for_auth_response) { |
| 112 | int rc = _auth_response_decoder.input (_s); |
| 113 | if (rc == 0 || rc == -1) |
| 114 | error (); |
| 115 | else if (_auth_response_decoder.message_ready ()) { |
| 116 | const socks_auth_response_t auth_response = |
| 117 | _auth_response_decoder.decode (); |
| 118 | rc = process_server_response (auth_response); |
| 119 | if (rc == -1) |
| 120 | error (); |
| 121 | else { |
| 122 | expected_status = sending_request; |
| 123 | } |
| 124 | } |
| 125 | } else if (_status == waiting_for_response) { |
| 126 | int rc = _response_decoder.input (_s); |
| 127 | if (rc == 0 || rc == -1) |
| 128 | error (); |
| 129 | else if (_response_decoder.message_ready ()) { |
| 130 | const socks_response_t response = _response_decoder.decode (); |
| 131 | rc = process_server_response (response); |
| 132 | if (rc == -1) |
| 133 | error (); |
| 134 | else { |
| 135 | rm_handle (); |
| 136 | create_engine ( |
| 137 | _s, get_socket_name<tcp_address_t> (_s, socket_end_local)); |
| 138 | _s = -1; |
| 139 | _status = unplugged; |
| 140 | } |
| 141 | } |
| 142 | } else |
| 143 | error (); |
| 144 | |
| 145 | if (expected_status == sending_basic_auth_request) { |
| 146 | _basic_auth_request_encoder.encode ( |
| 147 | socks_basic_auth_request_t (_auth_username, _auth_password)); |
| 148 | reset_pollin (_handle); |
| 149 | set_pollout (_handle); |
| 150 | _status = sending_basic_auth_request; |
| 151 | } else if (expected_status == sending_request) { |
| 152 | std::string hostname; |
| 153 | uint16_t port = 0; |
| 154 | if (parse_address (_addr->address, hostname, port) == -1) |
| 155 | error (); |
| 156 | else { |
| 157 | _request_encoder.encode (socks_request_t (1, hostname, port)); |
| 158 | reset_pollin (_handle); |
| 159 | set_pollout (_handle); |
| 160 | _status = sending_request; |
| 161 | } |
| 162 | } |
| 163 | } |
| 164 | |
| 165 | void zmq::socks_connecter_t::out_event () |
| 166 | { |
| 167 | zmq_assert ( |
| 168 | _status == waiting_for_proxy_connection || _status == sending_greeting |
| 169 | || _status == sending_basic_auth_request || _status == sending_request); |
| 170 | |
| 171 | if (_status == waiting_for_proxy_connection) { |
| 172 | const int rc = static_cast<int> (check_proxy_connection ()); |
| 173 | if (rc == -1) |
| 174 | error (); |
| 175 | else { |
| 176 | _greeting_encoder.encode (socks_greeting_t (_auth_method)); |
| 177 | _status = sending_greeting; |
| 178 | } |
| 179 | } else if (_status == sending_greeting) { |
| 180 | zmq_assert (_greeting_encoder.has_pending_data ()); |
| 181 | const int rc = _greeting_encoder.output (_s); |
| 182 | if (rc == -1 || rc == 0) |
| 183 | error (); |
| 184 | else if (!_greeting_encoder.has_pending_data ()) { |
| 185 | reset_pollout (_handle); |
| 186 | set_pollin (_handle); |
| 187 | _status = waiting_for_choice; |
| 188 | } |
| 189 | } else if (_status == sending_basic_auth_request) { |
| 190 | zmq_assert (_basic_auth_request_encoder.has_pending_data ()); |
| 191 | const int rc = _basic_auth_request_encoder.output (_s); |
| 192 | if (rc == -1 || rc == 0) |
| 193 | error (); |
| 194 | else if (!_basic_auth_request_encoder.has_pending_data ()) { |
| 195 | reset_pollout (_handle); |
| 196 | set_pollin (_handle); |
| 197 | _status = waiting_for_auth_response; |
| 198 | } |
| 199 | } else { |
| 200 | zmq_assert (_request_encoder.has_pending_data ()); |
| 201 | const int rc = _request_encoder.output (_s); |
| 202 | if (rc == -1 || rc == 0) |
| 203 | error (); |
| 204 | else if (!_request_encoder.has_pending_data ()) { |
| 205 | reset_pollout (_handle); |
| 206 | set_pollin (_handle); |
| 207 | _status = waiting_for_response; |
| 208 | } |
| 209 | } |
| 210 | } |
| 211 | |
| 212 | void zmq::socks_connecter_t::start_connecting () |
| 213 | { |
| 214 | zmq_assert (_status == unplugged); |
| 215 | |
| 216 | // Open the connecting socket. |
| 217 | const int rc = connect_to_proxy (); |
| 218 | |
| 219 | // Connect may succeed in synchronous manner. |
| 220 | if (rc == 0) { |
| 221 | _handle = add_fd (_s); |
| 222 | set_pollout (_handle); |
| 223 | _status = sending_greeting; |
| 224 | } |
| 225 | // Connection establishment may be delayed. Poll for its completion. |
| 226 | else if (errno == EINPROGRESS) { |
| 227 | _handle = add_fd (_s); |
| 228 | set_pollout (_handle); |
| 229 | _status = waiting_for_proxy_connection; |
| 230 | _socket->event_connect_delayed ( |
| 231 | make_unconnected_connect_endpoint_pair (_endpoint), zmq_errno ()); |
| 232 | } |
| 233 | // Handle any other error condition by eventual reconnect. |
| 234 | else { |
| 235 | if (_s != retired_fd) |
| 236 | close (); |
| 237 | add_reconnect_timer (); |
| 238 | } |
| 239 | } |
| 240 | |
| 241 | int zmq::socks_connecter_t::process_server_response ( |
| 242 | const socks_choice_t &response_) |
| 243 | { |
| 244 | return response_.method == socks_no_auth_required |
| 245 | || response_.method == socks_basic_auth |
| 246 | ? 0 |
| 247 | : -1; |
| 248 | } |
| 249 | |
| 250 | int zmq::socks_connecter_t::process_server_response ( |
| 251 | const socks_response_t &response_) |
| 252 | { |
| 253 | return response_.response_code == 0 ? 0 : -1; |
| 254 | } |
| 255 | |
| 256 | int zmq::socks_connecter_t::process_server_response ( |
| 257 | const socks_auth_response_t &response_) |
| 258 | { |
| 259 | return response_.response_code == 0 ? 0 : -1; |
| 260 | } |
| 261 | |
| 262 | void zmq::socks_connecter_t::error () |
| 263 | { |
| 264 | rm_fd (_handle); |
| 265 | close (); |
| 266 | _greeting_encoder.reset (); |
| 267 | _choice_decoder.reset (); |
| 268 | _basic_auth_request_encoder.reset (); |
| 269 | _auth_response_decoder.reset (); |
| 270 | _request_encoder.reset (); |
| 271 | _response_decoder.reset (); |
| 272 | _status = unplugged; |
| 273 | add_reconnect_timer (); |
| 274 | } |
| 275 | |
| 276 | int zmq::socks_connecter_t::connect_to_proxy () |
| 277 | { |
| 278 | zmq_assert (_s == retired_fd); |
| 279 | |
| 280 | // Resolve the address |
| 281 | if (_proxy_addr->resolved.tcp_addr != NULL) { |
| 282 | LIBZMQ_DELETE (_proxy_addr->resolved.tcp_addr); |
| 283 | } |
| 284 | |
| 285 | _proxy_addr->resolved.tcp_addr = new (std::nothrow) tcp_address_t (); |
| 286 | alloc_assert (_proxy_addr->resolved.tcp_addr); |
| 287 | // Automatic fallback to ipv4 is disabled here since this was the existing |
| 288 | // behaviour, however I don't see a real reason for this. Maybe this can |
| 289 | // be changed to true (and then the parameter can be removed entirely). |
| 290 | _s = tcp_open_socket (_proxy_addr->address.c_str (), options, false, false, |
| 291 | _proxy_addr->resolved.tcp_addr); |
| 292 | if (_s == retired_fd) { |
| 293 | // TODO we should emit some event in this case! |
| 294 | LIBZMQ_DELETE (_proxy_addr->resolved.tcp_addr); |
| 295 | return -1; |
| 296 | } |
| 297 | zmq_assert (_proxy_addr->resolved.tcp_addr != NULL); |
| 298 | |
| 299 | // Set the socket to non-blocking mode so that we get async connect(). |
| 300 | unblock_socket (_s); |
| 301 | |
| 302 | const tcp_address_t *const tcp_addr = _proxy_addr->resolved.tcp_addr; |
| 303 | |
| 304 | int rc; |
| 305 | |
| 306 | // Set a source address for conversations |
| 307 | if (tcp_addr->has_src_addr ()) { |
| 308 | #if defined ZMQ_HAVE_VXWORKS |
| 309 | rc = ::bind (_s, (sockaddr *) tcp_addr->src_addr (), |
| 310 | tcp_addr->src_addrlen ()); |
| 311 | #else |
| 312 | rc = ::bind (_s, tcp_addr->src_addr (), tcp_addr->src_addrlen ()); |
| 313 | #endif |
| 314 | if (rc == -1) { |
| 315 | close (); |
| 316 | return -1; |
| 317 | } |
| 318 | } |
| 319 | |
| 320 | // Connect to the remote peer. |
| 321 | #if defined ZMQ_HAVE_VXWORKS |
| 322 | rc = ::connect (_s, (sockaddr *) tcp_addr->addr (), tcp_addr->addrlen ()); |
| 323 | #else |
| 324 | rc = ::connect (_s, tcp_addr->addr (), tcp_addr->addrlen ()); |
| 325 | #endif |
| 326 | // Connect was successful immediately. |
| 327 | if (rc == 0) |
| 328 | return 0; |
| 329 | |
| 330 | // Translate error codes indicating asynchronous connect has been |
| 331 | // launched to a uniform EINPROGRESS. |
| 332 | #ifdef ZMQ_HAVE_WINDOWS |
| 333 | const int last_error = WSAGetLastError (); |
| 334 | if (last_error == WSAEINPROGRESS || last_error == WSAEWOULDBLOCK) |
| 335 | errno = EINPROGRESS; |
| 336 | else { |
| 337 | errno = wsa_error_to_errno (last_error); |
| 338 | close (); |
| 339 | } |
| 340 | #else |
| 341 | if (errno == EINTR) |
| 342 | errno = EINPROGRESS; |
| 343 | #endif |
| 344 | return -1; |
| 345 | } |
| 346 | |
| 347 | zmq::fd_t zmq::socks_connecter_t::check_proxy_connection () |
| 348 | { |
| 349 | // Async connect has finished. Check whether an error occurred |
| 350 | int err = 0; |
| 351 | #if defined ZMQ_HAVE_HPUX || defined ZMQ_HAVE_VXWORKS |
| 352 | int len = sizeof err; |
| 353 | #else |
| 354 | socklen_t len = sizeof err; |
| 355 | #endif |
| 356 | |
| 357 | int rc = getsockopt (_s, SOL_SOCKET, SO_ERROR, |
| 358 | reinterpret_cast<char *> (&err), &len); |
| 359 | |
| 360 | // Assert if the error was caused by 0MQ bug. |
| 361 | // Networking problems are OK. No need to assert. |
| 362 | #ifdef ZMQ_HAVE_WINDOWS |
| 363 | zmq_assert (rc == 0); |
| 364 | if (err != 0) { |
| 365 | wsa_assert (err == WSAECONNREFUSED || err == WSAETIMEDOUT |
| 366 | || err == WSAECONNABORTED || err == WSAEHOSTUNREACH |
| 367 | || err == WSAENETUNREACH || err == WSAENETDOWN |
| 368 | || err == WSAEACCES || err == WSAEINVAL |
| 369 | || err == WSAEADDRINUSE); |
| 370 | return -1; |
| 371 | } |
| 372 | #else |
| 373 | // Following code should handle both Berkeley-derived socket |
| 374 | // implementations and Solaris. |
| 375 | if (rc == -1) |
| 376 | err = errno; |
| 377 | if (err != 0) { |
| 378 | errno = err; |
| 379 | errno_assert (errno == ECONNREFUSED || errno == ECONNRESET |
| 380 | || errno == ETIMEDOUT || errno == EHOSTUNREACH |
| 381 | || errno == ENETUNREACH || errno == ENETDOWN |
| 382 | || errno == EINVAL); |
| 383 | return -1; |
| 384 | } |
| 385 | #endif |
| 386 | |
| 387 | rc = tune_tcp_socket (_s); |
| 388 | rc = rc |
| 389 | | tune_tcp_keepalives ( |
| 390 | _s, options.tcp_keepalive, options.tcp_keepalive_cnt, |
| 391 | options.tcp_keepalive_idle, options.tcp_keepalive_intvl); |
| 392 | if (rc != 0) |
| 393 | return -1; |
| 394 | |
| 395 | return 0; |
| 396 | } |
| 397 | |
| 398 | int zmq::socks_connecter_t::parse_address (const std::string &address_, |
| 399 | std::string &hostname_, |
| 400 | uint16_t &port_) |
| 401 | { |
| 402 | // Find the ':' at end that separates address from the port number. |
| 403 | const size_t idx = address_.rfind (':'); |
| 404 | if (idx == std::string::npos) { |
| 405 | errno = EINVAL; |
| 406 | return -1; |
| 407 | } |
| 408 | |
| 409 | // Extract hostname |
| 410 | if (idx < 2 || address_[0] != '[' || address_[idx - 1] != ']') |
| 411 | hostname_ = address_.substr (0, idx); |
| 412 | else |
| 413 | hostname_ = address_.substr (1, idx - 2); |
| 414 | |
| 415 | // Separate the hostname/port. |
| 416 | const std::string port_str = address_.substr (idx + 1); |
| 417 | // Parse the port number (0 is not a valid port). |
| 418 | port_ = static_cast<uint16_t> (atoi (port_str.c_str ())); |
| 419 | if (port_ == 0) { |
| 420 | errno = EINVAL; |
| 421 | return -1; |
| 422 | } |
| 423 | return 0; |
| 424 | } |
| 425 | |