ssl_plugin.c 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427
  1. /*
  2. 3APA3A simpliest proxy server
  3. (c) 2007-2008 by ZARAZA <3APA3A@security.nnov.ru>
  4. please read License Agreement
  5. */
  6. #include "../../structures.h"
  7. #include <openssl/rsa.h> /* SSLeay stuff */
  8. #include <openssl/crypto.h>
  9. #include <openssl/x509.h>
  10. #include <openssl/pem.h>
  11. #include <openssl/ssl.h>
  12. #include "../../proxy.h"
  13. #include "my_ssl.h"
  14. #ifndef _WIN32
  15. #define WINAPI
  16. #endif
  17. #ifdef __cplusplus
  18. extern "C" {
  19. #endif
  20. #ifndef isnumber
  21. #define isnumber(i_n_arg) ((i_n_arg>='0')&&(i_n_arg<='9'))
  22. #endif
  23. PROXYFUNC tcppmfunc, proxyfunc, smtppfunc, ftpprfunc;
  24. static struct pluginlink * pl;
  25. pthread_mutex_t ssl_mutex;
  26. static int ssl_loaded = 0;
  27. static int ssl_connect_timeout = 0;
  28. char *cert_path = "";
  29. typedef struct _ssl_conn {
  30. struct SSL_CTX *ctx;
  31. struct SSL *ssl;
  32. } ssl_conn;
  33. struct SSLqueue {
  34. struct SSLqueue *next;
  35. SOCKET s;
  36. SSL_CERT cert;
  37. SSL_CONN conn;
  38. struct clientparam* param;
  39. } *SSLq = NULL;
  40. /*
  41. TO DO: use hashtable
  42. */
  43. static struct SSLqueue *searchSSL(SOCKET s){
  44. struct SSLqueue *sslq = NULL;
  45. pthread_mutex_lock(&ssl_mutex);
  46. for(sslq = SSLq; sslq; sslq = sslq->next)
  47. if(sslq->s == s) break;
  48. pthread_mutex_unlock(&ssl_mutex);
  49. return sslq;
  50. }
  51. static void addSSL(SOCKET s, SSL_CERT cert, SSL_CONN conn, struct clientparam* param){
  52. struct SSLqueue *sslq;
  53. sslq = (struct SSLqueue *) malloc(sizeof(struct SSLqueue));
  54. sslq->s = s;
  55. sslq->cert = cert;
  56. sslq->conn = conn;
  57. sslq->param = param;
  58. pthread_mutex_lock(&ssl_mutex);
  59. sslq->next = SSLq;
  60. SSLq = sslq;
  61. pthread_mutex_unlock(&ssl_mutex);
  62. }
  63. int delSSL(SOCKET s){
  64. struct SSLqueue *sqi, *sqt = NULL;
  65. if(!SSLq) return 0;
  66. pthread_mutex_lock(&ssl_mutex);
  67. if(SSLq){
  68. if(SSLq->s == s){
  69. sqt = SSLq;
  70. SSLq = SSLq->next;
  71. }
  72. else for(sqi = SSLq; sqi->next; sqi = sqi->next){
  73. if (sqi->next->s == s){
  74. sqt = sqi->next;
  75. sqi->next = sqt->next;
  76. break;
  77. }
  78. }
  79. }
  80. pthread_mutex_unlock(&ssl_mutex);
  81. if(sqt) {
  82. _ssl_cert_free(sqt->cert);
  83. ssl_conn_free(sqt->conn);
  84. free(sqt);
  85. return 1;
  86. }
  87. return 0;
  88. }
  89. struct sockfuncs sso;
  90. #ifdef _WIN32
  91. static int WINAPI ssl_send(SOCKET s, const void *msg, int len, int flags){
  92. #else
  93. static int ssl_send(SOCKET s, const void *msg, size_t len, int flags){
  94. #endif
  95. struct SSLqueue *sslq;
  96. if ((sslq = searchSSL(s))){
  97. int res, err;
  98. if((res = ssl_write(sslq->conn, (void *)msg, len)) <= 0){
  99. err = SSL_get_error((SSL *)((ssl_conn*)sslq->conn)->ssl, res);
  100. if (err == SSL_ERROR_WANT_WRITE){
  101. _set_errno(EAGAIN);
  102. return -1;
  103. }
  104. else _set_errno(err);
  105. }
  106. return res;
  107. }
  108. return sso._send(s, msg, len, flags);
  109. }
  110. #ifdef _WIN32
  111. static int WINAPI ssl_sendto(SOCKET s, const void *msg, int len, int flags, const struct sockaddr *to, int tolen){
  112. #else
  113. static int ssl_sendto(SOCKET s, const void *msg, size_t len, int flags, const struct sockaddr *to, SASIZETYPE tolen){
  114. #endif
  115. struct SSLqueue *sslq;
  116. if ((sslq = searchSSL(s))){
  117. int res, err;
  118. if((res = ssl_write(sslq->conn, (void *)msg, len)) <= 0) {
  119. err = SSL_get_error((SSL *)((ssl_conn*)sslq->conn)->ssl, res);
  120. if (err == SSL_ERROR_WANT_WRITE){
  121. _set_errno(EAGAIN);
  122. return -1;
  123. }
  124. else _set_errno(err);
  125. }
  126. return res;
  127. }
  128. return sso._sendto(s, msg, len, flags, to, tolen);
  129. }
  130. #ifdef _WIN32
  131. static int WINAPI ssl_recvfrom(SOCKET s, void *msg, int len, int flags, struct sockaddr *from, int *fromlen){
  132. #else
  133. static int ssl_recvfrom(SOCKET s, void *msg, size_t len, int flags, struct sockaddr *from, SASIZETYPE *fromlen){
  134. #endif
  135. struct SSLqueue *sslq;
  136. if ((sslq = searchSSL(s))){
  137. int res, err;
  138. if((res = ssl_read(sslq->conn, (void *)msg, len)) <= 0) {
  139. err = SSL_get_error((SSL *)((ssl_conn*)sslq->conn)->ssl, res);
  140. if (err == SSL_ERROR_WANT_READ) {
  141. _set_errno(EAGAIN);
  142. return -1;
  143. }
  144. else _set_errno(err);
  145. }
  146. return res;
  147. }
  148. return sso._recvfrom(s, msg, len, flags, from, fromlen);
  149. }
  150. #ifdef _WIN32
  151. static int WINAPI ssl_recv(SOCKET s, void *msg, int len, int flags){
  152. #else
  153. static int WINAPI ssl_recv(SOCKET s, void *msg, size_t len, int flags){
  154. #endif
  155. struct SSLqueue *sslq;
  156. if ((sslq = searchSSL(s))){
  157. int res, err;
  158. if((res = ssl_read(sslq->conn, (void *)msg, len)) <= 0) {
  159. err = SSL_get_error((SSL *)((ssl_conn*)sslq->conn)->ssl, res);
  160. if (err == SSL_ERROR_WANT_READ) {
  161. _set_errno(EAGAIN);
  162. return -1;
  163. }
  164. else _set_errno(err);
  165. }
  166. return res;
  167. }
  168. return sso._recv(s, msg, len, flags);
  169. }
  170. static int WINAPI ssl_closesocket(SOCKET s){
  171. delSSL(s);
  172. return sso._closesocket(s);
  173. }
  174. static int WINAPI ssl_poll(struct pollfd *fds, unsigned int nfds, int timeout){
  175. struct SSLqueue *sslq = NULL;
  176. unsigned int i;
  177. int ret = 0;
  178. for(i = 0; i < nfds; i++){
  179. if((fds[i].events & POLLIN) && (sslq = searchSSL(fds[i].fd)) && ssl_pending(sslq->conn)){
  180. fds[i].revents = POLLIN;
  181. ret++;
  182. }
  183. else fds[i].revents = 0;
  184. }
  185. if(ret) return ret;
  186. ret = sso._poll(fds, nfds, timeout);
  187. return ret;
  188. }
  189. int dossl(struct clientparam* param, SSL_CONN* ServerConnp, SSL_CONN* ClientConnp){
  190. SSL_CERT ServerCert=NULL, FakeCert=NULL;
  191. SSL_CONN ServerConn, ClientConn;
  192. char *errSSL=NULL;
  193. unsigned long ul;
  194. #ifdef _WIN32
  195. ul = 0;
  196. ioctlsocket(param->remsock, FIONBIO, &ul);
  197. ul = 0;
  198. ioctlsocket(param->clisock, FIONBIO, &ul);
  199. #else
  200. fcntl(param->remsock,F_SETFL,0);
  201. fcntl(param->clisock,F_SETFL,0);
  202. #endif
  203. if(ssl_connect_timeout){
  204. ul = ((unsigned long)ssl_connect_timeout)*1000;
  205. setsockopt(param->remsock, SOL_SOCKET, SO_RCVTIMEO, (char *)&ul, 4);
  206. ul = ((unsigned long)ssl_connect_timeout)*1000;
  207. setsockopt(param->remsock, SOL_SOCKET, SO_SNDTIMEO, (char *)&ul, 4);
  208. }
  209. ServerConn = ssl_handshake_to_server(param->remsock, (char *)param->hostname, &ServerCert, &errSSL);
  210. if ( ServerConn == NULL || ServerCert == NULL ) {
  211. param->res = 8011;
  212. param->srv->logfunc(param, (unsigned char *)"SSL handshake to server failed");
  213. if(ServerConn == NULL) param->srv->logfunc(param, (unsigned char *)"ServerConn is NULL");
  214. if(ServerCert == NULL) param->srv->logfunc(param, (unsigned char *)"ServerCert is NULL");
  215. if(errSSL)param->srv->logfunc(param, (unsigned char *)errSSL);
  216. return 1;
  217. }
  218. FakeCert = ssl_copy_cert(ServerCert);
  219. if ( FakeCert == NULL ) {
  220. param->res = 8012;
  221. _ssl_cert_free(ServerCert);
  222. param->srv->logfunc(param, (unsigned char *)"Failed to create certificate copy");
  223. ssl_conn_free(ServerConn);
  224. return 2;
  225. }
  226. ClientConn = ssl_handshake_to_client(param->clisock, FakeCert, &errSSL);
  227. if ( ClientConn == NULL ) {
  228. param->res = 8012;
  229. param->srv->logfunc(param, (unsigned char *)"Handshake to client failed");
  230. if(errSSL)param->srv->logfunc(param, (unsigned char *)errSSL);
  231. _ssl_cert_free(ServerCert);
  232. _ssl_cert_free(FakeCert);
  233. ssl_conn_free(ServerConn);
  234. return 3;
  235. }
  236. #ifdef _WIN32
  237. ul = 1;
  238. ioctlsocket(param->remsock, FIONBIO, &ul);
  239. ul = 1;
  240. ioctlsocket(param->clisock, FIONBIO, &ul);
  241. #else
  242. fcntl(param->remsock,F_SETFL,O_NONBLOCK);
  243. fcntl(param->clisock,F_SETFL,O_NONBLOCK);
  244. #endif
  245. SSL_set_mode((SSL *)((ssl_conn *)ServerConn)->ssl, SSL_MODE_ENABLE_PARTIAL_WRITE|SSL_MODE_AUTO_RETRY);
  246. SSL_set_mode((SSL *)((ssl_conn *)ClientConn)->ssl, SSL_MODE_ENABLE_PARTIAL_WRITE|SSL_MODE_AUTO_RETRY);
  247. SSL_set_read_ahead((SSL *)((ssl_conn *)ServerConn)->ssl, 0);
  248. SSL_set_read_ahead((SSL *)((ssl_conn *)ClientConn)->ssl, 0);
  249. addSSL(param->remsock, ServerCert, ServerConn, param);
  250. addSSL(param->clisock, FakeCert, ClientConn, param);
  251. if(ServerConnp)*ServerConnp = ServerConn;
  252. if(ClientConnp)*ClientConnp = ClientConn;
  253. return 0;
  254. }
  255. static void* ssl_filter_open(void * idata, struct srvparam * param){
  256. return idata;
  257. }
  258. static FILTER_ACTION ssl_filter_client(void *fo, struct clientparam * param, void** fc){
  259. return CONTINUE;
  260. }
  261. static FILTER_ACTION ssl_filter_predata(void *fo, struct clientparam * param){
  262. if(param->operation != HTTP_CONNECT) return PASS;
  263. if(dossl(param, NULL, NULL)) {
  264. return REJECT;
  265. }
  266. param->redirectfunc = proxyfunc;
  267. return HANDLED;
  268. }
  269. static void ssl_filter_clear(void *fo){
  270. }
  271. static void ssl_filter_close(void *fo){
  272. }
  273. static struct filter ssl_filter = {
  274. NULL,
  275. "ssl filter",
  276. "ssl filter",
  277. ssl_filter_open,
  278. ssl_filter_client,
  279. NULL, NULL, NULL, ssl_filter_predata, NULL, NULL,
  280. ssl_filter_clear,
  281. ssl_filter_close
  282. };
  283. int mitm = 0;
  284. int ssl_inited = 0;
  285. static int h_mitm(int argc, unsigned char **argv){
  286. if(!ssl_inited) {
  287. ssl_init();
  288. ssl_inited = 1;
  289. }
  290. if((mitm&1)) return 1;
  291. if(mitm) usleep(100*SLEEPTIME);
  292. ssl_filter.next = pl->conf->filters;
  293. pl->conf->filters = &ssl_filter;
  294. mitm++;
  295. return 0;
  296. }
  297. static int h_nomitm(int argc, unsigned char **argv){
  298. struct filter * sf;
  299. if(!(mitm&1)) return 1;
  300. if(mitm) usleep(100*SLEEPTIME);
  301. if(pl->conf->filters == &ssl_filter) pl->conf->filters = ssl_filter.next;
  302. else for(sf = pl->conf->filters; sf && sf->next; sf=sf->next){
  303. if(sf->next == &ssl_filter) {
  304. sf->next = ssl_filter.next;
  305. break;
  306. }
  307. }
  308. mitm++;
  309. return 0;
  310. }
  311. static int h_certpath(int argc, unsigned char **argv){
  312. size_t len;
  313. len = strlen(argv[1]);
  314. if(!len || (argv[1][len - 1] != '/' && argv[1][len - 1] != '\\')) return 1;
  315. if(cert_path && *cert_path) free(cert_path);
  316. cert_path = strdup(argv[1]);
  317. return 0;
  318. }
  319. static struct commands ssl_commandhandlers[] = {
  320. {ssl_commandhandlers+1, "ssl_mitm", h_mitm, 1, 1},
  321. {ssl_commandhandlers+2, "ssl_nomitm", h_nomitm, 1, 1},
  322. {NULL, "ssl_certcache", h_certpath, 2, 2},
  323. };
  324. #ifdef WATCOM
  325. #pragma aux ssl_plugin "*" parm caller [ ] value struct float struct routine [eax] modify [eax ecx edx]
  326. #undef PLUGINCALL
  327. #define PLUGINCALL
  328. #endif
  329. PLUGINAPI int PLUGINCALL ssl_plugin (struct pluginlink * pluginlink,
  330. int argc, char** argv){
  331. pl = pluginlink;
  332. if(!ssl_loaded){
  333. ssl_loaded = 1;
  334. pthread_mutex_init(&ssl_mutex, NULL);
  335. memcpy(&sso, pl->so, sizeof(struct sockfuncs));
  336. pl->so->_send = ssl_send;
  337. pl->so->_recv = ssl_recv;
  338. pl->so->_sendto = ssl_sendto;
  339. pl->so->_recvfrom = ssl_recvfrom;
  340. pl->so->_closesocket = ssl_closesocket;
  341. pl->so->_poll = ssl_poll;
  342. ssl_commandhandlers[2].next = pl->commandhandlers->next;
  343. pl->commandhandlers->next = ssl_commandhandlers;
  344. }
  345. else {
  346. ssl_release();
  347. ssl_inited = 0;
  348. }
  349. tcppmfunc = (PROXYFUNC)pl->findbyname("tcppm");
  350. if(!tcppmfunc){return 13;}
  351. proxyfunc = (PROXYFUNC)pl->findbyname("proxy");
  352. if(!proxyfunc)proxyfunc = tcppmfunc;
  353. smtppfunc = (PROXYFUNC)pl->findbyname("smtpp");
  354. if(!smtppfunc)smtppfunc = tcppmfunc;
  355. ftpprfunc = (PROXYFUNC)pl->findbyname("ftppr");
  356. if(!ftpprfunc)ftpprfunc = tcppmfunc;
  357. return 0;
  358. }
  359. #ifdef __cplusplus
  360. }
  361. #endif