Sat Jul 12 2014 17:18:38

Asterisk developer's documentation


tcptls.h
Go to the documentation of this file.
00001 /*
00002  * Asterisk -- An open source telephony toolkit.
00003  *
00004  * Copyright (C) 1999 - 2006, Digium, Inc.
00005  *
00006  * Mark Spencer <markster@digium.com>
00007  *
00008  * See http://www.asterisk.org for more information about
00009  * the Asterisk project. Please do not directly contact
00010  * any of the maintainers of this project for assistance;
00011  * the project provides a web site, mailing lists and IRC
00012  * channels for your use.
00013  *
00014  * This program is free software, distributed under the terms of
00015  * the GNU General Public License Version 2. See the LICENSE file
00016  * at the top of the source tree.
00017  */
00018 
00019 /*!
00020  * \file tcptls.h
00021  *
00022  * \brief Generic support for tcp/tls servers in Asterisk.
00023  * \note In order to have TLS/SSL support, we need the openssl libraries.
00024  * Still we can decide whether or not to use them by commenting
00025  * in or out the DO_SSL macro.
00026  *
00027  * TLS/SSL support is basically implemented by reading from a config file
00028  * (currently manager.conf, http.conf and sip.conf) the names of the certificate
00029  * files and cipher to use, and then run ssl_setup() to create an appropriate 
00030  * data structure named ssl_ctx.
00031  *
00032  * If we support multiple domains, presumably we need to read multiple
00033  * certificates.
00034  *
00035  * When we are requested to open a TLS socket, we run make_file_from_fd()
00036  * on the socket, to do the necessary setup. At the moment the context's name
00037  * is hardwired in the function, but we can certainly make it into an extra
00038  * parameter to the function.
00039  *
00040  * We declare most of ssl support variables unconditionally,
00041  * because their number is small and this simplifies the code.
00042  *
00043  * \note The ssl-support variables (ssl_ctx, do_ssl, certfile, cipher)
00044  * and their setup should be moved to a more central place, e.g. asterisk.conf
00045  * and the source files that processes it. Similarly, ssl_setup() should
00046  * be run earlier in the startup process so modules have it available.
00047  * 
00048  * \ref AstTlsOverview
00049  *
00050  * \todo For SIP, the SubjectAltNames should be checked on verification
00051  *       of the certificate. (Check RFC 5922)
00052  *
00053  */
00054 
00055 #ifndef _ASTERISK_TCPTLS_H
00056 #define _ASTERISK_TCPTLS_H
00057 
00058 #include "asterisk/netsock2.h"
00059 #include "asterisk/utils.h"
00060 
00061 #if defined(HAVE_OPENSSL) && (defined(HAVE_FUNOPEN) || defined(HAVE_FOPENCOOKIE))
00062 #define DO_SSL  /* comment in/out if you want to support ssl */
00063 #endif
00064 
00065 #ifdef DO_SSL
00066 #include <openssl/ssl.h>
00067 #include <openssl/err.h>
00068 #else
00069 /* declare dummy types so we can define a pointer to them */
00070 typedef struct {} SSL;
00071 typedef struct {} SSL_CTX;
00072 #endif /* DO_SSL */
00073 
00074 /*! SSL support */
00075 #define AST_CERTFILE "asterisk.pem"
00076 
00077 enum ast_ssl_flags {
00078    /*! Verify certificate when acting as server */
00079    AST_SSL_VERIFY_CLIENT = (1 << 0),
00080    /*! Don't verify certificate when connecting to a server */
00081    AST_SSL_DONT_VERIFY_SERVER = (1 << 1),
00082    /*! Don't compare "Common Name" against IP or hostname */
00083    AST_SSL_IGNORE_COMMON_NAME = (1 << 2),
00084    /*! Use SSLv2 for outgoing client connections */
00085    AST_SSL_SSLV2_CLIENT = (1 << 3),
00086    /*! Use SSLv3 for outgoing client connections */
00087    AST_SSL_SSLV3_CLIENT = (1 << 4),
00088    /*! Use TLSv1 for outgoing client connections */
00089    AST_SSL_TLSV1_CLIENT = (1 << 5)
00090 };
00091 
00092 struct ast_tls_config {
00093    int enabled;
00094    char *certfile;
00095    char *pvtfile;
00096    char *cipher;
00097    char *cafile;
00098    char *capath;
00099    struct ast_flags flags;
00100    SSL_CTX *ssl_ctx;
00101 };
00102 
00103 /*! \page AstTlsOverview TLS Implementation Overview
00104  *
00105  * The following code implements a generic mechanism for starting
00106  * services on a TCP or TLS socket.
00107  * The service is configured in the struct session_args, and
00108  * then started by calling server_start(desc) on the descriptor.
00109  * server_start() first verifies if an instance of the service is active,
00110  * and in case shuts it down. Then, if the service must be started, creates
00111  * a socket and a thread in charge of doing the accept().
00112  *
00113  * The body of the thread is desc->accept_fn(desc), which the user can define
00114  * freely. We supply a sample implementation, server_root(), structured as an
00115  * infinite loop. At the beginning of each iteration it runs periodic_fn()
00116  * if defined (e.g. to perform some cleanup etc.) then issues a poll()
00117  * or equivalent with a timeout of 'poll_timeout' milliseconds, and if the
00118  * following accept() is successful it creates a thread in charge of
00119  * running the session, whose body is desc->worker_fn(). The argument of
00120  * worker_fn() is a struct ast_tcptls_session_instance, which contains the address
00121  * of the other party, a pointer to desc, the file descriptors (fd) on which
00122  * we can do a select/poll (but NOT I/O), and a FILE *on which we can do I/O.
00123  * We have both because we want to support plain and SSL sockets, and
00124  * going through a FILE * lets us provide the encryption/decryption
00125  * on the stream without using an auxiliary thread.
00126  */
00127 
00128 /*! \brief
00129  * arguments for the accepting thread
00130  */
00131 struct ast_tcptls_session_args {
00132    struct ast_sockaddr local_address;
00133    struct ast_sockaddr old_address; /*!< copy of the local or remote address depending on if its a client or server session */
00134    struct ast_sockaddr remote_address;
00135    char hostname[MAXHOSTNAMELEN]; /*!< only necessary for SSL clients so we can compare to common name */
00136    struct ast_tls_config *tls_cfg; /*!< points to the SSL configuration if any */
00137    int accept_fd;
00138    int poll_timeout;
00139    /*! Server accept_fn thread ID used for external shutdown requests. */
00140    pthread_t master;
00141    void *(*accept_fn)(void *); /*!< the function in charge of doing the accept */
00142    void (*periodic_fn)(void *);/*!< something we may want to run before after select on the accept socket */
00143    void *(*worker_fn)(void *); /*!< the function in charge of doing the actual work */
00144    const char *name;
00145 };
00146 
00147 struct ast_tcptls_stream;
00148 
00149 /*!
00150  * \brief Disable the TCP/TLS stream timeout timer.
00151  *
00152  * \param stream TCP/TLS stream control data.
00153  *
00154  * \return Nothing
00155  */
00156 void ast_tcptls_stream_set_timeout_disable(struct ast_tcptls_stream *stream);
00157 
00158 /*!
00159  * \brief Set the TCP/TLS stream inactivity timeout timer.
00160  *
00161  * \param stream TCP/TLS stream control data.
00162  * \param timeout Number of milliseconds to wait for data transfer with the peer.
00163  *
00164  * \details This is basically how much time we are willing to spend
00165  * in an I/O call before we declare the peer unresponsive.
00166  *
00167  * \note Setting timeout to -1 disables the timeout.
00168  * \note Setting this timeout replaces the I/O sequence timeout timer.
00169  *
00170  * \return Nothing
00171  */
00172 void ast_tcptls_stream_set_timeout_inactivity(struct ast_tcptls_stream *stream, int timeout);
00173 
00174 /*!
00175  * \brief Set the TCP/TLS stream I/O sequence timeout timer.
00176  *
00177  * \param stream TCP/TLS stream control data.
00178  * \param start Time the I/O sequence timer starts.
00179  * \param timeout Number of milliseconds from the start time before timeout.
00180  *
00181  * \details This is how much time are we willing to allow the peer
00182  * to complete an operation that can take several I/O calls.  The
00183  * main use is as an authentication timer with us.
00184  *
00185  * \note Setting timeout to -1 disables the timeout.
00186  * \note Setting this timeout replaces the inactivity timeout timer.
00187  *
00188  * \return Nothing
00189  */
00190 void ast_tcptls_stream_set_timeout_sequence(struct ast_tcptls_stream *stream, struct timeval start, int timeout);
00191 
00192 /*!
00193  * \brief Set the TCP/TLS stream I/O if it can exclusively depend upon the set timeouts.
00194  *
00195  * \param stream TCP/TLS stream control data.
00196  * \param exclusive_input TRUE if stream can exclusively wait for fd input.
00197  * Otherwise, the stream will not wait for fd input.  It will wait while
00198  * trying to send data.
00199  *
00200  * \note The stream timeouts still need to be set.
00201  *
00202  * \return Nothing
00203  */
00204 void ast_tcptls_stream_set_exclusive_input(struct ast_tcptls_stream *stream, int exclusive_input);
00205 
00206 /*! \brief
00207  * describes a server instance
00208  */
00209 struct ast_tcptls_session_instance {
00210    FILE *f;    /*!< fopen/funopen result */
00211    int fd;     /*!< the socket returned by accept() */
00212    SSL *ssl;   /*!< ssl state */
00213 /* iint (*ssl_setup)(SSL *); */
00214    int client;
00215    struct ast_sockaddr remote_address;
00216    struct ast_tcptls_session_args *parent;
00217    /* Sometimes, when an entity reads TCP data, multiple
00218     * logical messages might be read at the same time. In such
00219     * a circumstance, there needs to be a place to stash the
00220     * extra data.
00221     */
00222    struct ast_str *overflow_buf;
00223    /*! ao2 FILE stream cookie object associated with f. */
00224    struct ast_tcptls_stream *stream_cookie;
00225 };
00226 
00227 #if defined(HAVE_FUNOPEN)
00228 #define HOOK_T int
00229 #define LEN_T int
00230 #else
00231 #define HOOK_T ssize_t
00232 #define LEN_T size_t
00233 #endif
00234 
00235 /*! 
00236   * \brief attempts to connect and start tcptls session, on error the tcptls_session's
00237   * ref count is decremented, fd and file are closed, and NULL is returned.
00238   */
00239 struct ast_tcptls_session_instance *ast_tcptls_client_start(struct ast_tcptls_session_instance *tcptls_session);
00240 
00241 /* \brief Creates a client connection's ast_tcptls_session_instance. */
00242 struct ast_tcptls_session_instance *ast_tcptls_client_create(struct ast_tcptls_session_args *desc);
00243 
00244 void *ast_tcptls_server_root(void *);
00245 
00246 /*!
00247  * \brief Closes a tcptls session instance's file and/or file descriptor.
00248  * The tcptls_session will be set to NULL and it's file descriptor will be set to -1
00249  * by this function.
00250  */
00251 void ast_tcptls_close_session_file(struct ast_tcptls_session_instance *tcptls_session);
00252 
00253 /*!
00254  * \brief This is a generic (re)start routine for a TCP server,
00255  * which does the socket/bind/listen and starts a thread for handling
00256  * accept().
00257  * \version 1.6.1 changed desc parameter to be of ast_tcptls_session_args type
00258  */
00259 void ast_tcptls_server_start(struct ast_tcptls_session_args *desc);
00260 
00261 /*!
00262  * \brief Shutdown a running server if there is one
00263  * \version 1.6.1 changed desc parameter to be of ast_tcptls_session_args type
00264  */
00265 void ast_tcptls_server_stop(struct ast_tcptls_session_args *desc);
00266 
00267 /*!
00268  * \brief Set up an SSL server
00269  *
00270  * \param cfg Configuration for the SSL server
00271  * \retval 1 Success
00272  * \retval 0 Failure
00273  */
00274 int ast_ssl_setup(struct ast_tls_config *cfg);
00275 
00276 /*!
00277  * \brief free resources used by an SSL server
00278  *
00279  * \note This only needs to be called if ast_ssl_setup() was
00280  * directly called first.
00281  * \param cfg Configuration for the SSL server
00282  */
00283 void ast_ssl_teardown(struct ast_tls_config *cfg);
00284 
00285 /*!
00286  * \brief Used to parse conf files containing tls/ssl options.
00287  */
00288 int ast_tls_read_conf(struct ast_tls_config *tls_cfg, struct ast_tcptls_session_args *tls_desc, const char *varname, const char *value);
00289 
00290 HOOK_T ast_tcptls_server_read(struct ast_tcptls_session_instance *ser, void *buf, size_t count);
00291 HOOK_T ast_tcptls_server_write(struct ast_tcptls_session_instance *ser, const void *buf, size_t count);
00292 
00293 #endif /* _ASTERISK_TCPTLS_H */