00001 /* 00002 * Asterisk -- An open source telephony toolkit. 00003 * 00004 * Copyright (C) 1999 - 2006, Digium, Inc. 00005 * 00006 * Mark Spencer <markster@digium.com> 00007 * 00008 * See http://www.asterisk.org for more information about 00009 * the Asterisk project. Please do not directly contact 00010 * any of the maintainers of this project for assistance; 00011 * the project provides a web site, mailing lists and IRC 00012 * channels for your use. 00013 * 00014 * This program is free software, distributed under the terms of 00015 * the GNU General Public License Version 2. See the LICENSE file 00016 * at the top of the source tree. 00017 */ 00018 00019 /*! 00020 * \file tcptls.h 00021 * 00022 * \brief Generic support for tcp/tls servers in Asterisk. 00023 * \note In order to have TLS/SSL support, we need the openssl libraries. 00024 * Still we can decide whether or not to use them by commenting 00025 * in or out the DO_SSL macro. 00026 * 00027 * TLS/SSL support is basically implemented by reading from a config file 00028 * (currently manager.conf, http.conf and sip.conf) the names of the certificate 00029 * files and cipher to use, and then run ssl_setup() to create an appropriate 00030 * data structure named ssl_ctx. 00031 * 00032 * If we support multiple domains, presumably we need to read multiple 00033 * certificates. 00034 * 00035 * When we are requested to open a TLS socket, we run make_file_from_fd() 00036 * on the socket, to do the necessary setup. At the moment the context's name 00037 * is hardwired in the function, but we can certainly make it into an extra 00038 * parameter to the function. 00039 * 00040 * We declare most of ssl support variables unconditionally, 00041 * because their number is small and this simplifies the code. 00042 * 00043 * \note The ssl-support variables (ssl_ctx, do_ssl, certfile, cipher) 00044 * and their setup should be moved to a more central place, e.g. asterisk.conf 00045 * and the source files that processes it. Similarly, ssl_setup() should 00046 * be run earlier in the startup process so modules have it available. 00047 * 00048 * \ref AstTlsOverview 00049 * 00050 * \todo For SIP, the SubjectAltNames should be checked on verification 00051 * of the certificate. (Check RFC 5922) 00052 * 00053 */ 00054 00055 #ifndef _ASTERISK_TCPTLS_H 00056 #define _ASTERISK_TCPTLS_H 00057 00058 #include "asterisk/netsock2.h" 00059 #include "asterisk/utils.h" 00060 00061 #if defined(HAVE_OPENSSL) && (defined(HAVE_FUNOPEN) || defined(HAVE_FOPENCOOKIE)) 00062 #define DO_SSL /* comment in/out if you want to support ssl */ 00063 #endif 00064 00065 #ifdef DO_SSL 00066 #include <openssl/ssl.h> 00067 #include <openssl/err.h> 00068 #else 00069 /* declare dummy types so we can define a pointer to them */ 00070 typedef struct {} SSL; 00071 typedef struct {} SSL_CTX; 00072 #endif /* DO_SSL */ 00073 00074 /*! SSL support */ 00075 #define AST_CERTFILE "asterisk.pem" 00076 00077 enum ast_ssl_flags { 00078 /*! Verify certificate when acting as server */ 00079 AST_SSL_VERIFY_CLIENT = (1 << 0), 00080 /*! Don't verify certificate when connecting to a server */ 00081 AST_SSL_DONT_VERIFY_SERVER = (1 << 1), 00082 /*! Don't compare "Common Name" against IP or hostname */ 00083 AST_SSL_IGNORE_COMMON_NAME = (1 << 2), 00084 /*! Use SSLv2 for outgoing client connections */ 00085 AST_SSL_SSLV2_CLIENT = (1 << 3), 00086 /*! Use SSLv3 for outgoing client connections */ 00087 AST_SSL_SSLV3_CLIENT = (1 << 4), 00088 /*! Use TLSv1 for outgoing client connections */ 00089 AST_SSL_TLSV1_CLIENT = (1 << 5) 00090 }; 00091 00092 struct ast_tls_config { 00093 int enabled; 00094 char *certfile; 00095 char *pvtfile; 00096 char *cipher; 00097 char *cafile; 00098 char *capath; 00099 struct ast_flags flags; 00100 SSL_CTX *ssl_ctx; 00101 }; 00102 00103 /*! \page AstTlsOverview TLS Implementation Overview 00104 * 00105 * The following code implements a generic mechanism for starting 00106 * services on a TCP or TLS socket. 00107 * The service is configured in the struct session_args, and 00108 * then started by calling server_start(desc) on the descriptor. 00109 * server_start() first verifies if an instance of the service is active, 00110 * and in case shuts it down. Then, if the service must be started, creates 00111 * a socket and a thread in charge of doing the accept(). 00112 * 00113 * The body of the thread is desc->accept_fn(desc), which the user can define 00114 * freely. We supply a sample implementation, server_root(), structured as an 00115 * infinite loop. At the beginning of each iteration it runs periodic_fn() 00116 * if defined (e.g. to perform some cleanup etc.) then issues a poll() 00117 * or equivalent with a timeout of 'poll_timeout' milliseconds, and if the 00118 * following accept() is successful it creates a thread in charge of 00119 * running the session, whose body is desc->worker_fn(). The argument of 00120 * worker_fn() is a struct ast_tcptls_session_instance, which contains the address 00121 * of the other party, a pointer to desc, the file descriptors (fd) on which 00122 * we can do a select/poll (but NOT I/O), and a FILE *on which we can do I/O. 00123 * We have both because we want to support plain and SSL sockets, and 00124 * going through a FILE * lets us provide the encryption/decryption 00125 * on the stream without using an auxiliary thread. 00126 */ 00127 00128 /*! \brief 00129 * arguments for the accepting thread 00130 */ 00131 struct ast_tcptls_session_args { 00132 struct ast_sockaddr local_address; 00133 struct ast_sockaddr old_address; /*!< copy of the local or remote address depending on if its a client or server session */ 00134 struct ast_sockaddr remote_address; 00135 char hostname[MAXHOSTNAMELEN]; /*!< only necessary for SSL clients so we can compare to common name */ 00136 struct ast_tls_config *tls_cfg; /*!< points to the SSL configuration if any */ 00137 int accept_fd; 00138 int poll_timeout; 00139 /*! Server accept_fn thread ID used for external shutdown requests. */ 00140 pthread_t master; 00141 void *(*accept_fn)(void *); /*!< the function in charge of doing the accept */ 00142 void (*periodic_fn)(void *);/*!< something we may want to run before after select on the accept socket */ 00143 void *(*worker_fn)(void *); /*!< the function in charge of doing the actual work */ 00144 const char *name; 00145 }; 00146 00147 struct ast_tcptls_stream; 00148 00149 /*! 00150 * \brief Disable the TCP/TLS stream timeout timer. 00151 * 00152 * \param stream TCP/TLS stream control data. 00153 * 00154 * \return Nothing 00155 */ 00156 void ast_tcptls_stream_set_timeout_disable(struct ast_tcptls_stream *stream); 00157 00158 /*! 00159 * \brief Set the TCP/TLS stream inactivity timeout timer. 00160 * 00161 * \param stream TCP/TLS stream control data. 00162 * \param timeout Number of milliseconds to wait for data transfer with the peer. 00163 * 00164 * \details This is basically how much time we are willing to spend 00165 * in an I/O call before we declare the peer unresponsive. 00166 * 00167 * \note Setting timeout to -1 disables the timeout. 00168 * \note Setting this timeout replaces the I/O sequence timeout timer. 00169 * 00170 * \return Nothing 00171 */ 00172 void ast_tcptls_stream_set_timeout_inactivity(struct ast_tcptls_stream *stream, int timeout); 00173 00174 /*! 00175 * \brief Set the TCP/TLS stream I/O sequence timeout timer. 00176 * 00177 * \param stream TCP/TLS stream control data. 00178 * \param start Time the I/O sequence timer starts. 00179 * \param timeout Number of milliseconds from the start time before timeout. 00180 * 00181 * \details This is how much time are we willing to allow the peer 00182 * to complete an operation that can take several I/O calls. The 00183 * main use is as an authentication timer with us. 00184 * 00185 * \note Setting timeout to -1 disables the timeout. 00186 * \note Setting this timeout replaces the inactivity timeout timer. 00187 * 00188 * \return Nothing 00189 */ 00190 void ast_tcptls_stream_set_timeout_sequence(struct ast_tcptls_stream *stream, struct timeval start, int timeout); 00191 00192 /*! 00193 * \brief Set the TCP/TLS stream I/O if it can exclusively depend upon the set timeouts. 00194 * 00195 * \param stream TCP/TLS stream control data. 00196 * \param exclusive_input TRUE if stream can exclusively wait for fd input. 00197 * Otherwise, the stream will not wait for fd input. It will wait while 00198 * trying to send data. 00199 * 00200 * \note The stream timeouts still need to be set. 00201 * 00202 * \return Nothing 00203 */ 00204 void ast_tcptls_stream_set_exclusive_input(struct ast_tcptls_stream *stream, int exclusive_input); 00205 00206 /*! \brief 00207 * describes a server instance 00208 */ 00209 struct ast_tcptls_session_instance { 00210 FILE *f; /*!< fopen/funopen result */ 00211 int fd; /*!< the socket returned by accept() */ 00212 SSL *ssl; /*!< ssl state */ 00213 /* iint (*ssl_setup)(SSL *); */ 00214 int client; 00215 struct ast_sockaddr remote_address; 00216 struct ast_tcptls_session_args *parent; 00217 /* Sometimes, when an entity reads TCP data, multiple 00218 * logical messages might be read at the same time. In such 00219 * a circumstance, there needs to be a place to stash the 00220 * extra data. 00221 */ 00222 struct ast_str *overflow_buf; 00223 /*! ao2 FILE stream cookie object associated with f. */ 00224 struct ast_tcptls_stream *stream_cookie; 00225 }; 00226 00227 #if defined(HAVE_FUNOPEN) 00228 #define HOOK_T int 00229 #define LEN_T int 00230 #else 00231 #define HOOK_T ssize_t 00232 #define LEN_T size_t 00233 #endif 00234 00235 /*! 00236 * \brief attempts to connect and start tcptls session, on error the tcptls_session's 00237 * ref count is decremented, fd and file are closed, and NULL is returned. 00238 */ 00239 struct ast_tcptls_session_instance *ast_tcptls_client_start(struct ast_tcptls_session_instance *tcptls_session); 00240 00241 /* \brief Creates a client connection's ast_tcptls_session_instance. */ 00242 struct ast_tcptls_session_instance *ast_tcptls_client_create(struct ast_tcptls_session_args *desc); 00243 00244 void *ast_tcptls_server_root(void *); 00245 00246 /*! 00247 * \brief Closes a tcptls session instance's file and/or file descriptor. 00248 * The tcptls_session will be set to NULL and it's file descriptor will be set to -1 00249 * by this function. 00250 */ 00251 void ast_tcptls_close_session_file(struct ast_tcptls_session_instance *tcptls_session); 00252 00253 /*! 00254 * \brief This is a generic (re)start routine for a TCP server, 00255 * which does the socket/bind/listen and starts a thread for handling 00256 * accept(). 00257 * \version 1.6.1 changed desc parameter to be of ast_tcptls_session_args type 00258 */ 00259 void ast_tcptls_server_start(struct ast_tcptls_session_args *desc); 00260 00261 /*! 00262 * \brief Shutdown a running server if there is one 00263 * \version 1.6.1 changed desc parameter to be of ast_tcptls_session_args type 00264 */ 00265 void ast_tcptls_server_stop(struct ast_tcptls_session_args *desc); 00266 00267 /*! 00268 * \brief Set up an SSL server 00269 * 00270 * \param cfg Configuration for the SSL server 00271 * \retval 1 Success 00272 * \retval 0 Failure 00273 */ 00274 int ast_ssl_setup(struct ast_tls_config *cfg); 00275 00276 /*! 00277 * \brief free resources used by an SSL server 00278 * 00279 * \note This only needs to be called if ast_ssl_setup() was 00280 * directly called first. 00281 * \param cfg Configuration for the SSL server 00282 */ 00283 void ast_ssl_teardown(struct ast_tls_config *cfg); 00284 00285 /*! 00286 * \brief Used to parse conf files containing tls/ssl options. 00287 */ 00288 int ast_tls_read_conf(struct ast_tls_config *tls_cfg, struct ast_tcptls_session_args *tls_desc, const char *varname, const char *value); 00289 00290 HOOK_T ast_tcptls_server_read(struct ast_tcptls_session_instance *ser, void *buf, size_t count); 00291 HOOK_T ast_tcptls_server_write(struct ast_tcptls_session_instance *ser, const void *buf, size_t count); 00292 00293 #endif /* _ASTERISK_TCPTLS_H */