2018-02-27 19:20:58 +00:00
|
|
|
/*-
|
2015-02-24 18:19:20 +00:00
|
|
|
* SSLsplit - transparent SSL/TLS interception
|
2018-02-27 19:20:58 +00:00
|
|
|
* https://www.roe.ch/SSLsplit
|
|
|
|
*
|
2019-08-08 09:23:04 +00:00
|
|
|
* Copyright (c) 2009-2019, Daniel Roethlisberger <daniel@roe.ch>.
|
2019-07-23 09:55:06 +00:00
|
|
|
* Copyright (c) 2017-2019, Soner Tari <sonertari@gmail.com>.
|
2012-04-13 12:47:30 +00:00
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
2018-02-27 19:20:58 +00:00
|
|
|
* modification, are permitted provided that the following conditions are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright notice,
|
|
|
|
* this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright notice,
|
|
|
|
* this list of conditions and the following disclaimer in the documentation
|
|
|
|
* and/or other materials provided with the distribution.
|
2012-04-13 12:47:30 +00:00
|
|
|
*
|
2018-02-27 19:20:58 +00:00
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER AND CONTRIBUTORS ``AS IS''
|
|
|
|
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
|
|
|
|
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
|
|
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
|
|
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
|
|
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
2012-04-13 12:47:30 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include "pxysslshut.h"
|
|
|
|
|
|
|
|
#include "log.h"
|
|
|
|
#include "attrib.h"
|
|
|
|
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <errno.h>
|
|
|
|
|
|
|
|
#include <openssl/ssl.h>
|
|
|
|
#include <openssl/err.h>
|
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Cleanly shut down an SSL socket. Libevent currently has no support for
|
|
|
|
* cleanly shutting down an SSL socket so we work around that by using a
|
|
|
|
* low-level event. This works for recent versions of OpenSSL. OpenSSL
|
|
|
|
* with the older SSL_shutdown() semantics, not exposing WANT_READ/WRITE
|
|
|
|
* may or may not work.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* SSL shutdown context.
|
|
|
|
*/
|
|
|
|
|
|
|
|
typedef struct pxy_ssl_shutdown_ctx {
|
2019-07-12 11:40:04 +00:00
|
|
|
global_t *global;
|
2012-04-13 12:47:30 +00:00
|
|
|
struct event_base *evbase;
|
|
|
|
struct event *ev;
|
|
|
|
SSL *ssl;
|
|
|
|
unsigned int retries;
|
|
|
|
} pxy_ssl_shutdown_ctx_t;
|
|
|
|
|
|
|
|
static pxy_ssl_shutdown_ctx_t *
|
2019-07-12 11:40:04 +00:00
|
|
|
pxy_ssl_shutdown_ctx_new(global_t *global, struct event_base *evbase, SSL *ssl)
|
2012-04-13 12:47:30 +00:00
|
|
|
{
|
|
|
|
pxy_ssl_shutdown_ctx_t *ctx;
|
|
|
|
|
|
|
|
ctx = malloc(sizeof(pxy_ssl_shutdown_ctx_t));
|
|
|
|
if (!ctx)
|
|
|
|
return NULL;
|
2019-07-12 11:40:04 +00:00
|
|
|
ctx->global = global;
|
2012-04-13 12:47:30 +00:00
|
|
|
ctx->evbase = evbase;
|
|
|
|
ctx->ssl = ssl;
|
|
|
|
ctx->ev = NULL;
|
|
|
|
ctx->retries = 0;
|
|
|
|
return ctx;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
pxy_ssl_shutdown_ctx_free(pxy_ssl_shutdown_ctx_t *ctx)
|
|
|
|
{
|
|
|
|
free(ctx);
|
|
|
|
}
|
|
|
|
|
2017-08-13 01:36:33 +00:00
|
|
|
#ifdef DEBUG_PROXY
|
|
|
|
char *sslerr_names[] = {
|
|
|
|
"SSL_ERROR_WANT_READ",
|
|
|
|
"SSL_ERROR_WANT_WRITE",
|
|
|
|
"SSL_ERROR_ZERO_RETURN",
|
|
|
|
"SSL_ERROR_SYSCALL",
|
|
|
|
"SSL_ERROR_SSL",
|
|
|
|
"UNKWN"
|
|
|
|
};
|
|
|
|
|
|
|
|
static char *
|
|
|
|
pxy_ssl_shutdown_get_sslerr_name(int sslerr)
|
|
|
|
{
|
|
|
|
if (sslerr == SSL_ERROR_WANT_READ) {
|
|
|
|
return sslerr_names[0];
|
|
|
|
} else if (sslerr == SSL_ERROR_WANT_WRITE) {
|
|
|
|
return sslerr_names[1];
|
|
|
|
} else if (sslerr == SSL_ERROR_ZERO_RETURN) {
|
|
|
|
return sslerr_names[2];
|
|
|
|
} else if (sslerr == SSL_ERROR_SYSCALL) {
|
|
|
|
return sslerr_names[3];
|
|
|
|
} else if (sslerr == SSL_ERROR_SSL) {
|
|
|
|
return sslerr_names[4];
|
|
|
|
} else {
|
|
|
|
return sslerr_names[5];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif /* DEBUG_PROXY */
|
|
|
|
|
2012-04-13 12:47:30 +00:00
|
|
|
/*
|
|
|
|
* The shutdown socket event handler. This is either
|
|
|
|
* scheduled as a timeout-only event, or as a fd read or
|
|
|
|
* fd write event, depending on whether SSL_shutdown()
|
|
|
|
* indicates it needs read or write on the socket.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
pxy_ssl_shutdown_cb(evutil_socket_t fd, UNUSED short what, void *arg)
|
|
|
|
{
|
|
|
|
pxy_ssl_shutdown_ctx_t *ctx = arg;
|
2018-10-20 21:25:01 +00:00
|
|
|
|
2017-07-29 21:34:46 +00:00
|
|
|
// @attention Increasing the delay to 500 or more fixes some ssl shutdown failures, they report SSL_ERROR_WANT_READ before eventually succeeding
|
|
|
|
// @todo Can/should we set an adaptive delay per conn here? Does it matter?
|
2012-04-13 12:47:30 +00:00
|
|
|
struct timeval retry_delay = {0, 100};
|
|
|
|
short want = 0;
|
|
|
|
int rv, sslerr;
|
|
|
|
|
|
|
|
if (ctx->ev) {
|
|
|
|
event_free(ctx->ev);
|
|
|
|
ctx->ev = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Use the new (post-2008) semantics for SSL_shutdown() on a
|
|
|
|
* non-blocking socket. SSL_shutdown() returns -1 and WANT_READ
|
|
|
|
* if the other end's close notify was not received yet, and
|
|
|
|
* WANT_WRITE it could not write our own close notify.
|
|
|
|
*
|
|
|
|
* This is a good collection of recent and relevant documents:
|
|
|
|
* http://bugs.python.org/issue8108
|
|
|
|
*/
|
|
|
|
rv = SSL_shutdown(ctx->ssl);
|
|
|
|
if (rv == 1)
|
|
|
|
goto complete;
|
2019-03-10 01:26:00 +00:00
|
|
|
if (rv != -1)
|
2012-04-13 12:47:30 +00:00
|
|
|
goto retry;
|
2017-08-13 01:36:33 +00:00
|
|
|
|
|
|
|
sslerr = SSL_get_error(ctx->ssl, rv);
|
2018-10-20 21:25:01 +00:00
|
|
|
|
2017-08-13 01:36:33 +00:00
|
|
|
#ifdef DEBUG_PROXY
|
|
|
|
log_dbg_level_printf(LOG_DBG_MODE_FINEST, "pxy_ssl_shutdown_cb: %s, retries=%d, fd=%d\n", pxy_ssl_shutdown_get_sslerr_name(sslerr), ctx->retries, fd);
|
|
|
|
#endif /* DEBUG_PROXY */
|
2018-10-20 21:25:01 +00:00
|
|
|
|
2017-08-13 01:36:33 +00:00
|
|
|
switch (sslerr) {
|
2012-04-13 12:47:30 +00:00
|
|
|
case SSL_ERROR_WANT_READ:
|
|
|
|
want = EV_READ;
|
|
|
|
goto retry;
|
|
|
|
case SSL_ERROR_WANT_WRITE:
|
|
|
|
want = EV_WRITE;
|
|
|
|
goto retry;
|
|
|
|
case SSL_ERROR_ZERO_RETURN:
|
|
|
|
goto retry;
|
|
|
|
case SSL_ERROR_SYSCALL:
|
2012-04-30 21:27:51 +00:00
|
|
|
case SSL_ERROR_SSL:
|
2012-04-13 12:47:30 +00:00
|
|
|
goto complete;
|
|
|
|
default:
|
2017-10-14 22:39:30 +00:00
|
|
|
log_err_level_printf(LOG_CRIT, "Unhandled SSL_shutdown() error %i. Closing fd\n", sslerr);
|
2017-08-19 22:46:57 +00:00
|
|
|
#ifdef DEBUG_PROXY
|
2018-10-20 21:25:01 +00:00
|
|
|
log_dbg_level_printf(LOG_DBG_MODE_FINER, "pxy_ssl_shutdown_cb: Unhandled SSL_shutdown() error %i. Closing fd, fd=%d\n", sslerr, fd);
|
2017-08-19 22:46:57 +00:00
|
|
|
#endif /* DEBUG_PROXY */
|
2018-10-20 21:25:01 +00:00
|
|
|
|
2012-04-13 12:47:30 +00:00
|
|
|
goto complete;
|
|
|
|
}
|
|
|
|
goto complete;
|
|
|
|
|
|
|
|
retry:
|
|
|
|
if (ctx->retries++ >= 50) {
|
2017-10-14 22:39:30 +00:00
|
|
|
log_err_level_printf(LOG_WARNING, "Failed to shutdown SSL connection cleanly: Max retries reached. Closing fd\n");
|
2017-08-19 22:46:57 +00:00
|
|
|
#ifdef DEBUG_PROXY
|
2018-10-20 21:25:01 +00:00
|
|
|
log_dbg_level_printf(LOG_DBG_MODE_FINER, "pxy_ssl_shutdown_cb: Failed to shutdown SSL connection cleanly: Max retries reached. Closing fd, fd=%d\n", fd);
|
2017-08-19 22:46:57 +00:00
|
|
|
#endif /* DEBUG_PROXY */
|
2018-10-20 21:25:01 +00:00
|
|
|
|
2012-04-13 12:47:30 +00:00
|
|
|
goto complete;
|
|
|
|
}
|
2018-10-20 21:25:01 +00:00
|
|
|
|
2012-04-13 12:47:30 +00:00
|
|
|
ctx->ev = event_new(ctx->evbase, fd, want, pxy_ssl_shutdown_cb, ctx);
|
2019-03-10 01:26:00 +00:00
|
|
|
if (!ctx->ev)
|
|
|
|
goto memout;
|
|
|
|
if (event_add(ctx->ev, &retry_delay) == -1) {
|
|
|
|
event_free(ctx->ev);
|
|
|
|
goto memout;
|
2012-04-13 12:47:30 +00:00
|
|
|
}
|
2019-03-10 01:26:00 +00:00
|
|
|
return;
|
2018-10-20 21:25:01 +00:00
|
|
|
|
2019-03-10 01:26:00 +00:00
|
|
|
memout:
|
2017-10-14 22:39:30 +00:00
|
|
|
log_err_printf("Failed to shutdown SSL connection cleanly: Cannot create event. Closing fd\n");
|
2017-08-19 22:46:57 +00:00
|
|
|
#ifdef DEBUG_PROXY
|
2018-10-20 21:25:01 +00:00
|
|
|
log_dbg_level_printf(LOG_DBG_MODE_FINER, "pxy_ssl_shutdown_cb: Failed to shutdown SSL connection cleanly: Cannot create event. Closing fd, fd=%d\n", fd);
|
2017-08-19 22:46:57 +00:00
|
|
|
#endif /* DEBUG_PROXY */
|
2012-04-13 12:47:30 +00:00
|
|
|
|
|
|
|
complete:
|
2019-07-12 11:40:04 +00:00
|
|
|
if (OPTS_DEBUG(ctx->global)) {
|
2018-10-20 21:25:01 +00:00
|
|
|
log_dbg_print_free(ssl_ssl_state_to_str(ctx->ssl, "SSL_free() in state "));
|
2014-01-11 16:28:41 +00:00
|
|
|
}
|
2018-10-20 21:25:01 +00:00
|
|
|
#ifdef DEBUG_PROXY
|
|
|
|
log_dbg_level_printf(LOG_DBG_MODE_FINER, "pxy_ssl_shutdown_cb: fd=%d, %s", fd, ssl_ssl_state_to_str(ctx->ssl, "SSL_free() in state "));
|
|
|
|
#endif /* DEBUG_PROXY */
|
|
|
|
|
2012-04-13 12:47:30 +00:00
|
|
|
SSL_free(ctx->ssl);
|
|
|
|
evutil_closesocket(fd);
|
|
|
|
pxy_ssl_shutdown_ctx_free(ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Cleanly shutdown an SSL session on file descriptor fd using low-level
|
|
|
|
* file descriptor readiness events on event base evbase.
|
|
|
|
* Guarantees that SSL and the corresponding SSL_CTX are freed and the
|
|
|
|
* socket is closed, eventually, or in the case of fatal errors, immediately.
|
|
|
|
*/
|
|
|
|
void
|
2019-07-12 11:40:04 +00:00
|
|
|
pxy_ssl_shutdown(global_t *global, struct event_base *evbase, SSL *ssl,
|
2014-01-11 16:28:41 +00:00
|
|
|
evutil_socket_t fd)
|
2012-04-13 12:47:30 +00:00
|
|
|
{
|
2017-08-13 01:36:33 +00:00
|
|
|
#ifdef DEBUG_PROXY
|
2018-10-17 13:28:21 +00:00
|
|
|
log_dbg_level_printf(LOG_DBG_MODE_FINEST, "pxy_ssl_shutdown: ENTER, fd=%d\n", fd);
|
2017-08-13 01:36:33 +00:00
|
|
|
#endif /* DEBUG_PROXY */
|
|
|
|
|
2012-04-13 12:47:30 +00:00
|
|
|
pxy_ssl_shutdown_ctx_t *sslshutctx;
|
|
|
|
|
2019-07-12 11:40:04 +00:00
|
|
|
sslshutctx = pxy_ssl_shutdown_ctx_new(global, evbase, ssl);
|
2012-04-13 12:47:30 +00:00
|
|
|
if (!sslshutctx) {
|
2019-07-12 11:40:04 +00:00
|
|
|
if (OPTS_DEBUG(global)) {
|
2018-10-20 21:25:01 +00:00
|
|
|
log_dbg_print_free(ssl_ssl_state_to_str(ssl, "SSL_free() in state "));
|
2014-01-11 16:28:41 +00:00
|
|
|
}
|
2018-10-20 21:25:01 +00:00
|
|
|
#ifdef DEBUG_PROXY
|
|
|
|
log_dbg_level_printf(LOG_DBG_MODE_FINER, "pxy_ssl_shutdown: fd=%d, %s", fd, ssl_ssl_state_to_str(ssl, "SSL_free() in state "));
|
|
|
|
#endif /* DEBUG_PROXY */
|
|
|
|
|
2012-04-13 12:47:30 +00:00
|
|
|
SSL_free(ssl);
|
|
|
|
evutil_closesocket(fd);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
pxy_ssl_shutdown_cb(fd, 0, sslshutctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* vim: set noet ft=c: */
|