/*- * SSLsplit - transparent SSL/TLS interception * https://www.roe.ch/SSLsplit * * Copyright (c) 2009-2019, Daniel Roethlisberger . * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are met: * 1. Redistributions of source code must retain the above copyright notice, * this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright notice, * this list of conditions and the following disclaimer in the documentation * and/or other materials provided with the distribution. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER AND CONTRIBUTORS ``AS IS'' * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE * POSSIBILITY OF SUCH DAMAGE. */ #include "proxy.h" #include "privsep.h" #include "pxythrmgr.h" #include "pxyconn.h" #include "cachemgr.h" #include "opts.h" #include "log.h" #include "attrib.h" #include #include #include #include #include #include #include #include #include #include #include #include #include #include /* * Proxy engine, built around libevent 2.x. */ static int signals[] = { SIGTERM, SIGQUIT, SIGHUP, SIGINT, SIGPIPE, SIGUSR1 }; struct proxy_ctx { pxy_thrmgr_ctx_t *thrmgr; struct event_base *evbase; struct event *sev[sizeof(signals)/sizeof(int)]; struct event *gcev; struct proxy_listener_ctx *lctx; global_t *global; int loopbreak_reason; }; static proxy_listener_ctx_t * proxy_listener_ctx_new(pxy_thrmgr_ctx_t *thrmgr, proxyspec_t *spec, global_t *global) MALLOC; static proxy_listener_ctx_t * proxy_listener_ctx_new(pxy_thrmgr_ctx_t *thrmgr, proxyspec_t *spec, global_t *global) { proxy_listener_ctx_t *ctx = malloc(sizeof(proxy_listener_ctx_t)); if (!ctx) return NULL; memset(ctx, 0, sizeof(proxy_listener_ctx_t)); ctx->thrmgr = thrmgr; ctx->spec = spec; ctx->global = global; return ctx; } static void proxy_listener_ctx_free(proxy_listener_ctx_t *ctx) NONNULL(1); static void proxy_listener_ctx_free(proxy_listener_ctx_t *ctx) { if (ctx->evcl) { evconnlistener_free(ctx->evcl); } if (ctx->next) { proxy_listener_ctx_free(ctx->next); } free(ctx); } /* * Callback for accept events on the socket listener bufferevent. */ static void proxy_listener_acceptcb(UNUSED struct evconnlistener *listener, evutil_socket_t fd, struct sockaddr *peeraddr, int peeraddrlen, void *arg) { proxy_listener_ctx_t *lctx = arg; #ifdef DEBUG_PROXY log_dbg_level_printf(LOG_DBG_MODE_FINEST, "proxy_listener_acceptcb: ENTER, fd=%d\n", fd); #endif /* DEBUG_PROXY */ pxy_conn_setup(fd, peeraddr, peeraddrlen, lctx->thrmgr, lctx->spec, lctx->global, lctx->clisock); } /* * Callback for error events on the socket listener bufferevent. */ void proxy_listener_errorcb(struct evconnlistener *listener, UNUSED void *arg) { struct event_base *evbase = evconnlistener_get_base(listener); int err = EVUTIL_SOCKET_ERROR(); log_err_level_printf(LOG_CRIT, "Error %d on listener: %s\n", err, evutil_socket_error_to_string(err)); /* Do not break the event loop if out of fds: * Too many open files (24) */ if (err == 24) { return; } event_base_loopbreak(evbase); } /* * Dump a description of an evbase to debugging code. */ static void proxy_debug_base(const struct event_base *ev_base) { log_dbg_printf("Using libevent backend '%s'\n", event_base_get_method(ev_base)); enum event_method_feature f; f = event_base_get_features(ev_base); log_dbg_printf("Event base supports: edge %s, O(1) %s, anyfd %s\n", ((f & EV_FEATURE_ET) ? "yes" : "no"), ((f & EV_FEATURE_O1) ? "yes" : "no"), ((f & EV_FEATURE_FDS) ? "yes" : "no")); } /* * Set up the listener for a single proxyspec and add it to evbase. * Returns the proxy_listener_ctx_t pointer if successful, NULL otherwise. */ static proxy_listener_ctx_t * proxy_listener_setup(struct event_base *evbase, pxy_thrmgr_ctx_t *thrmgr, proxyspec_t *spec, global_t *global, evutil_socket_t clisock) { #ifdef DEBUG_PROXY log_dbg_level_printf(LOG_DBG_MODE_FINEST, "proxy_listener_setup: ENTER\n"); #endif /* DEBUG_PROXY */ proxy_listener_ctx_t *lctx; int fd; if ((fd = privsep_client_opensock(clisock, spec)) == -1) { log_err_level_printf(LOG_CRIT, "Error opening socket: %s (%i)\n", strerror(errno), errno); return NULL; } lctx = proxy_listener_ctx_new(thrmgr, spec, global); if (!lctx) { log_err_level_printf(LOG_CRIT, "Error creating listener context\n"); evutil_closesocket(fd); return NULL; } lctx->clisock = clisock; // @todo Should we enable threadsafe event structs? // @attention Do not pass NULL as user-supplied pointer lctx->evcl = evconnlistener_new(evbase, proxy_listener_acceptcb, lctx, LEV_OPT_CLOSE_ON_FREE, 1024, fd); // lctx, LEV_OPT_CLOSE_ON_FREE|LEV_OPT_THREADSAFE, 1024, fd); if (!lctx->evcl) { log_err_level_printf(LOG_CRIT, "Error creating evconnlistener: %s\n", strerror(errno)); proxy_listener_ctx_free(lctx); evutil_closesocket(fd); return NULL; } evconnlistener_set_error_cb(lctx->evcl, proxy_listener_errorcb); return lctx; } /* * Signal handler for SIGTERM, SIGQUIT, SIGINT, SIGHUP, SIGPIPE and SIGUSR1. */ static void proxy_signal_cb(evutil_socket_t fd, UNUSED short what, void *arg) { proxy_ctx_t *ctx = arg; if (OPTS_DEBUG(ctx->global)) { log_dbg_printf("Received signal %i\n", fd); } switch(fd) { case SIGTERM: case SIGQUIT: case SIGINT: proxy_loopbreak(ctx, fd); break; case SIGHUP: case SIGUSR1: if (log_reopen() == -1) { log_err_level_printf(LOG_WARNING, "Failed to reopen logs\n"); } else { log_dbg_printf("Reopened log files\n"); } break; case SIGPIPE: log_err_level_printf(LOG_WARNING, "Received SIGPIPE; ignoring.\n"); break; default: log_err_level_printf(LOG_WARNING, "Received unexpected signal %i\n", fd); break; } } /* * Garbage collection handler. */ static void proxy_gc_cb(UNUSED evutil_socket_t fd, UNUSED short what, void *arg) { proxy_ctx_t *ctx = arg; if (OPTS_DEBUG(ctx->global)) log_dbg_printf("Garbage collecting caches started.\n"); cachemgr_gc(); if (OPTS_DEBUG(ctx->global)) log_dbg_printf("Garbage collecting caches done.\n"); } /* * Set up the core event loop. * Socket clisock is the privsep client socket used for binding to ports. * Returns ctx on success, or NULL on error. */ proxy_ctx_t * proxy_new(global_t *global, int clisock) { proxy_listener_ctx_t *head; proxy_ctx_t *ctx; struct evdns_base *dnsbase; int rc; /* adds locking, only required if accessed from separate threads */ evthread_use_pthreads(); #ifndef PURIFY if (OPTS_DEBUG(global)) { event_enable_debug_mode(); } #endif /* PURIFY */ ctx = malloc(sizeof(proxy_ctx_t)); if (!ctx) { log_err_level_printf(LOG_CRIT, "Error allocating memory\n"); goto leave0; } memset(ctx, 0, sizeof(proxy_ctx_t)); ctx->global = global; ctx->evbase = event_base_new(); if (!ctx->evbase) { log_err_level_printf(LOG_CRIT, "Error getting event base\n"); goto leave1; } if (global_has_dns_spec(global)) { /* create a dnsbase here purely for being able to test parsing * resolv.conf while we can still alert the user about it. */ dnsbase = evdns_base_new(ctx->evbase, 0); if (!dnsbase) { log_err_level_printf(LOG_CRIT, "Error creating dns event base\n"); goto leave1b; } rc = evdns_base_resolv_conf_parse(dnsbase, DNS_OPTIONS_ALL, "/etc/resolv.conf"); evdns_base_free(dnsbase, 0); if (rc != 0) { log_err_level_printf(LOG_CRIT, "evdns cannot parse resolv.conf: " "%s (%d)\n", rc == 1 ? "failed to open file" : rc == 2 ? "failed to stat file" : rc == 3 ? "file too large" : rc == 4 ? "out of memory" : rc == 5 ? "short read from file" : rc == 6 ? "no nameservers in file" : "unknown error", rc); goto leave1b; } } if (OPTS_DEBUG(global)) { proxy_debug_base(ctx->evbase); } ctx->thrmgr = pxy_thrmgr_new(global); if (!ctx->thrmgr) { log_err_level_printf(LOG_CRIT, "Error creating thread manager\n"); goto leave1b; } head = ctx->lctx = NULL; for (proxyspec_t *spec = global->spec; spec; spec = spec->next) { head = proxy_listener_setup(ctx->evbase, ctx->thrmgr, spec, global, clisock); if (!head) goto leave2; head->next = ctx->lctx; ctx->lctx = head; char *specstr = proxyspec_str(spec); if (!specstr) { fprintf(stderr, "out of memory\n"); exit(EXIT_FAILURE); } log_dbg_printf("proxy_listener_setup: %s\n", specstr); free(specstr); } for (size_t i = 0; i < (sizeof(signals) / sizeof(int)); i++) { ctx->sev[i] = evsignal_new(ctx->evbase, signals[i], proxy_signal_cb, ctx); if (!ctx->sev[i]) goto leave3; evsignal_add(ctx->sev[i], NULL); } struct timeval gc_delay = {60, 0}; ctx->gcev = event_new(ctx->evbase, -1, EV_PERSIST, proxy_gc_cb, ctx); if (!ctx->gcev) goto leave4; evtimer_add(ctx->gcev, &gc_delay); // @attention Do not close privsep sock, we open new sockets for child conns //privsep_client_close(clisock); return ctx; leave4: if (ctx->gcev) { event_free(ctx->gcev); } leave3: for (size_t i = 0; i < (sizeof(ctx->sev) / sizeof(ctx->sev[0])); i++) { if (ctx->sev[i]) { event_free(ctx->sev[i]); } } leave2: if (ctx->lctx) { proxy_listener_ctx_free(ctx->lctx); } pxy_thrmgr_free(ctx->thrmgr); leave1b: event_base_free(ctx->evbase); leave1: free(ctx); leave0: return NULL; } /* * Run the event loop. * Returns 0 on non-signal termination, signal number when the event loop was * canceled by a signal, or -1 on failure. */ int proxy_run(proxy_ctx_t *ctx) { if (ctx->global->detach) { event_reinit(ctx->evbase); } #ifndef PURIFY if (OPTS_DEBUG(ctx->global)) { event_base_dump_events(ctx->evbase, stderr); } #endif /* PURIFY */ if (pxy_thrmgr_run(ctx->thrmgr) == -1) { log_err_level_printf(LOG_CRIT, "Failed to start thread manager\n"); return -1; } if (OPTS_DEBUG(ctx->global)) { log_dbg_printf("Starting main event loop.\n"); } event_base_dispatch(ctx->evbase); if (OPTS_DEBUG(ctx->global)) { log_dbg_printf("Main event loop stopped (reason=%i).\n", ctx->loopbreak_reason); } return ctx->loopbreak_reason; } /* * Break the loop of the proxy, causing the proxy_run to return, returning * the reason given in reason (signal number, 0 for success, -1 for error). */ void proxy_loopbreak(proxy_ctx_t *ctx, int reason) { ctx->loopbreak_reason = reason; event_base_loopbreak(ctx->evbase); } /* * Free the proxy data structures. */ void proxy_free(proxy_ctx_t *ctx) { if (ctx->gcev) { event_free(ctx->gcev); } if (ctx->lctx) { proxy_listener_ctx_free(ctx->lctx); } for (size_t i = 0; i < (sizeof(ctx->sev) / sizeof(ctx->sev[0])); i++) { if (ctx->sev[i]) { event_free(ctx->sev[i]); } } if (ctx->thrmgr) { pxy_thrmgr_free(ctx->thrmgr); } if (ctx->evbase) { event_base_free(ctx->evbase); } free(ctx); } /* vim: set noet ft=c: */