C++程序  |  422行  |  13.08 KB

/*
 * Copyright (C) 2017 The Android Open Source Project
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *      http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

#include "dns_tls_frontend.h"

#include <arpa/inet.h>
#include <netdb.h>
#include <openssl/err.h>
#include <openssl/evp.h>
#include <openssl/ssl.h>
#include <sys/eventfd.h>
#include <sys/poll.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <unistd.h>

#define LOG_TAG "DnsTlsFrontend"
#include <log/log.h>
#include <netdutils/SocketOption.h>

#include "NetdConstants.h"  // SHA256_SIZE

using android::netdutils::enableSockopt;

namespace {

// Copied from DnsTlsTransport.
bool getSPKIDigest(const X509* cert, std::vector<uint8_t>* out) {
    int spki_len = i2d_X509_PUBKEY(X509_get_X509_PUBKEY(cert), nullptr);
    unsigned char spki[spki_len];
    unsigned char* temp = spki;
    if (spki_len != i2d_X509_PUBKEY(X509_get_X509_PUBKEY(cert), &temp)) {
        ALOGE("SPKI length mismatch");
        return false;
    }
    out->resize(SHA256_SIZE);
    unsigned int digest_len = 0;
    int ret = EVP_Digest(spki, spki_len, out->data(), &digest_len, EVP_sha256(), nullptr);
    if (ret != 1) {
        ALOGE("Server cert digest extraction failed");
        return false;
    }
    if (digest_len != out->size()) {
        ALOGE("Wrong digest length: %d", digest_len);
        return false;
    }
    return true;
}

std::string errno2str() {
    char error_msg[512] = { 0 };
    return strerror_r(errno, error_msg, sizeof(error_msg));
}

#define APLOGI(fmt, ...) ALOGI(fmt ": [%d] %s", __VA_ARGS__, errno, errno2str().c_str())

std::string addr2str(const sockaddr* sa, socklen_t sa_len) {
    char host_str[NI_MAXHOST] = { 0 };
    int rv = getnameinfo(sa, sa_len, host_str, sizeof(host_str), nullptr, 0,
                         NI_NUMERICHOST);
    if (rv == 0) return std::string(host_str);
    return std::string();
}

bssl::UniquePtr<EVP_PKEY> make_private_key() {
    bssl::UniquePtr<BIGNUM> e(BN_new());
    if (!e) {
        ALOGE("BN_new failed");
        return nullptr;
    }
    if (!BN_set_word(e.get(), RSA_F4)) {
        ALOGE("BN_set_word failed");
        return nullptr;
    }

    bssl::UniquePtr<RSA> rsa(RSA_new());
    if (!rsa) {
        ALOGE("RSA_new failed");
        return nullptr;
    }
    if (!RSA_generate_key_ex(rsa.get(), 2048, e.get(), nullptr)) {
        ALOGE("RSA_generate_key_ex failed");
        return nullptr;
    }

    bssl::UniquePtr<EVP_PKEY> privkey(EVP_PKEY_new());
    if (!privkey) {
        ALOGE("EVP_PKEY_new failed");
        return nullptr;
    }
    if(!EVP_PKEY_assign_RSA(privkey.get(), rsa.get())) {
        ALOGE("EVP_PKEY_assign_RSA failed");
        return nullptr;
    }

    // |rsa| is now owned by |privkey|, so no need to free it.
    rsa.release();
    return privkey;
}

bssl::UniquePtr<X509> make_cert(EVP_PKEY* privkey, EVP_PKEY* parent_key) {
    bssl::UniquePtr<X509> cert(X509_new());
    if (!cert) {
        ALOGE("X509_new failed");
        return nullptr;
    }

    ASN1_INTEGER_set(X509_get_serialNumber(cert.get()), 1);

    // Set one hour expiration.
    X509_gmtime_adj(X509_get_notBefore(cert.get()), 0);
    X509_gmtime_adj(X509_get_notAfter(cert.get()), 60 * 60);

    X509_set_pubkey(cert.get(), privkey);

    if (!X509_sign(cert.get(), parent_key, EVP_sha256())) {
        ALOGE("X509_sign failed");
        return nullptr;
    }

    return cert;
}

}

namespace test {

bool DnsTlsFrontend::startServer() {
    SSL_load_error_strings();
    OpenSSL_add_ssl_algorithms();

    // reset queries_ to 0 every time startServer called
    // which would help us easy to check queries_ via calling waitForQueries
    queries_ = 0;

    ctx_.reset(SSL_CTX_new(TLS_server_method()));
    if (!ctx_) {
        ALOGE("SSL context creation failed");
        return false;
    }

    SSL_CTX_set_ecdh_auto(ctx_.get(), 1);

    // Make certificate chain
    std::vector<bssl::UniquePtr<EVP_PKEY>> keys(chain_length_);
    for (int i = 0; i < chain_length_; ++i) {
        keys[i] = make_private_key();
    }
    std::vector<bssl::UniquePtr<X509>> certs(chain_length_);
    for (int i = 0; i < chain_length_; ++i) {
        int next = std::min(i + 1, chain_length_ - 1);
        certs[i] = make_cert(keys[i].get(), keys[next].get());
    }

    // Install certificate chain.
    if (SSL_CTX_use_certificate(ctx_.get(), certs[0].get()) <= 0) {
        ALOGE("SSL_CTX_use_certificate failed");
        return false;
    }
    if (SSL_CTX_use_PrivateKey(ctx_.get(), keys[0].get()) <= 0 ) {
        ALOGE("SSL_CTX_use_PrivateKey failed");
        return false;
    }
    for (int i = 1; i < chain_length_; ++i) {
        if (SSL_CTX_add1_chain_cert(ctx_.get(), certs[i].get()) != 1) {
            ALOGE("SSL_CTX_add1_chain_cert failed");
            return false;
        }
    }

    // Report the fingerprint of the "middle" cert.  For N = 2, this is the root.
    int fp_index = chain_length_ / 2;
    if (!getSPKIDigest(certs[fp_index].get(), &fingerprint_)) {
        ALOGE("getSPKIDigest failed");
        return false;
    }

    // Set up TCP server socket for clients.
    addrinfo frontend_ai_hints{
        .ai_family = AF_UNSPEC,
        .ai_socktype = SOCK_STREAM,
        .ai_flags = AI_PASSIVE
    };
    addrinfo* frontend_ai_res = nullptr;
    int rv = getaddrinfo(listen_address_.c_str(), listen_service_.c_str(),
                         &frontend_ai_hints, &frontend_ai_res);
    ScopedAddrinfo frontend_ai_res_cleanup(frontend_ai_res);
    if (rv) {
        ALOGE("frontend getaddrinfo(%s, %s) failed: %s", listen_address_.c_str(),
            listen_service_.c_str(), gai_strerror(rv));
        return false;
    }

    for (const addrinfo* ai = frontend_ai_res ; ai ; ai = ai->ai_next) {
        android::base::unique_fd s(socket(ai->ai_family, ai->ai_socktype, ai->ai_protocol));
        if (s.get() < 0) {
            APLOGI("ignore creating socket failed %d", s.get());
            continue;
        }
        enableSockopt(s.get(), SOL_SOCKET, SO_REUSEPORT).ignoreError();
        enableSockopt(s.get(), SOL_SOCKET, SO_REUSEADDR).ignoreError();
        std::string host_str = addr2str(ai->ai_addr, ai->ai_addrlen);
        if (bind(s.get(), ai->ai_addr, ai->ai_addrlen)) {
            APLOGI("failed to bind TCP %s:%s", host_str.c_str(), listen_service_.c_str());
            continue;
        }
        ALOGI("bound to TCP %s:%s", host_str.c_str(), listen_service_.c_str());
        socket_ = std::move(s);
        break;
    }

    if (listen(socket_.get(), 1) < 0) {
        APLOGI("failed to listen socket %d", socket_.get());
        return false;
    }

    // Set up UDP client socket to backend.
    addrinfo backend_ai_hints{
        .ai_family = AF_UNSPEC,
        .ai_socktype = SOCK_DGRAM
    };
    addrinfo* backend_ai_res = nullptr;
    rv = getaddrinfo(backend_address_.c_str(), backend_service_.c_str(),
                         &backend_ai_hints, &backend_ai_res);
    ScopedAddrinfo backend_ai_res_cleanup(backend_ai_res);
    if (rv) {
        ALOGE("backend getaddrinfo(%s, %s) failed: %s", listen_address_.c_str(),
            listen_service_.c_str(), gai_strerror(rv));
        return false;
    }
    backend_socket_.reset(socket(backend_ai_res->ai_family, backend_ai_res->ai_socktype,
                                 backend_ai_res->ai_protocol));
    if (backend_socket_.get() < 0) {
        APLOGI("backend socket %d creation failed", backend_socket_.get());
        return false;
    }

    // connect() always fails in the test DnsTlsSocketTest.SlowDestructor because of
    // no backend server. Don't check it.
    connect(backend_socket_.get(), backend_ai_res->ai_addr, backend_ai_res->ai_addrlen);

    // Set up eventfd socket.
    event_fd_.reset(eventfd(0, EFD_NONBLOCK | EFD_CLOEXEC));
    if (event_fd_.get() == -1) {
        APLOGI("failed to create eventfd %d", event_fd_.get());
        return false;
    }

    {
        std::lock_guard lock(update_mutex_);
        handler_thread_ = std::thread(&DnsTlsFrontend::requestHandler, this);
    }
    ALOGI("server started successfully");
    return true;
}

void DnsTlsFrontend::requestHandler() {
    ALOGD("Request handler started");
    enum { EVENT_FD = 0, LISTEN_FD = 1 };
    pollfd fds[2] = {{.fd = event_fd_.get(), .events = POLLIN},
                     {.fd = socket_.get(), .events = POLLIN}};

    while (true) {
        int poll_code = poll(fds, std::size(fds), -1);
        if (poll_code <= 0) {
            APLOGI("Poll failed with error %d", poll_code);
            break;
        }

        if (fds[EVENT_FD].revents & (POLLIN | POLLERR)) {
            handleEventFd();
            break;
        }
        if (fds[LISTEN_FD].revents & (POLLIN | POLLERR)) {
            sockaddr_storage addr;
            socklen_t len = sizeof(addr);

            ALOGD("Trying to accept a client");
            android::base::unique_fd client(
                    accept4(socket_.get(), reinterpret_cast<sockaddr*>(&addr), &len, SOCK_CLOEXEC));
            if (client.get() < 0) {
                // Stop
                APLOGI("failed to accept client socket %d", client.get());
                break;
            }

            bssl::UniquePtr<SSL> ssl(SSL_new(ctx_.get()));
            SSL_set_fd(ssl.get(), client.get());

            ALOGD("Doing SSL handshake");
            bool success = false;
            if (SSL_accept(ssl.get()) <= 0) {
                ALOGI("SSL negotiation failure");
            } else {
                ALOGD("SSL handshake complete");
                success = handleOneRequest(ssl.get());
            }

            if (success) {
                // Increment queries_ as late as possible, because it represents
                // a query that is fully processed, and the response returned to the
                // client, including cleanup actions.
                ++queries_;
            }
        }
    }
    ALOGD("Ending loop");
}

bool DnsTlsFrontend::handleOneRequest(SSL* ssl) {
    uint8_t queryHeader[2];
    if (SSL_read(ssl, &queryHeader, 2) != 2) {
        ALOGI("Not enough header bytes");
        return false;
    }
    const uint16_t qlen = (queryHeader[0] << 8) | queryHeader[1];
    uint8_t query[qlen];
    size_t qbytes = 0;
    while (qbytes < qlen) {
        int ret = SSL_read(ssl, query + qbytes, qlen - qbytes);
        if (ret <= 0) {
            ALOGI("Error while reading query");
            return false;
        }
        qbytes += ret;
    }
    int sent = send(backend_socket_.get(), query, qlen, 0);
    if (sent != qlen) {
        ALOGI("Failed to send query");
        return false;
    }
    const int max_size = 4096;
    uint8_t recv_buffer[max_size];
    int rlen = recv(backend_socket_.get(), recv_buffer, max_size, 0);
    if (rlen <= 0) {
        ALOGI("Failed to receive response");
        return false;
    }
    uint8_t responseHeader[2];
    responseHeader[0] = rlen >> 8;
    responseHeader[1] = rlen;
    if (SSL_write(ssl, responseHeader, 2) != 2) {
        ALOGI("Failed to write response header");
        return false;
    }
    if (SSL_write(ssl, recv_buffer, rlen) != rlen) {
        ALOGI("Failed to write response body");
        return false;
    }
    return true;
}

bool DnsTlsFrontend::stopServer() {
    std::lock_guard lock(update_mutex_);
    if (!running()) {
        ALOGI("server not running");
        return false;
    }

    ALOGI("stopping frontend");
    if (!sendToEventFd()) {
        return false;
    }
    handler_thread_.join();
    socket_.reset();
    backend_socket_.reset();
    event_fd_.reset();
    ctx_.reset();
    fingerprint_.clear();
    ALOGI("frontend stopped successfully");
    return true;
}

bool DnsTlsFrontend::waitForQueries(int number, int timeoutMs) const {
    constexpr int intervalMs = 20;
    int limit = timeoutMs / intervalMs;
    for (int count = 0; count <= limit; ++count) {
        bool done = queries_ >= number;
        // Always sleep at least one more interval after we are done, to wait for
        // any immediate post-query actions that the client may take (such as
        // marking this server as reachable during validation).
        usleep(intervalMs * 1000);
        if (done) {
            // For ensuring that calls have sufficient headroom for slow machines
            ALOGD("Query arrived in %d/%d of allotted time", count, limit);
            return true;
        }
    }
    return false;
}

bool DnsTlsFrontend::sendToEventFd() {
    const uint64_t data = 1;
    if (const ssize_t rt = write(event_fd_.get(), &data, sizeof(data)); rt != sizeof(data)) {
        APLOGI("failed to write eventfd, rt=%zd", rt);
        return false;
    }
    return true;
}

void DnsTlsFrontend::handleEventFd() {
    int64_t data;
    if (const ssize_t rt = read(event_fd_.get(), &data, sizeof(data)); rt != sizeof(data)) {
        APLOGI("ignore reading eventfd failed, rt=%zd", rt);
    }
}

}  // namespace test