1 1.1 christos # Copyright 2016-2025 The OpenSSL Project Authors. All Rights Reserved. 2 1.1 christos # 3 1.1 christos # Licensed under the Apache License 2.0 (the "License"). You may not use 4 1.1 christos # this file except in compliance with the License. You can obtain a copy 5 1.1 christos # in the file LICENSE in the source distribution or at 6 1.1 christos # https://www.openssl.org/source/license.html 7 1.1 christos 8 1.1 christos use strict; 9 1.1 christos use POSIX ":sys_wait_h"; 10 1.1 christos 11 1.1 christos package TLSProxy::Proxy; 12 1.1 christos 13 1.1 christos use File::Spec; 14 1.1 christos use IO::Socket; 15 1.1 christos use IO::Select; 16 1.1 christos use TLSProxy::Record; 17 1.1 christos use TLSProxy::Message; 18 1.1 christos use TLSProxy::ClientHello; 19 1.1 christos use TLSProxy::ServerHello; 20 1.1 christos use TLSProxy::HelloVerifyRequest; 21 1.1 christos use TLSProxy::EncryptedExtensions; 22 1.1 christos use TLSProxy::Certificate; 23 1.1 christos use TLSProxy::CertificateRequest; 24 1.1 christos use TLSProxy::CertificateVerify; 25 1.1 christos use TLSProxy::ServerKeyExchange; 26 1.1 christos use TLSProxy::NewSessionTicket; 27 1.1 christos use TLSProxy::NextProto; 28 1.1 christos 29 1.1 christos my $have_IPv6; 30 1.1 christos my $useINET6; 31 1.1 christos my $IP_factory; 32 1.1 christos 33 1.1 christos BEGIN 34 1.1 christos { 35 1.1 christos # IO::Socket::IP is on the core module list, IO::Socket::INET6 isn't. 36 1.1 christos # However, IO::Socket::INET6 is older and is said to be more widely 37 1.1 christos # deployed for the moment, and may have less bugs, so we try the latter 38 1.1 christos # first, then fall back on the core modules. Worst case scenario, we 39 1.1 christos # fall back to IO::Socket::INET, only supports IPv4. 40 1.1 christos eval { 41 1.1 christos require IO::Socket::INET6; 42 1.1 christos my $s = IO::Socket::INET6->new( 43 1.1 christos LocalAddr => "::1", 44 1.1 christos LocalPort => 0, 45 1.1 christos Listen=>1, 46 1.1 christos ); 47 1.1 christos $s or die "\n"; 48 1.1 christos $s->close(); 49 1.1 christos }; 50 1.1 christos if ($@ eq "") { 51 1.1 christos $IP_factory = sub { IO::Socket::INET6->new(Domain => AF_INET6, @_); }; 52 1.1 christos $have_IPv6 = 1; 53 1.1 christos $useINET6 = 1; 54 1.1 christos } else { 55 1.1 christos eval { 56 1.1 christos require IO::Socket::IP; 57 1.1 christos my $s = IO::Socket::IP->new( 58 1.1 christos LocalAddr => "::1", 59 1.1 christos LocalPort => 0, 60 1.1 christos Listen=>1, 61 1.1 christos ); 62 1.1 christos $s or die "\n"; 63 1.1 christos $s->close(); 64 1.1 christos }; 65 1.1 christos if ($@ eq "") { 66 1.1 christos $IP_factory = sub { IO::Socket::IP->new(@_); }; 67 1.1 christos $have_IPv6 = 1; 68 1.1 christos $useINET6 = 0; 69 1.1 christos } else { 70 1.1 christos $IP_factory = sub { IO::Socket::INET->new(@_); }; 71 1.1 christos $have_IPv6 = 0; 72 1.1 christos $useINET6 = 0; 73 1.1 christos } 74 1.1 christos } 75 1.1 christos } 76 1.1 christos 77 1.1 christos my $is_tls13 = 0; 78 1.1 christos my $ciphersuite = undef; 79 1.1 christos 80 1.1 christos sub new { 81 1.1 christos my $class = shift; 82 1.1 christos my ($filter, 83 1.1 christos $execute, 84 1.1 christos $cert, 85 1.1 christos $debug) = @_; 86 1.1 christos return init($class, $filter, $execute, $cert, $debug, 0); 87 1.1 christos } 88 1.1 christos 89 1.1 christos sub new_dtls { 90 1.1 christos my $class = shift; 91 1.1 christos my ($filter, 92 1.1 christos $execute, 93 1.1 christos $cert, 94 1.1 christos $debug) = @_; 95 1.1 christos return init($class, $filter, $execute, $cert, $debug, 1); 96 1.1 christos } 97 1.1 christos 98 1.1 christos sub init 99 1.1 christos { 100 1.1.1.2 christos my $useSockInet = 0; 101 1.1.1.2 christos eval { 102 1.1.1.2 christos require IO::Socket::IP; 103 1.1.1.2 christos my $s = IO::Socket::IP->new( 104 1.1.1.2 christos LocalAddr => "::1", 105 1.1.1.2 christos LocalPort => 0, 106 1.1.1.2 christos Listen=>1, 107 1.1.1.2 christos ); 108 1.1.1.2 christos $s or die "\n"; 109 1.1.1.2 christos $s->close(); 110 1.1.1.2 christos }; 111 1.1.1.2 christos if ($@ eq "") { 112 1.1.1.2 christos require IO::Socket::IP; 113 1.1.1.2 christos } else { 114 1.1.1.2 christos $useSockInet = 1; 115 1.1.1.2 christos } 116 1.1.1.2 christos 117 1.1 christos my $class = shift; 118 1.1 christos my ($filter, 119 1.1 christos $execute, 120 1.1 christos $cert, 121 1.1 christos $debug, 122 1.1 christos $isdtls) = @_; 123 1.1 christos 124 1.1 christos my $test_client_port; 125 1.1 christos 126 1.1 christos # Sometimes, our random selection of client ports gets unlucky 127 1.1.1.2 christos # And we randomly select a port that's already in use. This causes 128 1.1 christos # this test to fail, so lets harden ourselves against that by doing 129 1.1 christos # a test bind to the randomly selected port, and only continue once we 130 1.1.1.2 christos # find a port that's available. 131 1.1 christos my $test_client_addr = $have_IPv6 ? "[::1]" : "127.0.0.1"; 132 1.1 christos my $found_port = 0; 133 1.1 christos for (my $i = 0; $i <= 10; $i++) { 134 1.1 christos $test_client_port = 49152 + int(rand(65535 - 49152)); 135 1.1 christos my $test_sock; 136 1.1 christos if ($useINET6 == 0) { 137 1.1.1.2 christos if ($useSockInet == 0) { 138 1.1.1.2 christos $test_sock = IO::Socket::IP->new(LocalPort => $test_client_port, 139 1.1.1.2 christos LocalAddr => $test_client_addr); 140 1.1.1.2 christos } else { 141 1.1.1.2 christos $test_sock = IO::Socket::INET->new(LocalAddr => $test_client_addr, 142 1.1.1.2 christos LocalPort => $test_client_port); 143 1.1.1.2 christos } 144 1.1 christos } else { 145 1.1 christos $test_sock = IO::Socket::INET6->new(LocalAddr => $test_client_addr, 146 1.1 christos LocalPort => $test_client_port, 147 1.1 christos Domain => AF_INET6); 148 1.1 christos } 149 1.1 christos if ($test_sock) { 150 1.1 christos $found_port = 1; 151 1.1 christos $test_sock->close(); 152 1.1 christos print "Found available client port ${test_client_port}\n"; 153 1.1 christos last; 154 1.1 christos } 155 1.1 christos print "Port ${test_client_port} in use - $@\n"; 156 1.1 christos } 157 1.1 christos 158 1.1 christos if ($found_port == 0) { 159 1.1 christos die "Unable to find usable port for TLSProxy"; 160 1.1 christos } 161 1.1 christos 162 1.1 christos my $self = { 163 1.1 christos #Public read/write 164 1.1 christos proxy_addr => $test_client_addr, 165 1.1 christos client_addr => $test_client_addr, 166 1.1 christos filter => $filter, 167 1.1 christos serverflags => "", 168 1.1 christos clientflags => "", 169 1.1 christos serverconnects => 1, 170 1.1 christos reneg => 0, 171 1.1 christos sessionfile => undef, 172 1.1 christos 173 1.1 christos #Public read 174 1.1 christos isdtls => $isdtls, 175 1.1 christos proxy_port => 0, 176 1.1 christos client_port => $test_client_port, 177 1.1 christos server_port => 0, 178 1.1 christos serverpid => 0, 179 1.1 christos clientpid => 0, 180 1.1 christos execute => $execute, 181 1.1 christos cert => $cert, 182 1.1 christos debug => $debug, 183 1.1 christos cipherc => "", 184 1.1 christos ciphersuitesc => "", 185 1.1 christos ciphers => "AES128-SHA", 186 1.1 christos ciphersuitess => "TLS_AES_128_GCM_SHA256", 187 1.1 christos flight => -1, 188 1.1 christos direction => -1, 189 1.1 christos partial => ["", ""], 190 1.1 christos record_list => [], 191 1.1 christos message_list => [], 192 1.1 christos }; 193 1.1 christos 194 1.1 christos return bless $self, $class; 195 1.1 christos } 196 1.1 christos 197 1.1 christos sub DESTROY 198 1.1 christos { 199 1.1 christos my $self = shift; 200 1.1 christos 201 1.1 christos $self->{proxy_sock}->close() if $self->{proxy_sock}; 202 1.1 christos } 203 1.1 christos 204 1.1 christos sub clearClient 205 1.1 christos { 206 1.1 christos my $self = shift; 207 1.1 christos 208 1.1 christos $self->{cipherc} = ""; 209 1.1 christos $self->{ciphersuitec} = ""; 210 1.1 christos $self->{flight} = -1; 211 1.1 christos $self->{direction} = -1; 212 1.1 christos $self->{partial} = ["", ""]; 213 1.1 christos $self->{record_list} = []; 214 1.1 christos $self->{message_list} = []; 215 1.1 christos $self->{clientflags} = ""; 216 1.1 christos $self->{sessionfile} = undef; 217 1.1 christos $self->{clientpid} = 0; 218 1.1 christos $is_tls13 = 0; 219 1.1 christos $ciphersuite = undef; 220 1.1 christos 221 1.1 christos TLSProxy::Message->clear(); 222 1.1 christos TLSProxy::Record->clear(); 223 1.1 christos } 224 1.1 christos 225 1.1 christos sub clear 226 1.1 christos { 227 1.1 christos my $self = shift; 228 1.1 christos 229 1.1 christos $self->clearClient; 230 1.1 christos $self->{ciphers} = "AES128-SHA"; 231 1.1 christos $self->{ciphersuitess} = "TLS_AES_128_GCM_SHA256"; 232 1.1 christos $self->{serverflags} = ""; 233 1.1 christos $self->{serverconnects} = 1; 234 1.1 christos $self->{serverpid} = 0; 235 1.1 christos $self->{reneg} = 0; 236 1.1 christos } 237 1.1 christos 238 1.1 christos sub restart 239 1.1 christos { 240 1.1 christos my $self = shift; 241 1.1 christos 242 1.1 christos $self->clear; 243 1.1 christos $self->start; 244 1.1 christos } 245 1.1 christos 246 1.1 christos sub clientrestart 247 1.1 christos { 248 1.1 christos my $self = shift; 249 1.1 christos 250 1.1 christos $self->clear; 251 1.1 christos $self->clientstart; 252 1.1 christos } 253 1.1 christos 254 1.1 christos sub connect_to_server 255 1.1 christos { 256 1.1 christos my $self = shift; 257 1.1 christos my $servaddr = $self->{server_addr}; 258 1.1 christos 259 1.1 christos $servaddr =~ s/[\[\]]//g; # Remove [ and ] 260 1.1 christos 261 1.1 christos my $sock = $IP_factory->(PeerAddr => $servaddr, 262 1.1 christos PeerPort => $self->{server_port}, 263 1.1 christos Proto => $self->{isdtls} ? 'udp' : 'tcp'); 264 1.1 christos if (!defined($sock)) { 265 1.1 christos my $err = $!; 266 1.1 christos kill(3, $self->{real_serverpid}); 267 1.1 christos die "unable to connect: $err\n"; 268 1.1 christos } 269 1.1 christos 270 1.1 christos $self->{server_sock} = $sock; 271 1.1 christos } 272 1.1 christos 273 1.1 christos sub start 274 1.1 christos { 275 1.1 christos my ($self) = shift; 276 1.1 christos my $pid; 277 1.1 christos 278 1.1 christos # Create the Proxy socket 279 1.1 christos my $proxaddr = $self->{proxy_addr}; 280 1.1 christos $proxaddr =~ s/[\[\]]//g; # Remove [ and ] 281 1.1 christos my $clientaddr = $self->{client_addr}; 282 1.1 christos $clientaddr =~ s/[\[\]]//g; # Remove [ and ] 283 1.1 christos 284 1.1 christos my @proxyargs; 285 1.1 christos 286 1.1 christos if ($self->{isdtls}) { 287 1.1 christos @proxyargs = ( 288 1.1 christos LocalHost => $proxaddr, 289 1.1 christos LocalPort => 0, 290 1.1 christos PeerHost => $clientaddr, 291 1.1 christos PeerPort => $self->{client_port}, 292 1.1 christos Proto => "udp", 293 1.1 christos ); 294 1.1 christos } else { 295 1.1 christos @proxyargs = ( 296 1.1 christos LocalHost => $proxaddr, 297 1.1 christos LocalPort => 0, 298 1.1 christos Proto => "tcp", 299 1.1 christos Listen => SOMAXCONN, 300 1.1 christos ); 301 1.1 christos } 302 1.1 christos 303 1.1 christos if (my $sock = $IP_factory->(@proxyargs)) { 304 1.1 christos $self->{proxy_sock} = $sock; 305 1.1 christos $self->{proxy_port} = $sock->sockport(); 306 1.1 christos $self->{proxy_addr} = $sock->sockhost(); 307 1.1 christos $self->{proxy_addr} =~ s/(.*:.*)/[$1]/; 308 1.1 christos print "Proxy started on port ", 309 1.1 christos "$self->{proxy_addr}:$self->{proxy_port}\n"; 310 1.1 christos # use same address for s_server 311 1.1 christos $self->{server_addr} = $self->{proxy_addr}; 312 1.1 christos } else { 313 1.1 christos warn "Failed creating proxy socket (".$proxaddr.",0): $!\n"; 314 1.1 christos } 315 1.1 christos 316 1.1 christos if ($self->{proxy_sock} == 0) { 317 1.1 christos return 0; 318 1.1 christos } 319 1.1 christos 320 1.1 christos my $execcmd = $self->execute 321 1.1 christos ." s_server -no_comp -engine ossltest -state" 322 1.1 christos #In TLSv1.3 we issue two session tickets. The default session id 323 1.1 christos #callback gets confused because the ossltest engine causes the same 324 1.1 christos #session id to be created twice due to the changed random number 325 1.1 christos #generation. Using "-ext_cache" replaces the default callback with a 326 1.1 christos #different one that doesn't get confused. 327 1.1 christos ." -ext_cache" 328 1.1 christos ." -accept $self->{server_addr}:0" 329 1.1 christos ." -cert ".$self->cert." -cert2 ".$self->cert 330 1.1 christos ." -naccept ".$self->serverconnects; 331 1.1 christos if ($self->{isdtls}) { 332 1.1 christos $execcmd .= " -dtls -max_protocol DTLSv1.2" 333 1.1 christos # TLSProxy does not support message fragmentation. So 334 1.1 christos # set a high mtu and fingers crossed. 335 1.1 christos ." -mtu 1500"; 336 1.1 christos } else { 337 1.1 christos $execcmd .= " -rev -max_protocol TLSv1.3"; 338 1.1 christos } 339 1.1 christos if ($self->ciphers ne "") { 340 1.1 christos $execcmd .= " -cipher ".$self->ciphers; 341 1.1 christos } 342 1.1 christos if ($self->ciphersuitess ne "") { 343 1.1 christos $execcmd .= " -ciphersuites ".$self->ciphersuitess; 344 1.1 christos } 345 1.1 christos if ($self->serverflags ne "") { 346 1.1 christos $execcmd .= " ".$self->serverflags; 347 1.1 christos } 348 1.1 christos if ($self->debug) { 349 1.1 christos print STDERR "Server command: $execcmd\n"; 350 1.1 christos } 351 1.1 christos 352 1.1 christos open(my $savedin, "<&STDIN"); 353 1.1 christos 354 1.1 christos # Temporarily replace STDIN so that sink process can inherit it... 355 1.1 christos open(STDIN, "$^X -e 'sleep(10)' |") if $self->{isdtls}; 356 1.1 christos $pid = open(STDIN, "$execcmd 2>&1 |") or die "Failed to $execcmd: $!\n"; 357 1.1 christos $self->{real_serverpid} = $pid; 358 1.1 christos 359 1.1 christos # Process the output from s_server until we find the ACCEPT line, which 360 1.1 christos # tells us what the accepting address and port are. 361 1.1 christos while (<>) { 362 1.1 christos print; 363 1.1 christos s/\R$//; # Better chomp 364 1.1 christos next unless (/^ACCEPT\s.*:(\d+)$/); 365 1.1 christos $self->{server_port} = $1; 366 1.1 christos last; 367 1.1 christos } 368 1.1 christos 369 1.1 christos if ($self->{server_port} == 0) { 370 1.1 christos # This actually means that s_server exited, because otherwise 371 1.1 christos # we would still searching for ACCEPT... 372 1.1 christos waitpid($pid, 0); 373 1.1 christos die "no ACCEPT detected in '$execcmd' output: $?\n"; 374 1.1 christos } 375 1.1 christos 376 1.1 christos # Just make sure everything else is simply printed [as separate lines]. 377 1.1 christos # The sub process simply inherits our STD* and will keep consuming 378 1.1 christos # server's output and printing it as long as there is anything there, 379 1.1 christos # out of our way. 380 1.1 christos my $error; 381 1.1 christos $pid = undef; 382 1.1 christos if (eval { require Win32::Process; 1; }) { 383 1.1 christos if (Win32::Process::Create(my $h, $^X, "perl -ne print", 0, 0, ".")) { 384 1.1 christos $pid = $h->GetProcessID(); 385 1.1 christos $self->{proc_handle} = $h; # hold handle till next round [or exit] 386 1.1 christos } else { 387 1.1 christos $error = Win32::FormatMessage(Win32::GetLastError()); 388 1.1 christos } 389 1.1 christos } else { 390 1.1 christos if (defined($pid = fork)) { 391 1.1 christos $pid or exec("$^X -ne print") or exit($!); 392 1.1 christos } else { 393 1.1 christos $error = $!; 394 1.1 christos } 395 1.1 christos } 396 1.1 christos 397 1.1 christos # Change back to original stdin 398 1.1 christos open(STDIN, "<&", $savedin); 399 1.1 christos close($savedin); 400 1.1 christos 401 1.1 christos if (!defined($pid)) { 402 1.1 christos kill(3, $self->{real_serverpid}); 403 1.1 christos die "Failed to capture s_server's output: $error\n"; 404 1.1 christos } 405 1.1 christos 406 1.1 christos $self->{serverpid} = $pid; 407 1.1 christos 408 1.1 christos print STDERR "Server responds on ", 409 1.1 christos "$self->{server_addr}:$self->{server_port}\n"; 410 1.1 christos 411 1.1 christos # Connect right away... 412 1.1 christos $self->connect_to_server(); 413 1.1 christos 414 1.1 christos return $self->clientstart; 415 1.1 christos } 416 1.1 christos 417 1.1 christos sub clientstart 418 1.1 christos { 419 1.1 christos my ($self) = shift; 420 1.1 christos 421 1.1 christos my $success = 1; 422 1.1 christos 423 1.1 christos if ($self->execute) { 424 1.1 christos my $pid; 425 1.1 christos my $execcmd = $self->execute 426 1.1 christos ." s_client -engine ossltest" 427 1.1 christos ." -connect $self->{proxy_addr}:$self->{proxy_port}"; 428 1.1 christos if ($self->{isdtls}) { 429 1.1 christos $execcmd .= " -dtls -max_protocol DTLSv1.2" 430 1.1 christos # TLSProxy does not support message fragmentation. So 431 1.1 christos # set a high mtu and fingers crossed. 432 1.1 christos ." -mtu 1500" 433 1.1 christos # UDP has no "accept" for sockets which means we need to 434 1.1 christos # know were to send data back to. 435 1.1 christos ." -bind $self->{client_addr}:$self->{client_port}"; 436 1.1 christos } else { 437 1.1 christos $execcmd .= " -max_protocol TLSv1.3"; 438 1.1 christos } 439 1.1 christos if ($self->cipherc ne "") { 440 1.1 christos $execcmd .= " -cipher ".$self->cipherc; 441 1.1 christos } 442 1.1 christos if ($self->ciphersuitesc ne "") { 443 1.1 christos $execcmd .= " -ciphersuites ".$self->ciphersuitesc; 444 1.1 christos } 445 1.1 christos if ($self->clientflags ne "") { 446 1.1 christos $execcmd .= " ".$self->clientflags; 447 1.1 christos } 448 1.1 christos if ($self->clientflags !~ m/-(no)?servername/) { 449 1.1 christos $execcmd .= " -servername localhost"; 450 1.1 christos } 451 1.1 christos if (defined $self->sessionfile) { 452 1.1 christos $execcmd .= " -ign_eof"; 453 1.1 christos } 454 1.1 christos if ($self->debug) { 455 1.1 christos print STDERR "Client command: $execcmd\n"; 456 1.1 christos } 457 1.1 christos 458 1.1 christos open(my $savedout, ">&STDOUT"); 459 1.1 christos # If we open pipe with new descriptor, attempt to close it, 460 1.1 christos # explicitly or implicitly, would incur waitpid and effectively 461 1.1 christos # dead-lock... 462 1.1 christos if (!($pid = open(STDOUT, "| $execcmd"))) { 463 1.1 christos my $err = $!; 464 1.1 christos kill(3, $self->{real_serverpid}); 465 1.1 christos die "Failed to $execcmd: $err\n"; 466 1.1 christos } 467 1.1 christos $self->{clientpid} = $pid; 468 1.1 christos 469 1.1 christos # queue [magic] input 470 1.1 christos print $self->reneg ? "R" : "test"; 471 1.1 christos 472 1.1 christos # this closes client's stdin without waiting for its pid 473 1.1 christos open(STDOUT, ">&", $savedout); 474 1.1 christos close($savedout); 475 1.1 christos } 476 1.1 christos 477 1.1 christos # Wait for incoming connection from client 478 1.1 christos my $fdset = IO::Select->new($self->{proxy_sock}); 479 1.1 christos if (!$fdset->can_read(60)) { 480 1.1 christos kill(3, $self->{real_serverpid}); 481 1.1 christos die "s_client didn't try to connect\n"; 482 1.1 christos } 483 1.1 christos 484 1.1 christos my $client_sock; 485 1.1 christos if($self->{isdtls}) { 486 1.1 christos $client_sock = $self->{proxy_sock} 487 1.1 christos } elsif (!($client_sock = $self->{proxy_sock}->accept())) { 488 1.1 christos warn "Failed accepting incoming connection: $!\n"; 489 1.1 christos return 0; 490 1.1 christos } 491 1.1 christos 492 1.1 christos print "Connection opened\n"; 493 1.1 christos 494 1.1 christos my $server_sock = $self->{server_sock}; 495 1.1 christos my $indata; 496 1.1 christos 497 1.1 christos #Wait for either the server socket or the client socket to become readable 498 1.1 christos $fdset = IO::Select->new($server_sock, $client_sock); 499 1.1 christos my @ready; 500 1.1 christos my $ctr = 0; 501 1.1 christos local $SIG{PIPE} = "IGNORE"; 502 1.1 christos $self->{saw_session_ticket} = undef; 503 1.1 christos while($fdset->count && $ctr < 10) { 504 1.1 christos if (defined($self->{sessionfile})) { 505 1.1 christos # s_client got -ign_eof and won't be exiting voluntarily, so we 506 1.1 christos # look for data *and* session ticket... 507 1.1 christos last if TLSProxy::Message->success() 508 1.1 christos && $self->{saw_session_ticket}; 509 1.1 christos } 510 1.1 christos if (!(@ready = $fdset->can_read(1))) { 511 1.1 christos last if TLSProxy::Message->success() 512 1.1 christos && $self->{saw_session_ticket}; 513 1.1 christos 514 1.1 christos $ctr++; 515 1.1 christos next; 516 1.1 christos } 517 1.1 christos foreach my $hand (@ready) { 518 1.1 christos if ($hand == $server_sock) { 519 1.1 christos if ($server_sock->sysread($indata, 16384)) { 520 1.1 christos if ($indata = $self->process_packet(1, $indata)) { 521 1.1 christos $client_sock->syswrite($indata) or goto END; 522 1.1 christos } 523 1.1 christos $ctr = 0; 524 1.1 christos } else { 525 1.1 christos $fdset->remove($server_sock); 526 1.1 christos $client_sock->shutdown(SHUT_WR); 527 1.1 christos } 528 1.1 christos } elsif ($hand == $client_sock) { 529 1.1 christos if ($client_sock->sysread($indata, 16384)) { 530 1.1 christos if ($indata = $self->process_packet(0, $indata)) { 531 1.1 christos $server_sock->syswrite($indata) or goto END; 532 1.1 christos } 533 1.1 christos $ctr = 0; 534 1.1 christos } else { 535 1.1 christos $fdset->remove($client_sock); 536 1.1 christos $server_sock->shutdown(SHUT_WR); 537 1.1 christos } 538 1.1 christos } else { 539 1.1 christos kill(3, $self->{real_serverpid}); 540 1.1 christos die "Unexpected handle"; 541 1.1 christos } 542 1.1 christos } 543 1.1 christos } 544 1.1 christos 545 1.1 christos if ($ctr >= 10) { 546 1.1 christos kill(3, $self->{real_serverpid}); 547 1.1 christos print "No progress made\n"; 548 1.1 christos $success = 0; 549 1.1 christos } 550 1.1 christos 551 1.1 christos END: 552 1.1 christos print "Connection closed\n"; 553 1.1 christos if($server_sock) { 554 1.1 christos $server_sock->close(); 555 1.1 christos $self->{server_sock} = undef; 556 1.1 christos } 557 1.1 christos if($client_sock) { 558 1.1 christos #Closing this also kills the child process 559 1.1 christos $client_sock->close(); 560 1.1 christos } 561 1.1 christos 562 1.1 christos my $pid; 563 1.1 christos if (--$self->{serverconnects} == 0) { 564 1.1 christos $pid = $self->{serverpid}; 565 1.1 christos print "Waiting for 'perl -ne print' process to close: $pid...\n"; 566 1.1 christos $pid = waitpid($pid, 0); 567 1.1 christos if ($pid > 0) { 568 1.1 christos die "exit code $? from 'perl -ne print' process\n" if $? != 0; 569 1.1 christos } elsif ($pid == 0) { 570 1.1 christos kill(3, $self->{real_serverpid}); 571 1.1 christos die "lost control over $self->{serverpid}?"; 572 1.1 christos } 573 1.1 christos $pid = $self->{real_serverpid}; 574 1.1 christos print "Waiting for s_server process to close: $pid...\n"; 575 1.1 christos # it's done already, just collect the exit code [and reap]... 576 1.1 christos waitpid($pid, 0); 577 1.1 christos die "exit code $? from s_server process\n" if $? != 0; 578 1.1 christos } else { 579 1.1 christos # It's a bit counter-intuitive spot to make next connection to 580 1.1 christos # the s_server. Rationale is that established connection works 581 1.1 christos # as synchronization point, in sense that this way we know that 582 1.1 christos # s_server is actually done with current session... 583 1.1 christos $self->connect_to_server(); 584 1.1 christos } 585 1.1 christos $pid = $self->{clientpid}; 586 1.1 christos print "Waiting for s_client process to close: $pid...\n"; 587 1.1 christos waitpid($pid, 0); 588 1.1 christos 589 1.1 christos return $success; 590 1.1 christos } 591 1.1 christos 592 1.1 christos sub process_packet 593 1.1 christos { 594 1.1 christos my ($self, $server, $packet) = @_; 595 1.1 christos my $len_real; 596 1.1 christos my $decrypt_len; 597 1.1 christos my $data; 598 1.1 christos my $recnum; 599 1.1 christos 600 1.1 christos if ($server) { 601 1.1 christos print "Received server packet\n"; 602 1.1 christos } else { 603 1.1 christos print "Received client packet\n"; 604 1.1 christos } 605 1.1 christos 606 1.1 christos if ($self->{direction} != $server) { 607 1.1 christos $self->{flight} = $self->{flight} + 1; 608 1.1 christos $self->{direction} = $server; 609 1.1 christos } 610 1.1 christos 611 1.1 christos print "Packet length = ".length($packet)."\n"; 612 1.1 christos print "Processing flight ".$self->flight."\n"; 613 1.1 christos 614 1.1 christos #Return contains the list of record found in the packet followed by the 615 1.1 christos #list of messages in those records and any partial message 616 1.1 christos my @ret = TLSProxy::Record->get_records($server, $self->flight, 617 1.1 christos $self->{partial}[$server].$packet, 618 1.1 christos $self->{isdtls}); 619 1.1 christos 620 1.1 christos $self->{partial}[$server] = $ret[2]; 621 1.1 christos push @{$self->{record_list}}, @{$ret[0]}; 622 1.1 christos push @{$self->{message_list}}, @{$ret[1]}; 623 1.1 christos 624 1.1 christos print "\n"; 625 1.1 christos 626 1.1 christos if (scalar(@{$ret[0]}) == 0 or length($ret[2]) != 0) { 627 1.1 christos return ""; 628 1.1 christos } 629 1.1 christos 630 1.1 christos #Finished parsing. Call user provided filter here 631 1.1 christos if (defined $self->filter) { 632 1.1 christos $self->filter->($self); 633 1.1 christos } 634 1.1 christos 635 1.1 christos #Take a note on NewSessionTicket 636 1.1 christos foreach my $message (reverse @{$self->{message_list}}) { 637 1.1 christos if ($message->{mt} == TLSProxy::Message::MT_NEW_SESSION_TICKET) { 638 1.1 christos $self->{saw_session_ticket} = 1; 639 1.1 christos last; 640 1.1 christos } 641 1.1 christos } 642 1.1 christos 643 1.1 christos #Reconstruct the packet 644 1.1 christos $packet = ""; 645 1.1 christos foreach my $record (@{$self->record_list}) { 646 1.1 christos $packet .= $record->reconstruct_record($server); 647 1.1 christos } 648 1.1 christos 649 1.1 christos print "Forwarded packet length = ".length($packet)."\n\n"; 650 1.1 christos 651 1.1 christos return $packet; 652 1.1 christos } 653 1.1 christos 654 1.1 christos #Read accessors 655 1.1 christos sub execute 656 1.1 christos { 657 1.1 christos my $self = shift; 658 1.1 christos return $self->{execute}; 659 1.1 christos } 660 1.1 christos sub cert 661 1.1 christos { 662 1.1 christos my $self = shift; 663 1.1 christos return $self->{cert}; 664 1.1 christos } 665 1.1 christos sub debug 666 1.1 christos { 667 1.1 christos my $self = shift; 668 1.1 christos return $self->{debug}; 669 1.1 christos } 670 1.1 christos sub flight 671 1.1 christos { 672 1.1 christos my $self = shift; 673 1.1 christos return $self->{flight}; 674 1.1 christos } 675 1.1 christos sub record_list 676 1.1 christos { 677 1.1 christos my $self = shift; 678 1.1 christos return $self->{record_list}; 679 1.1 christos } 680 1.1 christos sub success 681 1.1 christos { 682 1.1 christos my $self = shift; 683 1.1 christos return $self->{success}; 684 1.1 christos } 685 1.1 christos sub end 686 1.1 christos { 687 1.1 christos my $self = shift; 688 1.1 christos return $self->{end}; 689 1.1 christos } 690 1.1 christos sub supports_IPv6 691 1.1 christos { 692 1.1 christos my $self = shift; 693 1.1 christos return $have_IPv6; 694 1.1 christos } 695 1.1 christos sub proxy_addr 696 1.1 christos { 697 1.1 christos my $self = shift; 698 1.1 christos return $self->{proxy_addr}; 699 1.1 christos } 700 1.1 christos sub proxy_port 701 1.1 christos { 702 1.1 christos my $self = shift; 703 1.1 christos return $self->{proxy_port}; 704 1.1 christos } 705 1.1 christos sub server_addr 706 1.1 christos { 707 1.1 christos my $self = shift; 708 1.1 christos return $self->{server_addr}; 709 1.1 christos } 710 1.1 christos sub server_port 711 1.1 christos { 712 1.1 christos my $self = shift; 713 1.1 christos return $self->{server_port}; 714 1.1 christos } 715 1.1 christos sub serverpid 716 1.1 christos { 717 1.1 christos my $self = shift; 718 1.1 christos return $self->{serverpid}; 719 1.1 christos } 720 1.1 christos sub clientpid 721 1.1 christos { 722 1.1 christos my $self = shift; 723 1.1 christos return $self->{clientpid}; 724 1.1 christos } 725 1.1 christos 726 1.1 christos #Read/write accessors 727 1.1 christos sub filter 728 1.1 christos { 729 1.1 christos my $self = shift; 730 1.1 christos if (@_) { 731 1.1 christos $self->{filter} = shift; 732 1.1 christos } 733 1.1 christos return $self->{filter}; 734 1.1 christos } 735 1.1 christos sub cipherc 736 1.1 christos { 737 1.1 christos my $self = shift; 738 1.1 christos if (@_) { 739 1.1 christos $self->{cipherc} = shift; 740 1.1 christos } 741 1.1 christos return $self->{cipherc}; 742 1.1 christos } 743 1.1 christos sub ciphersuitesc 744 1.1 christos { 745 1.1 christos my $self = shift; 746 1.1 christos if (@_) { 747 1.1 christos $self->{ciphersuitesc} = shift; 748 1.1 christos } 749 1.1 christos return $self->{ciphersuitesc}; 750 1.1 christos } 751 1.1 christos sub ciphers 752 1.1 christos { 753 1.1 christos my $self = shift; 754 1.1 christos if (@_) { 755 1.1 christos $self->{ciphers} = shift; 756 1.1 christos } 757 1.1 christos return $self->{ciphers}; 758 1.1 christos } 759 1.1 christos sub ciphersuitess 760 1.1 christos { 761 1.1 christos my $self = shift; 762 1.1 christos if (@_) { 763 1.1 christos $self->{ciphersuitess} = shift; 764 1.1 christos } 765 1.1 christos return $self->{ciphersuitess}; 766 1.1 christos } 767 1.1 christos sub serverflags 768 1.1 christos { 769 1.1 christos my $self = shift; 770 1.1 christos if (@_) { 771 1.1 christos $self->{serverflags} = shift; 772 1.1 christos } 773 1.1 christos return $self->{serverflags}; 774 1.1 christos } 775 1.1 christos sub clientflags 776 1.1 christos { 777 1.1 christos my $self = shift; 778 1.1 christos if (@_) { 779 1.1 christos $self->{clientflags} = shift; 780 1.1 christos } 781 1.1 christos return $self->{clientflags}; 782 1.1 christos } 783 1.1 christos sub serverconnects 784 1.1 christos { 785 1.1 christos my $self = shift; 786 1.1 christos if (@_) { 787 1.1 christos $self->{serverconnects} = shift; 788 1.1 christos } 789 1.1 christos return $self->{serverconnects}; 790 1.1 christos } 791 1.1 christos # This is a bit ugly because the caller is responsible for keeping the records 792 1.1 christos # in sync with the updated message list; simply updating the message list isn't 793 1.1 christos # sufficient to get the proxy to forward the new message. 794 1.1 christos # But it does the trick for the one test (test_sslsessiontick) that needs it. 795 1.1 christos sub message_list 796 1.1 christos { 797 1.1 christos my $self = shift; 798 1.1 christos if (@_) { 799 1.1 christos $self->{message_list} = shift; 800 1.1 christos } 801 1.1 christos return $self->{message_list}; 802 1.1 christos } 803 1.1 christos 804 1.1 christos sub fill_known_data 805 1.1 christos { 806 1.1 christos my $length = shift; 807 1.1 christos my $ret = ""; 808 1.1 christos for (my $i = 0; $i < $length; $i++) { 809 1.1 christos $ret .= chr($i); 810 1.1 christos } 811 1.1 christos return $ret; 812 1.1 christos } 813 1.1 christos 814 1.1 christos sub is_tls13 815 1.1 christos { 816 1.1 christos my $class = shift; 817 1.1 christos if (@_) { 818 1.1 christos $is_tls13 = shift; 819 1.1 christos } 820 1.1 christos return $is_tls13; 821 1.1 christos } 822 1.1 christos 823 1.1 christos sub reneg 824 1.1 christos { 825 1.1 christos my $self = shift; 826 1.1 christos if (@_) { 827 1.1 christos $self->{reneg} = shift; 828 1.1 christos } 829 1.1 christos return $self->{reneg}; 830 1.1 christos } 831 1.1 christos 832 1.1 christos #Setting a sessionfile means that the client will not close until the given 833 1.1 christos #file exists. This is useful in TLSv1.3 where otherwise s_client will close 834 1.1 christos #immediately at the end of the handshake, but before the session has been 835 1.1 christos #received from the server. A side effect of this is that s_client never sends 836 1.1 christos #a close_notify, so instead we consider success to be when it sends application 837 1.1 christos #data over the connection. 838 1.1 christos sub sessionfile 839 1.1 christos { 840 1.1 christos my $self = shift; 841 1.1 christos if (@_) { 842 1.1 christos $self->{sessionfile} = shift; 843 1.1 christos TLSProxy::Message->successondata(1); 844 1.1 christos } 845 1.1 christos return $self->{sessionfile}; 846 1.1 christos } 847 1.1 christos 848 1.1 christos sub ciphersuite 849 1.1 christos { 850 1.1 christos my $class = shift; 851 1.1 christos if (@_) { 852 1.1 christos $ciphersuite = shift; 853 1.1 christos } 854 1.1 christos return $ciphersuite; 855 1.1 christos } 856 1.1 christos 857 1.1 christos sub isdtls 858 1.1 christos { 859 1.1 christos my $self = shift; 860 1.1 christos return $self->{isdtls}; #read-only 861 1.1 christos } 862 1.1 christos 863 1.1 christos 1; 864