2005-02-20 14:27:00 +00:00
# include "network.h"
# include "fdevent.h"
# include "log.h"
# include "connections.h"
# include "plugin.h"
# include "joblist.h"
2009-10-14 14:32:24 +00:00
# include "configfile.h"
2005-02-20 14:27:00 +00:00
# include "network_backends.h"
# include "sys-mmap.h"
# include "sys-socket.h"
2009-10-11 14:31:42 +00:00
# include <sys/types.h>
# include <sys/stat.h>
# include <sys/time.h>
# include <errno.h>
# include <fcntl.h>
# include <unistd.h>
# include <string.h>
# include <stdlib.h>
# include <assert.h>
2005-02-20 14:27:00 +00:00
# ifdef USE_OPENSSL
2006-10-04 13:26:23 +00:00
# include <openssl / ssl.h>
# include <openssl / err.h>
# include <openssl / rand.h>
2013-06-29 12:46:00 +00:00
# ifndef OPENSSL_NO_DH
# include <openssl / dh.h>
# endif
2011-12-27 13:45:36 +00:00
# include <openssl / bn.h>
# if OPENSSL_VERSION_NUMBER >= 0x0090800fL
# ifndef OPENSSL_NO_ECDH
# include <openssl / ecdh.h>
# endif
# endif
2005-02-20 14:27:00 +00:00
# endif
2011-11-30 20:57:54 +00:00
# ifdef USE_OPENSSL
2011-11-30 18:40:08 +00:00
static void ssl_info_callback ( const SSL * ssl , int where , int ret ) {
UNUSED ( ret ) ;
if ( 0 ! = ( where & SSL_CB_HANDSHAKE_START ) ) {
connection * con = SSL_get_app_data ( ssl ) ;
+ + con - > renegotiations ;
} else if ( 0 ! = ( where & SSL_CB_HANDSHAKE_DONE ) ) {
ssl - > s3 - > flags | = SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS ;
}
}
2011-11-30 20:57:54 +00:00
# endif
2011-11-30 18:40:08 +00:00
2010-08-06 21:57:15 +00:00
static handler_t network_server_handle_fdevent ( server * srv , void * context , int revents ) {
2005-02-20 14:27:00 +00:00
server_socket * srv_socket = ( server_socket * ) context ;
connection * con ;
2005-09-23 16:31:49 +00:00
int loops = 0 ;
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
UNUSED ( context ) ;
2006-10-04 13:26:23 +00:00
2010-08-06 21:57:19 +00:00
if ( 0 = = ( revents & FDEVENT_IN ) ) {
2006-10-04 13:26:23 +00:00
log_error_write ( srv , __FILE__ , __LINE__ , " sdd " ,
2005-02-20 14:27:00 +00:00
" strange event for server socket " ,
srv_socket - > fd ,
revents ) ;
2005-03-01 23:01:12 +00:00
return HANDLER_ERROR ;
2005-02-20 14:27:00 +00:00
}
2005-09-23 16:31:49 +00:00
/* accept()s at most 100 connections directly
*
2006-10-04 13:26:23 +00:00
* we jump out after 100 to give the waiting connections a chance */
2005-09-23 16:31:49 +00:00
for ( loops = 0 ; loops < 100 & & NULL ! = ( con = connection_accept ( srv , srv_socket ) ) ; loops + + ) {
2005-02-20 14:27:00 +00:00
handler_t r ;
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
connection_state_machine ( srv , con ) ;
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
switch ( r = plugins_call_handle_joblist ( srv , con ) ) {
case HANDLER_FINISHED :
case HANDLER_GO_ON :
break ;
default :
log_error_write ( srv , __FILE__ , __LINE__ , " d " , r ) ;
break ;
}
}
return HANDLER_GO_ON ;
}
2009-10-14 13:39:59 +00:00
# if defined USE_OPENSSL && ! defined OPENSSL_NO_TLSEXT
2009-10-14 14:32:24 +00:00
static int network_ssl_servername_callback ( SSL * ssl , int * al , server * srv ) {
2009-10-14 13:39:59 +00:00
const char * servername ;
connection * con = ( connection * ) SSL_get_app_data ( ssl ) ;
2009-10-14 14:32:24 +00:00
UNUSED ( al ) ;
2009-10-14 13:39:59 +00:00
buffer_copy_string ( con - > uri . scheme , " https " ) ;
if ( NULL = = ( servername = SSL_get_servername ( ssl , TLSEXT_NAMETYPE_host_name ) ) ) {
2009-10-16 22:06:22 +00:00
#if 0
/* this "error" just means the client didn't support it */
2009-10-14 13:39:59 +00:00
log_error_write ( srv , __FILE__ , __LINE__ , " ss " , " SSL: " ,
" failed to get TLS server name " ) ;
2009-10-16 22:06:22 +00:00
# endif
2009-10-14 13:39:59 +00:00
return SSL_TLSEXT_ERR_NOACK ;
}
buffer_copy_string ( con - > tlsext_server_name , servername ) ;
buffer_to_lower ( con - > tlsext_server_name ) ;
2010-04-28 19:08:11 +00:00
/* Sometimes this is still set, confusing COMP_HTTP_HOST */
buffer_reset ( con - > uri . authority ) ;
2009-10-14 13:39:59 +00:00
config_cond_cache_reset ( srv , con ) ;
config_setup_connection ( srv , con ) ;
config_patch_connection ( srv , con , COMP_SERVER_SOCKET ) ;
config_patch_connection ( srv , con , COMP_HTTP_SCHEME ) ;
config_patch_connection ( srv , con , COMP_HTTP_HOST ) ;
if ( NULL = = con - > conf . ssl_ctx ) {
2009-10-16 22:06:22 +00:00
/* ssl_ctx <=> pemfile was set <=> ssl_ctx got patched: so this should never happen */
2009-10-14 13:39:59 +00:00
log_error_write ( srv , __FILE__ , __LINE__ , " ssb " , " SSL: " ,
2009-10-16 22:06:22 +00:00
" null SSL_CTX for TLS server name " , con - > tlsext_server_name ) ;
2009-10-14 13:39:59 +00:00
return SSL_TLSEXT_ERR_ALERT_FATAL ;
}
/* switch to new SSL_CTX in reaction to a client's server_name extension */
if ( con - > conf . ssl_ctx ! = SSL_set_SSL_CTX ( ssl , con - > conf . ssl_ctx ) ) {
log_error_write ( srv , __FILE__ , __LINE__ , " ssb " , " SSL: " ,
2009-10-16 22:06:22 +00:00
" failed to set SSL_CTX for TLS server name " , con - > tlsext_server_name ) ;
2009-10-14 13:39:59 +00:00
return SSL_TLSEXT_ERR_ALERT_FATAL ;
}
return SSL_TLSEXT_ERR_OK ;
}
# endif
2009-03-07 21:05:37 +00:00
static int network_server_init ( server * srv , buffer * host_token , specific_config * s ) {
2005-02-20 14:27:00 +00:00
int val ;
socklen_t addr_len ;
server_socket * srv_socket ;
char * sp ;
unsigned int port = 0 ;
const char * host ;
buffer * b ;
2005-11-23 10:46:21 +00:00
int is_unix_domain_socket = 0 ;
2006-01-14 17:02:44 +00:00
int fd ;
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
# ifdef __WIN32
WORD wVersionRequested ;
WSADATA wsaData ;
int err ;
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
wVersionRequested = MAKEWORD ( 2 , 2 ) ;
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
err = WSAStartup ( wVersionRequested , & wsaData ) ;
if ( err ! = 0 ) {
/* Tell the user that we could not find a usable */
/* WinSock DLL. */
return - 1 ;
}
# endif
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
srv_socket = calloc ( 1 , sizeof ( * srv_socket ) ) ;
srv_socket - > fd = - 1 ;
2009-09-01 14:03:59 +00:00
srv_socket - > fde_ndx = - 1 ;
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
srv_socket - > srv_token = buffer_init ( ) ;
buffer_copy_string_buffer ( srv_socket - > srv_token , host_token ) ;
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
b = buffer_init ( ) ;
buffer_copy_string_buffer ( b , host_token ) ;
2006-10-04 13:26:23 +00:00
/* ipv4:port
2005-02-20 14:27:00 +00:00
* [ ipv6 ] : port
*/
if ( NULL = = ( sp = strrchr ( b - > ptr , ' : ' ) ) ) {
log_error_write ( srv , __FILE__ , __LINE__ , " sb " , " value of $SERVER[ \" socket \" ] has to be \" ip:port \" . " , b ) ;
2006-10-04 13:26:23 +00:00
2009-09-01 14:03:59 +00:00
goto error_free_socket ;
2005-02-20 14:27:00 +00:00
}
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
host = b - > ptr ;
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
/* check for [ and ] */
if ( b - > ptr [ 0 ] = = ' [ ' & & * ( sp - 1 ) = = ' ] ' ) {
* ( sp - 1 ) = ' \0 ' ;
host + + ;
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
s - > use_ipv6 = 1 ;
}
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
* ( sp + + ) = ' \0 ' ;
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
port = strtol ( sp , NULL , 10 ) ;
2005-11-23 10:46:21 +00:00
if ( host [ 0 ] = = ' / ' ) {
/* host is a unix-domain-socket */
is_unix_domain_socket = 1 ;
} else if ( port = = 0 | | port > 65535 ) {
2005-02-20 14:27:00 +00:00
log_error_write ( srv , __FILE__ , __LINE__ , " sd " , " port out of range: " , port ) ;
2006-10-04 13:26:23 +00:00
2009-09-01 14:03:59 +00:00
goto error_free_socket ;
2005-02-20 14:27:00 +00:00
}
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
if ( * host = = ' \0 ' ) host = NULL ;
2005-11-23 10:46:21 +00:00
if ( is_unix_domain_socket ) {
# ifdef HAVE_SYS_UN_H
srv_socket - > addr . plain . sa_family = AF_UNIX ;
2006-10-04 13:26:23 +00:00
2005-11-23 10:46:21 +00:00
if ( - 1 = = ( srv_socket - > fd = socket ( srv_socket - > addr . plain . sa_family , SOCK_STREAM , 0 ) ) ) {
log_error_write ( srv , __FILE__ , __LINE__ , " ss " , " socket failed: " , strerror ( errno ) ) ;
2009-09-01 14:03:59 +00:00
goto error_free_socket ;
2005-11-23 10:46:21 +00:00
}
# else
log_error_write ( srv , __FILE__ , __LINE__ , " s " ,
" ERROR: Unix Domain sockets are not supported. " ) ;
2009-09-01 14:03:59 +00:00
goto error_free_socket ;
2005-11-23 10:46:21 +00:00
# endif
}
2005-02-20 14:27:00 +00:00
# ifdef HAVE_IPV6
if ( s - > use_ipv6 ) {
srv_socket - > addr . plain . sa_family = AF_INET6 ;
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
if ( - 1 = = ( srv_socket - > fd = socket ( srv_socket - > addr . plain . sa_family , SOCK_STREAM , IPPROTO_TCP ) ) ) {
log_error_write ( srv , __FILE__ , __LINE__ , " ss " , " socket failed: " , strerror ( errno ) ) ;
2009-09-01 14:03:59 +00:00
goto error_free_socket ;
2005-02-20 14:27:00 +00:00
}
srv_socket - > use_ipv6 = 1 ;
}
# endif
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
if ( srv_socket - > fd = = - 1 ) {
srv_socket - > addr . plain . sa_family = AF_INET ;
if ( - 1 = = ( srv_socket - > fd = socket ( srv_socket - > addr . plain . sa_family , SOCK_STREAM , IPPROTO_TCP ) ) ) {
log_error_write ( srv , __FILE__ , __LINE__ , " ss " , " socket failed: " , strerror ( errno ) ) ;
2009-09-01 14:03:59 +00:00
goto error_free_socket ;
2005-02-20 14:27:00 +00:00
}
}
2006-10-04 13:26:23 +00:00
2009-07-11 09:01:18 +00:00
# ifdef FD_CLOEXEC
/* set FD_CLOEXEC now, fdevent_fcntl_set is called later; needed for pipe-logger forks */
fcntl ( srv_socket - > fd , F_SETFD , FD_CLOEXEC ) ;
# endif
2005-02-20 14:27:00 +00:00
/* */
srv - > cur_fds = srv_socket - > fd ;
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
val = 1 ;
if ( setsockopt ( srv_socket - > fd , SOL_SOCKET , SO_REUSEADDR , & val , sizeof ( val ) ) < 0 ) {
2010-08-07 13:16:16 +00:00
log_error_write ( srv , __FILE__ , __LINE__ , " ss " , " socketsockopt(SO_REUSEADDR) failed: " , strerror ( errno ) ) ;
2009-09-01 14:03:59 +00:00
goto error_free_socket ;
2005-02-20 14:27:00 +00:00
}
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
switch ( srv_socket - > addr . plain . sa_family ) {
# ifdef HAVE_IPV6
case AF_INET6 :
memset ( & srv_socket - > addr , 0 , sizeof ( struct sockaddr_in6 ) ) ;
srv_socket - > addr . ipv6 . sin6_family = AF_INET6 ;
if ( host = = NULL ) {
srv_socket - > addr . ipv6 . sin6_addr = in6addr_any ;
2010-08-07 13:16:16 +00:00
log_error_write ( srv , __FILE__ , __LINE__ , " s " , " warning: please use server.use-ipv6 only for hostnames, not without server.bind / empty address; your config will break if the kernel default for IPV6_V6ONLY changes " ) ;
2005-02-20 14:27:00 +00:00
} else {
struct addrinfo hints , * res ;
int r ;
2006-10-04 13:26:23 +00:00
2010-08-07 13:16:16 +00:00
if ( s - > set_v6only ) {
val = 1 ;
if ( - 1 = = setsockopt ( srv_socket - > fd , IPPROTO_IPV6 , IPV6_V6ONLY , & val , sizeof ( val ) ) ) {
log_error_write ( srv , __FILE__ , __LINE__ , " ss " , " socketsockopt(IPV6_V6ONLY) failed: " , strerror ( errno ) ) ;
goto error_free_socket ;
}
} else {
log_error_write ( srv , __FILE__ , __LINE__ , " s " , " warning: server.set-v6only will be removed soon, update your config to have different sockets for ipv4 and ipv6 " ) ;
}
2005-02-20 14:27:00 +00:00
memset ( & hints , 0 , sizeof ( hints ) ) ;
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
hints . ai_family = AF_INET6 ;
hints . ai_socktype = SOCK_STREAM ;
hints . ai_protocol = IPPROTO_TCP ;
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
if ( 0 ! = ( r = getaddrinfo ( host , NULL , & hints , & res ) ) ) {
2006-10-04 13:26:23 +00:00
log_error_write ( srv , __FILE__ , __LINE__ ,
" sssss " , " getaddrinfo failed: " ,
2005-02-20 14:27:00 +00:00
gai_strerror ( r ) , " ' " , host , " ' " ) ;
2006-10-04 13:26:23 +00:00
2009-09-01 14:03:59 +00:00
goto error_free_socket ;
2005-02-20 14:27:00 +00:00
}
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
memcpy ( & ( srv_socket - > addr ) , res - > ai_addr , res - > ai_addrlen ) ;
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
freeaddrinfo ( res ) ;
}
srv_socket - > addr . ipv6 . sin6_port = htons ( port ) ;
addr_len = sizeof ( struct sockaddr_in6 ) ;
break ;
# endif
case AF_INET :
memset ( & srv_socket - > addr , 0 , sizeof ( struct sockaddr_in ) ) ;
srv_socket - > addr . ipv4 . sin_family = AF_INET ;
if ( host = = NULL ) {
srv_socket - > addr . ipv4 . sin_addr . s_addr = htonl ( INADDR_ANY ) ;
} else {
struct hostent * he ;
if ( NULL = = ( he = gethostbyname ( host ) ) ) {
2006-10-04 13:26:23 +00:00
log_error_write ( srv , __FILE__ , __LINE__ ,
" sds " , " gethostbyname failed: " ,
2005-08-08 16:32:17 +00:00
h_errno , host ) ;
2009-09-01 14:03:59 +00:00
goto error_free_socket ;
2005-02-20 14:27:00 +00:00
}
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
if ( he - > h_addrtype ! = AF_INET ) {
log_error_write ( srv , __FILE__ , __LINE__ , " sd " , " addr-type != AF_INET: " , he - > h_addrtype ) ;
2009-09-01 14:03:59 +00:00
goto error_free_socket ;
2005-02-20 14:27:00 +00:00
}
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
if ( he - > h_length ! = sizeof ( struct in_addr ) ) {
log_error_write ( srv , __FILE__ , __LINE__ , " sd " , " addr-length != sizeof(in_addr): " , he - > h_length ) ;
2009-09-01 14:03:59 +00:00
goto error_free_socket ;
2005-02-20 14:27:00 +00:00
}
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
memcpy ( & ( srv_socket - > addr . ipv4 . sin_addr . s_addr ) , he - > h_addr_list [ 0 ] , he - > h_length ) ;
}
srv_socket - > addr . ipv4 . sin_port = htons ( port ) ;
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
addr_len = sizeof ( struct sockaddr_in ) ;
2006-10-04 13:26:23 +00:00
2005-11-23 10:46:21 +00:00
break ;
case AF_UNIX :
srv_socket - > addr . un . sun_family = AF_UNIX ;
strcpy ( srv_socket - > addr . un . sun_path , host ) ;
2006-10-04 13:26:23 +00:00
2005-11-23 10:46:21 +00:00
# ifdef SUN_LEN
addr_len = SUN_LEN ( & srv_socket - > addr . un ) ;
# else
/* stevens says: */
2006-02-28 11:25:16 +00:00
addr_len = strlen ( host ) + 1 + sizeof ( srv_socket - > addr . un . sun_family ) ;
2005-11-23 10:46:21 +00:00
# endif
2006-01-14 17:02:44 +00:00
/* check if the socket exists and try to connect to it. */
if ( - 1 ! = ( fd = connect ( srv_socket - > fd , ( struct sockaddr * ) & ( srv_socket - > addr ) , addr_len ) ) ) {
close ( fd ) ;
2006-10-04 13:26:23 +00:00
log_error_write ( srv , __FILE__ , __LINE__ , " ss " ,
" server socket is still in use: " ,
2006-01-14 17:02:44 +00:00
host ) ;
2009-09-01 14:03:59 +00:00
goto error_free_socket ;
2006-01-14 17:02:44 +00:00
}
/* connect failed */
switch ( errno ) {
case ECONNREFUSED :
unlink ( host ) ;
break ;
case ENOENT :
break ;
default :
2006-10-04 13:26:23 +00:00
log_error_write ( srv , __FILE__ , __LINE__ , " sds " ,
" testing socket failed: " ,
2006-01-14 17:02:44 +00:00
host , strerror ( errno ) ) ;
2009-09-01 14:03:59 +00:00
goto error_free_socket ;
2006-01-14 17:02:44 +00:00
}
2005-02-20 14:27:00 +00:00
break ;
default :
2009-09-01 14:03:59 +00:00
goto error_free_socket ;
2005-02-20 14:27:00 +00:00
}
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
if ( 0 ! = bind ( srv_socket - > fd , ( struct sockaddr * ) & ( srv_socket - > addr ) , addr_len ) ) {
2006-01-14 17:02:44 +00:00
switch ( srv_socket - > addr . plain . sa_family ) {
case AF_UNIX :
2006-10-04 13:26:23 +00:00
log_error_write ( srv , __FILE__ , __LINE__ , " sds " ,
" can't bind to socket: " ,
2006-01-14 17:02:44 +00:00
host , strerror ( errno ) ) ;
break ;
default :
2006-10-04 13:26:23 +00:00
log_error_write ( srv , __FILE__ , __LINE__ , " ssds " ,
" can't bind to port: " ,
2006-01-14 17:02:44 +00:00
host , port , strerror ( errno ) ) ;
break ;
}
2009-09-01 14:03:59 +00:00
goto error_free_socket ;
2005-02-20 14:27:00 +00:00
}
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
if ( - 1 = = listen ( srv_socket - > fd , 128 * 8 ) ) {
log_error_write ( srv , __FILE__ , __LINE__ , " ss " , " listen failed: " , strerror ( errno ) ) ;
2009-09-01 14:03:59 +00:00
goto error_free_socket ;
2005-02-20 14:27:00 +00:00
}
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
if ( s - > is_ssl ) {
# ifdef USE_OPENSSL
2009-10-14 13:39:59 +00:00
if ( NULL = = ( srv_socket - > ssl_ctx = s - > ssl_ctx ) ) {
2005-02-20 14:27:00 +00:00
log_error_write ( srv , __FILE__ , __LINE__ , " s " , " ssl.pemfile has to be set " ) ;
2009-09-01 14:03:59 +00:00
goto error_free_socket ;
2005-02-20 14:27:00 +00:00
}
# else
2006-10-04 13:26:23 +00:00
log_error_write ( srv , __FILE__ , __LINE__ , " ss " , " SSL: " ,
2005-02-20 14:27:00 +00:00
" ssl requested but openssl support is not compiled in " ) ;
2006-10-04 13:26:23 +00:00
2009-09-01 14:03:59 +00:00
goto error_free_socket ;
2009-04-26 17:59:55 +00:00
# endif
# ifdef TCP_DEFER_ACCEPT
} else if ( s - > defer_accept ) {
int v = s - > defer_accept ;
if ( - 1 = = setsockopt ( srv_socket - > fd , IPPROTO_TCP , TCP_DEFER_ACCEPT , & v , sizeof ( v ) ) ) {
log_error_write ( srv , __FILE__ , __LINE__ , " ss " , " can't set TCP_DEFER_ACCEPT: " , strerror ( errno ) ) ;
}
2005-04-30 10:03:29 +00:00
# endif
} else {
# ifdef SO_ACCEPTFILTER
2009-04-26 17:59:55 +00:00
/* FreeBSD accf_http filter */
struct accept_filter_arg afa ;
2005-04-30 10:03:29 +00:00
memset ( & afa , 0 , sizeof ( afa ) ) ;
strcpy ( afa . af_name , " httpready " ) ;
if ( setsockopt ( srv_socket - > fd , SOL_SOCKET , SO_ACCEPTFILTER , & afa , sizeof ( afa ) ) < 0 ) {
if ( errno ! = ENOENT ) {
log_error_write ( srv , __FILE__ , __LINE__ , " ss " , " can't set accept-filter 'httpready': " , strerror ( errno ) ) ;
}
}
2005-02-20 14:27:00 +00:00
# endif
}
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
srv_socket - > is_ssl = s - > is_ssl ;
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
if ( srv - > srv_sockets . size = = 0 ) {
srv - > srv_sockets . size = 4 ;
srv - > srv_sockets . used = 0 ;
srv - > srv_sockets . ptr = malloc ( srv - > srv_sockets . size * sizeof ( server_socket ) ) ;
} else if ( srv - > srv_sockets . used = = srv - > srv_sockets . size ) {
srv - > srv_sockets . size + = 4 ;
srv - > srv_sockets . ptr = realloc ( srv - > srv_sockets . ptr , srv - > srv_sockets . size * sizeof ( server_socket ) ) ;
}
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
srv - > srv_sockets . ptr [ srv - > srv_sockets . used + + ] = srv_socket ;
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
buffer_free ( b ) ;
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
return 0 ;
2009-09-01 14:03:59 +00:00
error_free_socket :
if ( srv_socket - > fd ! = - 1 ) {
/* check if server fd are already registered */
if ( srv_socket - > fde_ndx ! = - 1 ) {
fdevent_event_del ( srv - > ev , & ( srv_socket - > fde_ndx ) , srv_socket - > fd ) ;
fdevent_unregister ( srv - > ev , srv_socket - > fd ) ;
}
close ( srv_socket - > fd ) ;
}
buffer_free ( srv_socket - > srv_token ) ;
free ( srv_socket ) ;
2012-11-09 14:23:22 +00:00
buffer_free ( b ) ;
2009-09-01 14:03:59 +00:00
return - 1 ;
2005-02-20 14:27:00 +00:00
}
int network_close ( server * srv ) {
size_t i ;
for ( i = 0 ; i < srv - > srv_sockets . used ; i + + ) {
server_socket * srv_socket = srv - > srv_sockets . ptr [ i ] ;
2006-10-04 13:26:23 +00:00
2005-08-31 09:16:18 +00:00
if ( srv_socket - > fd ! = - 1 ) {
2005-02-20 14:27:00 +00:00
/* check if server fd are already registered */
if ( srv_socket - > fde_ndx ! = - 1 ) {
fdevent_event_del ( srv - > ev , & ( srv_socket - > fde_ndx ) , srv_socket - > fd ) ;
fdevent_unregister ( srv - > ev , srv_socket - > fd ) ;
}
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
close ( srv_socket - > fd ) ;
}
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
buffer_free ( srv_socket - > srv_token ) ;
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
free ( srv_socket ) ;
}
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
free ( srv - > srv_sockets . ptr ) ;
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
return 0 ;
}
2005-10-31 15:34:00 +00:00
typedef enum {
NETWORK_BACKEND_UNSET ,
NETWORK_BACKEND_WRITE ,
NETWORK_BACKEND_WRITEV ,
NETWORK_BACKEND_LINUX_SENDFILE ,
NETWORK_BACKEND_FREEBSD_SENDFILE ,
NETWORK_BACKEND_SOLARIS_SENDFILEV
} network_backend_t ;
2005-02-20 14:27:00 +00:00
int network_init ( server * srv ) {
buffer * b ;
size_t i ;
2005-10-31 15:34:00 +00:00
network_backend_t backend ;
2006-10-04 13:26:23 +00:00
2011-03-13 18:00:09 +00:00
# if OPENSSL_VERSION_NUMBER >= 0x0090800fL
2011-08-22 15:32:55 +00:00
# ifndef OPENSSL_NO_ECDH
2011-03-13 18:00:09 +00:00
EC_KEY * ecdh ;
int nid ;
# endif
2011-08-22 15:32:55 +00:00
# endif
2011-03-13 18:00:09 +00:00
2011-04-24 16:02:55 +00:00
# ifdef USE_OPENSSL
2013-06-29 12:46:00 +00:00
# ifndef OPENSSL_NO_DH
2011-04-24 16:02:55 +00:00
DH * dh ;
2013-06-29 12:46:00 +00:00
# endif
2011-04-24 16:02:55 +00:00
BIO * bio ;
2011-03-13 18:00:09 +00:00
/* 1024-bit MODP Group with 160-bit prime order subgroup (RFC5114)
* - - - - - BEGIN DH PARAMETERS - - - - -
* MIIBDAKBgQCxC4 + WoIDgHd6S3l6uXVTsUsmfvPsGo8aaap3KUtI7YWBz4oZ1oj0Y
* mDjvHi7mUsAT7LSuqQYRIySXXDzUm4O / rMvdfZDEvXCYSI6cIZpzck7 / 1 vrlZEc4
* + qMaT / VbzMChUa9fDci0vUW / N982XBpl5oz9p21NpwjfH7K8LkpDcQKBgQCk0cvV
* w / 00 EmdlpELvuZkF + BBN0lisUH / WQGz / FCZtMSZv6h5cQVZLd35pD1UE8hMWAhe0
* sBuIal6RVH + eJ0n01 / vX07mpLuGQnQ0iY / gKdqaiTAh6CR9THb8KAWm2oorWYqTR
* jnOvoy13nVkY0IvIhY9Nzvl8KiSFXm7rIrOy5QICAKA =
* - - - - - END DH PARAMETERS - - - - -
*/
2011-04-24 16:02:55 +00:00
static const unsigned char dh1024_p [ ] = {
2011-03-13 18:00:09 +00:00
0xB1 , 0x0B , 0x8F , 0x96 , 0xA0 , 0x80 , 0xE0 , 0x1D , 0xDE , 0x92 , 0xDE , 0x5E ,
0xAE , 0x5D , 0x54 , 0xEC , 0x52 , 0xC9 , 0x9F , 0xBC , 0xFB , 0x06 , 0xA3 , 0xC6 ,
0x9A , 0x6A , 0x9D , 0xCA , 0x52 , 0xD2 , 0x3B , 0x61 , 0x60 , 0x73 , 0xE2 , 0x86 ,
0x75 , 0xA2 , 0x3D , 0x18 , 0x98 , 0x38 , 0xEF , 0x1E , 0x2E , 0xE6 , 0x52 , 0xC0 ,
0x13 , 0xEC , 0xB4 , 0xAE , 0xA9 , 0x06 , 0x11 , 0x23 , 0x24 , 0x97 , 0x5C , 0x3C ,
0xD4 , 0x9B , 0x83 , 0xBF , 0xAC , 0xCB , 0xDD , 0x7D , 0x90 , 0xC4 , 0xBD , 0x70 ,
0x98 , 0x48 , 0x8E , 0x9C , 0x21 , 0x9A , 0x73 , 0x72 , 0x4E , 0xFF , 0xD6 , 0xFA ,
0xE5 , 0x64 , 0x47 , 0x38 , 0xFA , 0xA3 , 0x1A , 0x4F , 0xF5 , 0x5B , 0xCC , 0xC0 ,
0xA1 , 0x51 , 0xAF , 0x5F , 0x0D , 0xC8 , 0xB4 , 0xBD , 0x45 , 0xBF , 0x37 , 0xDF ,
0x36 , 0x5C , 0x1A , 0x65 , 0xE6 , 0x8C , 0xFD , 0xA7 , 0x6D , 0x4D , 0xA7 , 0x08 ,
0xDF , 0x1F , 0xB2 , 0xBC , 0x2E , 0x4A , 0x43 , 0x71 ,
} ;
2011-04-24 16:02:55 +00:00
static const unsigned char dh1024_g [ ] = {
2011-03-13 18:00:09 +00:00
0xA4 , 0xD1 , 0xCB , 0xD5 , 0xC3 , 0xFD , 0x34 , 0x12 , 0x67 , 0x65 , 0xA4 , 0x42 ,
0xEF , 0xB9 , 0x99 , 0x05 , 0xF8 , 0x10 , 0x4D , 0xD2 , 0x58 , 0xAC , 0x50 , 0x7F ,
0xD6 , 0x40 , 0x6C , 0xFF , 0x14 , 0x26 , 0x6D , 0x31 , 0x26 , 0x6F , 0xEA , 0x1E ,
0x5C , 0x41 , 0x56 , 0x4B , 0x77 , 0x7E , 0x69 , 0x0F , 0x55 , 0x04 , 0xF2 , 0x13 ,
0x16 , 0x02 , 0x17 , 0xB4 , 0xB0 , 0x1B , 0x88 , 0x6A , 0x5E , 0x91 , 0x54 , 0x7F ,
0x9E , 0x27 , 0x49 , 0xF4 , 0xD7 , 0xFB , 0xD7 , 0xD3 , 0xB9 , 0xA9 , 0x2E , 0xE1 ,
0x90 , 0x9D , 0x0D , 0x22 , 0x63 , 0xF8 , 0x0A , 0x76 , 0xA6 , 0xA2 , 0x4C , 0x08 ,
0x7A , 0x09 , 0x1F , 0x53 , 0x1D , 0xBF , 0x0A , 0x01 , 0x69 , 0xB6 , 0xA2 , 0x8A ,
0xD6 , 0x62 , 0xA4 , 0xD1 , 0x8E , 0x73 , 0xAF , 0xA3 , 0x2D , 0x77 , 0x9D , 0x59 ,
0x18 , 0xD0 , 0x8B , 0xC8 , 0x85 , 0x8F , 0x4D , 0xCE , 0xF9 , 0x7C , 0x2A , 0x24 ,
0x85 , 0x5E , 0x6E , 0xEB , 0x22 , 0xB3 , 0xB2 , 0xE5 ,
} ;
2011-04-24 16:02:55 +00:00
# endif
2011-03-13 18:00:09 +00:00
2006-10-04 13:26:23 +00:00
struct nb_map {
network_backend_t nb ;
const char * name ;
} network_backends [ ] = {
2005-10-31 15:34:00 +00:00
/* lowest id wins */
# if defined USE_LINUX_SENDFILE
{ NETWORK_BACKEND_LINUX_SENDFILE , " linux-sendfile " } ,
# endif
# if defined USE_FREEBSD_SENDFILE
{ NETWORK_BACKEND_FREEBSD_SENDFILE , " freebsd-sendfile " } ,
# endif
# if defined USE_SOLARIS_SENDFILEV
{ NETWORK_BACKEND_SOLARIS_SENDFILEV , " solaris-sendfilev " } ,
# endif
# if defined USE_WRITEV
{ NETWORK_BACKEND_WRITEV , " writev " } ,
# endif
{ NETWORK_BACKEND_WRITE , " write " } ,
{ NETWORK_BACKEND_UNSET , NULL }
} ;
2006-10-04 13:26:23 +00:00
2009-10-14 13:39:59 +00:00
# ifdef USE_OPENSSL
/* load SSL certificates */
for ( i = 0 ; i < srv - > config_context - > used ; i + + ) {
specific_config * s = srv - > config_storage [ i ] ;
2011-11-30 18:40:08 +00:00
# ifndef SSL_OP_NO_COMPRESSION
# define SSL_OP_NO_COMPRESSION 0
# endif
long ssloptions =
SSL_OP_ALL | SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION | SSL_OP_NO_COMPRESSION ;
2009-10-14 13:39:59 +00:00
if ( buffer_is_empty ( s - > ssl_pemfile ) ) continue ;
# ifdef OPENSSL_NO_TLSEXT
2009-10-14 17:46:23 +00:00
{
data_config * dc = ( data_config * ) srv - > config_context - > data [ i ] ;
if ( COMP_HTTP_HOST = = dc - > comp ) {
log_error_write ( srv , __FILE__ , __LINE__ , " ss " , " SSL: " ,
" can't use ssl.pemfile with $HTTP[ \" host \" ], openssl version does not support TLS extensions " ) ;
return - 1 ;
}
2009-10-14 13:39:59 +00:00
}
# endif
if ( srv - > ssl_is_init = = 0 ) {
SSL_load_error_strings ( ) ;
SSL_library_init ( ) ;
2011-03-13 18:00:09 +00:00
OpenSSL_add_all_algorithms ( ) ;
2009-10-14 13:39:59 +00:00
srv - > ssl_is_init = 1 ;
if ( 0 = = RAND_status ( ) ) {
log_error_write ( srv , __FILE__ , __LINE__ , " ss " , " SSL: " ,
" not enough entropy in the pool " ) ;
return - 1 ;
}
}
if ( NULL = = ( s - > ssl_ctx = SSL_CTX_new ( SSLv23_server_method ( ) ) ) ) {
log_error_write ( srv , __FILE__ , __LINE__ , " ss " , " SSL: " ,
ERR_error_string ( ERR_get_error ( ) , NULL ) ) ;
return - 1 ;
}
2011-11-30 18:40:08 +00:00
SSL_CTX_set_options ( s - > ssl_ctx , ssloptions ) ;
SSL_CTX_set_info_callback ( s - > ssl_ctx , ssl_info_callback ) ;
2009-10-14 13:39:59 +00:00
if ( ! s - > ssl_use_sslv2 ) {
/* disable SSLv2 */
2010-02-28 11:48:05 +00:00
if ( ! ( SSL_OP_NO_SSLv2 & SSL_CTX_set_options ( s - > ssl_ctx , SSL_OP_NO_SSLv2 ) ) ) {
2009-10-14 13:39:59 +00:00
log_error_write ( srv , __FILE__ , __LINE__ , " ss " , " SSL: " ,
ERR_error_string ( ERR_get_error ( ) , NULL ) ) ;
return - 1 ;
}
}
2011-03-13 18:00:09 +00:00
if ( ! s - > ssl_use_sslv3 ) {
/* disable SSLv3 */
if ( ! ( SSL_OP_NO_SSLv3 & SSL_CTX_set_options ( s - > ssl_ctx , SSL_OP_NO_SSLv3 ) ) ) {
log_error_write ( srv , __FILE__ , __LINE__ , " ss " , " SSL: " ,
ERR_error_string ( ERR_get_error ( ) , NULL ) ) ;
return - 1 ;
}
}
2009-10-14 13:39:59 +00:00
if ( ! buffer_is_empty ( s - > ssl_cipher_list ) ) {
/* Disable support for low encryption ciphers */
if ( SSL_CTX_set_cipher_list ( s - > ssl_ctx , s - > ssl_cipher_list - > ptr ) ! = 1 ) {
log_error_write ( srv , __FILE__ , __LINE__ , " ss " , " SSL: " ,
ERR_error_string ( ERR_get_error ( ) , NULL ) ) ;
return - 1 ;
}
2011-11-30 19:59:24 +00:00
if ( s - > ssl_honor_cipher_order ) {
SSL_CTX_set_options ( s - > ssl_ctx , SSL_OP_CIPHER_SERVER_PREFERENCE ) ;
}
2009-10-14 13:39:59 +00:00
}
2013-06-29 12:46:00 +00:00
# ifndef OPENSSL_NO_DH
2011-03-13 18:00:09 +00:00
/* Support for Diffie-Hellman key exchange */
if ( ! buffer_is_empty ( s - > ssl_dh_file ) ) {
/* DH parameters from file */
bio = BIO_new_file ( ( char * ) s - > ssl_dh_file - > ptr , " r " ) ;
if ( bio = = NULL ) {
log_error_write ( srv , __FILE__ , __LINE__ , " ss " , " SSL: Unable to open file " , s - > ssl_dh_file - > ptr ) ;
return - 1 ;
}
dh = PEM_read_bio_DHparams ( bio , NULL , NULL , NULL ) ;
BIO_free ( bio ) ;
if ( dh = = NULL ) {
log_error_write ( srv , __FILE__ , __LINE__ , " ss " , " SSL: PEM_read_bio_DHparams failed " , s - > ssl_dh_file - > ptr ) ;
return - 1 ;
}
} else {
/* Default DH parameters from RFC5114 */
dh = DH_new ( ) ;
if ( dh = = NULL ) {
log_error_write ( srv , __FILE__ , __LINE__ , " s " , " SSL: DH_new () failed " ) ;
return - 1 ;
}
dh - > p = BN_bin2bn ( dh1024_p , sizeof ( dh1024_p ) , NULL ) ;
dh - > g = BN_bin2bn ( dh1024_g , sizeof ( dh1024_g ) , NULL ) ;
dh - > length = 160 ;
if ( ( dh - > p = = NULL ) | | ( dh - > g = = NULL ) ) {
DH_free ( dh ) ;
log_error_write ( srv , __FILE__ , __LINE__ , " s " , " SSL: BN_bin2bn () failed " ) ;
return - 1 ;
}
}
SSL_CTX_set_tmp_dh ( s - > ssl_ctx , dh ) ;
SSL_CTX_set_options ( s - > ssl_ctx , SSL_OP_SINGLE_DH_USE ) ;
DH_free ( dh ) ;
2013-06-29 12:46:00 +00:00
# else
if ( ! buffer_is_empty ( s - > ssl_dh_file ) ) {
log_error_write ( srv , __FILE__ , __LINE__ , " ss " , " SSL: openssl compiled without DH support, can't load parameters from " , s - > ssl_dh_file - > ptr ) ;
}
# endif
2011-03-13 18:00:09 +00:00
# if OPENSSL_VERSION_NUMBER >= 0x0090800fL
# ifndef OPENSSL_NO_ECDH
/* Support for Elliptic-Curve Diffie-Hellman key exchange */
if ( ! buffer_is_empty ( s - > ssl_ec_curve ) ) {
/* OpenSSL only supports the "named curves" from RFC 4492, section 5.1.1. */
nid = OBJ_sn2nid ( ( char * ) s - > ssl_ec_curve - > ptr ) ;
if ( nid = = 0 ) {
log_error_write ( srv , __FILE__ , __LINE__ , " ss " , " SSL: Unknown curve name " , s - > ssl_ec_curve - > ptr ) ;
return - 1 ;
}
} else {
/* Default curve */
nid = OBJ_sn2nid ( " prime256v1 " ) ;
}
ecdh = EC_KEY_new_by_curve_name ( nid ) ;
if ( ecdh = = NULL ) {
log_error_write ( srv , __FILE__ , __LINE__ , " ss " , " SSL: Unable to create curve " , s - > ssl_ec_curve - > ptr ) ;
return - 1 ;
}
SSL_CTX_set_tmp_ecdh ( s - > ssl_ctx , ecdh ) ;
SSL_CTX_set_options ( s - > ssl_ctx , SSL_OP_SINGLE_ECDH_USE ) ;
EC_KEY_free ( ecdh ) ;
# endif
# endif
2009-10-14 13:39:59 +00:00
if ( ! buffer_is_empty ( s - > ssl_ca_file ) ) {
if ( 1 ! = SSL_CTX_load_verify_locations ( s - > ssl_ctx , s - > ssl_ca_file - > ptr , NULL ) ) {
log_error_write ( srv , __FILE__ , __LINE__ , " ssb " , " SSL: " ,