You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

TcpSocket.cxx 18KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757
  1. /* Copyright (C) 2002-2005 RealVNC Ltd. All Rights Reserved.
  2. *
  3. * This is free software; you can redistribute it and/or modify
  4. * it under the terms of the GNU General Public License as published by
  5. * the Free Software Foundation; either version 2 of the License, or
  6. * (at your option) any later version.
  7. *
  8. * This software is distributed in the hope that it will be useful,
  9. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  10. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  11. * GNU General Public License for more details.
  12. *
  13. * You should have received a copy of the GNU General Public License
  14. * along with this software; if not, write to the Free Software
  15. * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307,
  16. * USA.
  17. */
  18. #ifdef HAVE_CONFIG_H
  19. #include <config.h>
  20. #endif
  21. #ifdef WIN32
  22. //#include <io.h>
  23. #include <winsock2.h>
  24. #include <ws2tcpip.h>
  25. #define errorNumber WSAGetLastError()
  26. #else
  27. #define errorNumber errno
  28. #define closesocket close
  29. #include <sys/types.h>
  30. #include <sys/socket.h>
  31. #include <arpa/inet.h>
  32. #include <netinet/in.h>
  33. #include <netinet/tcp.h>
  34. #include <netdb.h>
  35. #include <unistd.h>
  36. #include <errno.h>
  37. #include <string.h>
  38. #include <signal.h>
  39. #include <fcntl.h>
  40. #endif
  41. #include <stdlib.h>
  42. #include <network/TcpSocket.h>
  43. #include <rfb/util.h>
  44. #include <rfb/LogWriter.h>
  45. #include <rfb/Configuration.h>
  46. #ifndef INADDR_NONE
  47. #define INADDR_NONE ((unsigned long)-1)
  48. #endif
  49. #ifndef INADDR_LOOPBACK
  50. #define INADDR_LOOPBACK ((unsigned long)0x7F000001)
  51. #endif
  52. #if defined(HAVE_GETADDRINFO) && !defined(IN6_ARE_ADDR_EQUAL)
  53. #define IN6_ARE_ADDR_EQUAL(a,b) \
  54. (memcmp ((const void*)(a), (const void*)(b), sizeof (struct in6_addr)) == 0)
  55. #endif
  56. using namespace network;
  57. using namespace rdr;
  58. typedef struct vnc_sockaddr {
  59. union {
  60. sockaddr sa;
  61. sockaddr_in sin;
  62. #ifdef HAVE_GETADDRINFO
  63. sockaddr_in6 sin6;
  64. #endif
  65. } u;
  66. } vnc_sockaddr_t;
  67. static rfb::LogWriter vlog("TcpSocket");
  68. static rfb::BoolParameter UseIPv4("UseIPv4", "Use IPv4 for incoming and outgoing connections.", true);
  69. #ifdef HAVE_GETADDRINFO
  70. static rfb::BoolParameter UseIPv6("UseIPv6", "Use IPv6 for incoming and outgoing connections.", true);
  71. #endif
  72. /* Tunnelling support. */
  73. int network::findFreeTcpPort (void)
  74. {
  75. int sock;
  76. struct sockaddr_in addr;
  77. memset(&addr, 0, sizeof(addr));
  78. addr.sin_family = AF_INET;
  79. addr.sin_addr.s_addr = INADDR_ANY;
  80. if ((sock = socket (AF_INET, SOCK_STREAM, 0)) < 0)
  81. throw SocketException ("unable to create socket", errorNumber);
  82. addr.sin_port = 0;
  83. if (bind (sock, (struct sockaddr *)&addr, sizeof (addr)) < 0)
  84. throw SocketException ("unable to find free port", errorNumber);
  85. socklen_t n = sizeof(addr);
  86. if (getsockname (sock, (struct sockaddr *)&addr, &n) < 0)
  87. throw SocketException ("unable to get port number", errorNumber);
  88. closesocket (sock);
  89. return ntohs(addr.sin_port);
  90. }
  91. // -=- Socket initialisation
  92. static bool socketsInitialised = false;
  93. static void initSockets() {
  94. if (socketsInitialised)
  95. return;
  96. #ifdef WIN32
  97. WORD requiredVersion = MAKEWORD(2,0);
  98. WSADATA initResult;
  99. if (WSAStartup(requiredVersion, &initResult) != 0)
  100. throw SocketException("unable to initialise Winsock2", errorNumber);
  101. #else
  102. signal(SIGPIPE, SIG_IGN);
  103. #endif
  104. socketsInitialised = true;
  105. }
  106. // -=- TcpSocket
  107. TcpSocket::TcpSocket(int sock, bool close)
  108. : Socket(new FdInStream(sock), new FdOutStream(sock), true), closeFd(close)
  109. {
  110. }
  111. TcpSocket::TcpSocket(const char *host, int port)
  112. : closeFd(true)
  113. {
  114. int sock, err, result, family;
  115. vnc_sockaddr_t sa;
  116. socklen_t salen;
  117. #ifdef HAVE_GETADDRINFO
  118. struct addrinfo *ai, *current, hints;
  119. #endif
  120. // - Create a socket
  121. initSockets();
  122. #ifdef HAVE_GETADDRINFO
  123. memset(&hints, 0, sizeof(struct addrinfo));
  124. hints.ai_family = AF_UNSPEC;
  125. hints.ai_socktype = SOCK_STREAM;
  126. hints.ai_canonname = NULL;
  127. hints.ai_addr = NULL;
  128. hints.ai_next = NULL;
  129. if ((result = getaddrinfo(host, NULL, &hints, &ai)) != 0) {
  130. throw Exception("unable to resolve host by name: %s",
  131. gai_strerror(result));
  132. }
  133. // This logic is too complex for the compiler to determine if
  134. // sock is properly assigned or not.
  135. sock = -1;
  136. for (current = ai; current != NULL; current = current->ai_next) {
  137. family = current->ai_family;
  138. switch (family) {
  139. case AF_INET:
  140. if (!UseIPv4)
  141. continue;
  142. break;
  143. case AF_INET6:
  144. if (!UseIPv6)
  145. continue;
  146. break;
  147. default:
  148. continue;
  149. }
  150. salen = current->ai_addrlen;
  151. memcpy(&sa, current->ai_addr, salen);
  152. if (family == AF_INET)
  153. sa.u.sin.sin_port = htons(port);
  154. else
  155. sa.u.sin6.sin6_port = htons(port);
  156. #else /* HAVE_GETADDRINFO */
  157. if (!UseIPv4)
  158. throw Exception("Only IPv4 available but it is disabled");
  159. family = AF_INET;
  160. salen = sizeof(struct sockaddr_in);
  161. /* Try processing the host as an IP address */
  162. memset(&sa, 0, sizeof(sa));
  163. sa.u.sin.sin_family = AF_INET;
  164. sa.u.sin.sin_addr.s_addr = inet_addr((char *)host);
  165. sa.u.sin.sin_port = htons(port);
  166. if ((int)sa.u.sin.sin_addr.s_addr == -1) {
  167. /* Host was not an IP address - try resolving as DNS name */
  168. struct hostent *hostinfo;
  169. hostinfo = gethostbyname((char *)host);
  170. if (hostinfo && hostinfo->h_addr) {
  171. sa.u.sin.sin_addr.s_addr = ((struct in_addr *)hostinfo->h_addr)->s_addr;
  172. } else {
  173. err = errorNumber;
  174. throw SocketException("unable to resolve host by name", err);
  175. }
  176. }
  177. #endif /* HAVE_GETADDRINFO */
  178. sock = socket (family, SOCK_STREAM, 0);
  179. if (sock == -1) {
  180. err = errorNumber;
  181. #ifdef HAVE_GETADDRINFO
  182. freeaddrinfo(ai);
  183. #endif /* HAVE_GETADDRINFO */
  184. throw SocketException("unable to create socket", err);
  185. }
  186. /* Attempt to connect to the remote host */
  187. while ((result = connect(sock, &sa.u.sa, salen)) == -1) {
  188. err = errorNumber;
  189. #ifndef WIN32
  190. if (err == EINTR)
  191. continue;
  192. #endif
  193. closesocket(sock);
  194. break;
  195. }
  196. #ifdef HAVE_GETADDRINFO
  197. if (result == 0)
  198. break;
  199. }
  200. freeaddrinfo(ai);
  201. if (current == NULL)
  202. throw Exception("No useful address for host");
  203. #endif /* HAVE_GETADDRINFO */
  204. if (result == -1)
  205. throw SocketException("unable connect to socket", err);
  206. #ifndef WIN32
  207. // - By default, close the socket on exec()
  208. fcntl(sock, F_SETFD, FD_CLOEXEC);
  209. #endif
  210. // Disable Nagle's algorithm, to reduce latency
  211. enableNagles(sock, false);
  212. // Create the input and output streams
  213. instream = new FdInStream(sock);
  214. outstream = new FdOutStream(sock);
  215. ownStreams = true;
  216. }
  217. TcpSocket::~TcpSocket() {
  218. if (closeFd)
  219. closesocket(getFd());
  220. }
  221. int TcpSocket::getMyPort() {
  222. return getSockPort(getFd());
  223. }
  224. char* TcpSocket::getPeerAddress() {
  225. vnc_sockaddr_t sa;
  226. socklen_t sa_size = sizeof(sa);
  227. if (getpeername(getFd(), &sa.u.sa, &sa_size) != 0) {
  228. vlog.error("unable to get peer name for socket");
  229. return rfb::strDup("");
  230. }
  231. #if defined(HAVE_GETADDRINFO) && defined(HAVE_INET_PTON)
  232. if (sa.u.sa.sa_family == AF_INET6) {
  233. char buffer[INET6_ADDRSTRLEN + 2];
  234. const char *name;
  235. buffer[0] = '[';
  236. name = inet_ntop(sa.u.sa.sa_family, &sa.u.sin6.sin6_addr,
  237. buffer + 1, sizeof(buffer) - 2);
  238. if (name == NULL) {
  239. vlog.error("unable to convert peer name to a string");
  240. return rfb::strDup("");
  241. }
  242. strcat(buffer, "]");
  243. return rfb::strDup(buffer);
  244. }
  245. #endif
  246. if (sa.u.sa.sa_family == AF_INET) {
  247. char *name;
  248. name = inet_ntoa(sa.u.sin.sin_addr);
  249. if (name == NULL) {
  250. vlog.error("unable to convert peer name to a string");
  251. return rfb::strDup("");
  252. }
  253. return rfb::strDup(name);
  254. }
  255. vlog.error("unknown address family for socket");
  256. return rfb::strDup("");
  257. }
  258. int TcpSocket::getPeerPort() {
  259. vnc_sockaddr_t sa;
  260. socklen_t sa_size = sizeof(sa);
  261. getpeername(getFd(), &sa.u.sa, &sa_size);
  262. switch (sa.u.sa.sa_family) {
  263. #ifdef HAVE_GETADDRINFO
  264. case AF_INET6:
  265. return ntohs(sa.u.sin6.sin6_port);
  266. #endif /* HAVE_GETADDRINFO */
  267. case AF_INET:
  268. return ntohs(sa.u.sin.sin_port);
  269. default:
  270. return 0;
  271. }
  272. }
  273. char* TcpSocket::getPeerEndpoint() {
  274. rfb::CharArray address; address.buf = getPeerAddress();
  275. int port = getPeerPort();
  276. int buflen = strlen(address.buf) + 32;
  277. char* buffer = new char[buflen];
  278. sprintf(buffer, "%s::%d", address.buf, port);
  279. return buffer;
  280. }
  281. bool TcpSocket::sameMachine() {
  282. vnc_sockaddr_t peeraddr, myaddr;
  283. socklen_t addrlen;
  284. addrlen = sizeof(peeraddr);
  285. if (getpeername(getFd(), &peeraddr.u.sa, &addrlen) < 0)
  286. throw SocketException ("unable to get peer address", errorNumber);
  287. addrlen = sizeof(myaddr); /* need to reset, since getpeername overwrote */
  288. if (getsockname(getFd(), &myaddr.u.sa, &addrlen) < 0)
  289. throw SocketException ("unable to get my address", errorNumber);
  290. if (peeraddr.u.sa.sa_family != myaddr.u.sa.sa_family)
  291. return false;
  292. #ifdef HAVE_GETADDRINFO
  293. if (peeraddr.u.sa.sa_family == AF_INET6)
  294. return IN6_ARE_ADDR_EQUAL(&peeraddr.u.sin6.sin6_addr,
  295. &myaddr.u.sin6.sin6_addr);
  296. #endif
  297. if (peeraddr.u.sa.sa_family == AF_INET)
  298. return (peeraddr.u.sin.sin_addr.s_addr == myaddr.u.sin.sin_addr.s_addr);
  299. // No idea what this is. Assume we're on different machines.
  300. return false;
  301. }
  302. void TcpSocket::shutdown()
  303. {
  304. Socket::shutdown();
  305. ::shutdown(getFd(), 2);
  306. }
  307. bool TcpSocket::enableNagles(int sock, bool enable) {
  308. int one = enable ? 0 : 1;
  309. if (setsockopt(sock, IPPROTO_TCP, TCP_NODELAY,
  310. (char *)&one, sizeof(one)) < 0) {
  311. int e = errorNumber;
  312. vlog.error("unable to setsockopt TCP_NODELAY: %d", e);
  313. return false;
  314. }
  315. return true;
  316. }
  317. bool TcpSocket::cork(int sock, bool enable) {
  318. #ifndef TCP_CORK
  319. return false;
  320. #else
  321. int one = enable ? 1 : 0;
  322. if (setsockopt(sock, IPPROTO_TCP, TCP_CORK, (char *)&one, sizeof(one)) < 0)
  323. return false;
  324. return true;
  325. #endif
  326. }
  327. bool TcpSocket::isSocket(int sock)
  328. {
  329. vnc_sockaddr_t sa;
  330. socklen_t sa_size = sizeof(sa);
  331. return getsockname(sock, &sa.u.sa, &sa_size) >= 0;
  332. }
  333. bool TcpSocket::isConnected(int sock)
  334. {
  335. vnc_sockaddr_t sa;
  336. socklen_t sa_size = sizeof(sa);
  337. return getpeername(sock, &sa.u.sa, &sa_size) >= 0;
  338. }
  339. int TcpSocket::getSockPort(int sock)
  340. {
  341. vnc_sockaddr_t sa;
  342. socklen_t sa_size = sizeof(sa);
  343. if (getsockname(sock, &sa.u.sa, &sa_size) < 0)
  344. return 0;
  345. switch (sa.u.sa.sa_family) {
  346. #ifdef HAVE_GETADDRINFO
  347. case AF_INET6:
  348. return ntohs(sa.u.sin6.sin6_port);
  349. #endif /* HAVE_GETADDRINFO */
  350. default:
  351. return ntohs(sa.u.sin.sin_port);
  352. }
  353. }
  354. static int bindIPv6 (const char *listenaddr,
  355. int port,
  356. bool localhostOnly)
  357. {
  358. #ifdef HAVE_GETADDRINFO
  359. struct sockaddr_in6 addr6;
  360. socklen_t sa_len;
  361. int fd;
  362. if (!UseIPv6)
  363. return -1;
  364. if ((fd = socket(AF_INET6, SOCK_STREAM, 0)) < 0)
  365. return -1;
  366. #ifdef IPV6_V6ONLY
  367. // - We made an IPv6-capable socket, and we need it to do IPv4 too
  368. int opt = 0;
  369. setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY, (char *)&opt, sizeof(opt));
  370. #else
  371. vlog.error("IPV6_V6ONLY support is missing. "
  372. "IPv4 clients may not be able to connect.");
  373. #endif
  374. memset(&addr6, 0, (sa_len = sizeof(addr6)));
  375. addr6.sin6_family = AF_INET6;
  376. addr6.sin6_port = htons(port);
  377. if (localhostOnly)
  378. addr6.sin6_addr = in6addr_loopback;
  379. else if (listenaddr != NULL) {
  380. #ifdef HAVE_INET_PTON
  381. if (inet_pton(AF_INET6, listenaddr, &addr6.sin6_addr) != 1) {
  382. closesocket(fd);
  383. return -1;
  384. }
  385. #else
  386. // Unable to parse without inet_pton
  387. closesocket(fd);
  388. return -1;
  389. #endif
  390. }
  391. if (bind(fd, (struct sockaddr *) &addr6, sa_len) == -1) {
  392. closesocket(fd);
  393. return -1;
  394. }
  395. return fd;
  396. #else
  397. return -1;
  398. #endif /* HAVE_GETADDRINFO */
  399. }
  400. static int bindIPv4 (const char *listenaddr,
  401. int port,
  402. bool localhostOnly)
  403. {
  404. struct sockaddr_in addr;
  405. socklen_t sa_len;
  406. int fd;
  407. if (!UseIPv4)
  408. return -1;
  409. if ((fd = socket(AF_INET, SOCK_STREAM, 0)) < 0)
  410. return -1;
  411. memset(&addr, 0, (sa_len = sizeof(addr)));
  412. addr.sin_family = AF_INET;
  413. addr.sin_port = htons(port);
  414. if (localhostOnly)
  415. addr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
  416. else if (listenaddr != NULL) {
  417. #ifdef HAVE_INET_ATON
  418. if (inet_aton(listenaddr, &addr.sin_addr) == 0)
  419. #else
  420. /* Some systems (e.g. Windows) do not have inet_aton, sigh */
  421. if ((addr.sin_addr.s_addr = inet_addr(listenaddr)) == INADDR_NONE)
  422. #endif
  423. {
  424. closesocket(fd);
  425. throw Exception("invalid network interface address: %s", listenaddr);
  426. }
  427. } else
  428. /* Bind to 0.0.0.0 by default. */
  429. addr.sin_addr.s_addr = htonl(INADDR_ANY);
  430. if (bind(fd, (struct sockaddr *) &addr, sa_len) == -1) {
  431. closesocket(fd);
  432. return -1;
  433. }
  434. return fd;
  435. }
  436. TcpListener::TcpListener(const char *listenaddr, int port, bool localhostOnly,
  437. int sock, bool close_) : closeFd(close_)
  438. {
  439. if (sock != -1) {
  440. fd = sock;
  441. return;
  442. }
  443. initSockets();
  444. if ((fd = bindIPv6 (listenaddr, port, localhostOnly)) < 0)
  445. if ((fd = bindIPv4 (listenaddr, port, localhostOnly)) < 0)
  446. throw SocketException("unable to create listening socket", errorNumber);
  447. #ifndef WIN32
  448. // - By default, close the socket on exec()
  449. fcntl(fd, F_SETFD, FD_CLOEXEC);
  450. int one = 1;
  451. if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR,
  452. (char *)&one, sizeof(one)) < 0) {
  453. int e = errorNumber;
  454. closesocket(fd);
  455. throw SocketException("unable to create listening socket", e);
  456. }
  457. #endif
  458. // - Set it to be a listening socket
  459. if (listen(fd, 5) < 0) {
  460. int e = errorNumber;
  461. closesocket(fd);
  462. throw SocketException("unable to set socket to listening mode", e);
  463. }
  464. }
  465. TcpListener::~TcpListener() {
  466. if (closeFd) closesocket(fd);
  467. }
  468. void TcpListener::shutdown()
  469. {
  470. #ifdef WIN32
  471. closesocket(getFd());
  472. #else
  473. ::shutdown(getFd(), 2);
  474. #endif
  475. }
  476. Socket*
  477. TcpListener::accept() {
  478. int new_sock = -1;
  479. // Accept an incoming connection
  480. if ((new_sock = ::accept(fd, 0, 0)) < 0)
  481. throw SocketException("unable to accept new connection", errorNumber);
  482. #ifndef WIN32
  483. // - By default, close the socket on exec()
  484. fcntl(new_sock, F_SETFD, FD_CLOEXEC);
  485. #endif
  486. // Disable Nagle's algorithm, to reduce latency
  487. TcpSocket::enableNagles(new_sock, false);
  488. // Create the socket object & check connection is allowed
  489. TcpSocket* s = new TcpSocket(new_sock);
  490. if (filter && !filter->verifyConnection(s)) {
  491. delete s;
  492. return 0;
  493. }
  494. return s;
  495. }
  496. void TcpListener::getMyAddresses(std::list<char*>* result) {
  497. #if defined(HAVE_GETADDRINFO) && defined(HAVE_INET_PTON)
  498. struct addrinfo *ai, *current, hints;
  499. memset(&hints, 0, sizeof(struct addrinfo));
  500. hints.ai_family = AF_UNSPEC;
  501. hints.ai_socktype = SOCK_STREAM;
  502. hints.ai_canonname = NULL;
  503. hints.ai_addr = NULL;
  504. hints.ai_next = NULL;
  505. if ((getaddrinfo(NULL, NULL, &hints, &ai)) != 0)
  506. return;
  507. for (current= ai; current != NULL; current = current->ai_next) {
  508. if (current->ai_family != AF_INET && current->ai_family != AF_INET6)
  509. continue;
  510. char *addr = new char[INET6_ADDRSTRLEN];
  511. inet_ntop(current->ai_family, current->ai_addr, addr, INET6_ADDRSTRLEN);
  512. result->push_back(addr);
  513. }
  514. freeaddrinfo(ai);
  515. #else
  516. const hostent* addrs = gethostbyname(0);
  517. if (addrs == 0)
  518. throw rdr::SystemException("gethostbyname", errorNumber);
  519. if (addrs->h_addrtype != AF_INET)
  520. throw rdr::Exception("getMyAddresses: bad family");
  521. for (int i=0; addrs->h_addr_list[i] != 0; i++) {
  522. const char* addrC = inet_ntoa(*((struct in_addr*)addrs->h_addr_list[i]));
  523. char* addr = new char[strlen(addrC)+1];
  524. strcpy(addr, addrC);
  525. result->push_back(addr);
  526. }
  527. #endif /* defined(HAVE_GETADDRINFO) && defined(HAVE_INET_PTON) */
  528. }
  529. int TcpListener::getMyPort() {
  530. return TcpSocket::getSockPort(getFd());
  531. }
  532. TcpFilter::TcpFilter(const char* spec) {
  533. rfb::CharArray tmp;
  534. tmp.buf = rfb::strDup(spec);
  535. while (tmp.buf) {
  536. rfb::CharArray first;
  537. rfb::strSplit(tmp.buf, ',', &first.buf, &tmp.buf);
  538. if (strlen(first.buf))
  539. filter.push_back(parsePattern(first.buf));
  540. }
  541. }
  542. TcpFilter::~TcpFilter() {
  543. }
  544. static bool
  545. patternMatchIP(const TcpFilter::Pattern& pattern, const char* value) {
  546. unsigned long address = inet_addr((char *)value);
  547. if (address == INADDR_NONE) return false;
  548. return ((pattern.address & pattern.mask) == (address & pattern.mask));
  549. }
  550. bool
  551. TcpFilter::verifyConnection(Socket* s) {
  552. rfb::CharArray name;
  553. #ifdef HAVE_GETADDRINFO
  554. vnc_sockaddr_t sa;
  555. socklen_t sa_size = sizeof(sa);
  556. if (getpeername(s->getFd(), &sa.u.sa, &sa_size) != 0 ||
  557. sa.u.sa.sa_family != AF_INET)
  558. /* Matching only works for IPv4 */
  559. return false;
  560. #endif /* HAVE_GETADDRINFO */
  561. name.buf = s->getPeerAddress();
  562. std::list<TcpFilter::Pattern>::iterator i;
  563. for (i=filter.begin(); i!=filter.end(); i++) {
  564. if (patternMatchIP(*i, name.buf)) {
  565. switch ((*i).action) {
  566. case Accept:
  567. vlog.debug("ACCEPT %s", name.buf);
  568. return true;
  569. case Query:
  570. vlog.debug("QUERY %s", name.buf);
  571. s->setRequiresQuery();
  572. return true;
  573. case Reject:
  574. vlog.debug("REJECT %s", name.buf);
  575. return false;
  576. }
  577. }
  578. }
  579. vlog.debug("[REJECT] %s", name.buf);
  580. return false;
  581. }
  582. TcpFilter::Pattern TcpFilter::parsePattern(const char* p) {
  583. TcpFilter::Pattern pattern;
  584. bool expandMask = false;
  585. rfb::CharArray addr, mask;
  586. if (rfb::strSplit(&p[1], '/', &addr.buf, &mask.buf)) {
  587. if (rfb::strContains(mask.buf, '.')) {
  588. pattern.mask = inet_addr(mask.buf);
  589. } else {
  590. pattern.mask = atoi(mask.buf);
  591. expandMask = true;
  592. }
  593. } else {
  594. pattern.mask = 32;
  595. expandMask = true;
  596. }
  597. if (expandMask) {
  598. unsigned long expanded = 0;
  599. // *** check endianness!
  600. for (int i=0; i<(int)pattern.mask; i++)
  601. expanded |= 1<<(31-i);
  602. pattern.mask = htonl(expanded);
  603. }
  604. pattern.address = inet_addr(addr.buf) & pattern.mask;
  605. if ((pattern.address == INADDR_NONE) ||
  606. (pattern.address == 0)) pattern.mask = 0;
  607. switch(p[0]) {
  608. case '+': pattern.action = TcpFilter::Accept; break;
  609. case '-': pattern.action = TcpFilter::Reject; break;
  610. case '?': pattern.action = TcpFilter::Query; break;
  611. };
  612. return pattern;
  613. }
  614. char* TcpFilter::patternToStr(const TcpFilter::Pattern& p) {
  615. in_addr tmp;
  616. rfb::CharArray addr, mask;
  617. tmp.s_addr = p.address;
  618. addr.buf = rfb::strDup(inet_ntoa(tmp));
  619. tmp.s_addr = p.mask;
  620. mask.buf = rfb::strDup(inet_ntoa(tmp));
  621. char* result = new char[strlen(addr.buf)+1+strlen(mask.buf)+1+1];
  622. switch (p.action) {
  623. case Accept: result[0] = '+'; break;
  624. case Reject: result[0] = '-'; break;
  625. case Query: result[0] = '?'; break;
  626. };
  627. result[1] = 0;
  628. strcat(result, addr.buf);
  629. strcat(result, "/");
  630. strcat(result, mask.buf);
  631. return result;
  632. }