blob: e19f52b1fd4158351988f33b2efa77e02c106d1c [file] [log] [blame]
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +00001/* Copyright (C) 2002-2005 RealVNC Ltd. All Rights Reserved.
2 *
3 * This is free software; you can redistribute it and/or modify
4 * it under the terms of the GNU General Public License as published by
5 * the Free Software Foundation; either version 2 of the License, or
6 * (at your option) any later version.
7 *
8 * This software is distributed in the hope that it will be useful,
9 * but WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 * GNU General Public License for more details.
12 *
13 * You should have received a copy of the GNU General Public License
14 * along with this software; if not, write to the Free Software
15 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307,
16 * USA.
17 */
18
Adam Tkac8aee1a82009-09-04 12:08:56 +000019#ifdef HAVE_CONFIG_H
20#include <config.h>
Adam Tkacad1cbd92008-10-06 14:08:00 +000021#endif
22
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +000023#ifdef WIN32
24//#include <io.h>
25#include <winsock2.h>
Pierre Ossman0153e232011-03-08 13:05:27 +000026#include <ws2tcpip.h>
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +000027#define errorNumber WSAGetLastError()
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +000028#else
29#define errorNumber errno
30#define closesocket close
31#include <sys/types.h>
32#include <sys/socket.h>
33#include <arpa/inet.h>
34#include <netinet/in.h>
35#include <netinet/tcp.h>
36#include <netdb.h>
37#include <unistd.h>
38#include <errno.h>
39#include <string.h>
40#include <signal.h>
41#include <fcntl.h>
42#endif
43
Adam Tkac04b7fd22008-03-19 16:14:48 +000044#include <stdlib.h>
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +000045#include <network/TcpSocket.h>
46#include <rfb/util.h>
47#include <rfb/LogWriter.h>
Pierre Ossman39b3b8f2015-01-29 17:35:45 +010048#include <rfb/Configuration.h>
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +000049
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +000050#ifndef INADDR_NONE
51#define INADDR_NONE ((unsigned long)-1)
52#endif
53#ifndef INADDR_LOOPBACK
54#define INADDR_LOOPBACK ((unsigned long)0x7F000001)
55#endif
56
Pierre Ossman8b6aa202012-12-13 13:55:22 +000057#if defined(HAVE_GETADDRINFO) && !defined(IN6_ARE_ADDR_EQUAL)
58#define IN6_ARE_ADDR_EQUAL(a,b) \
59 (memcmp ((const void*)(a), (const void*)(b), sizeof (struct in6_addr)) == 0)
60#endif
61
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +000062using namespace network;
63using namespace rdr;
64
Adam Tkac9cb6a422008-11-14 15:56:15 +000065typedef struct vnc_sockaddr {
66 union {
67 sockaddr sa;
68 sockaddr_in sin;
69#ifdef HAVE_GETADDRINFO
70 sockaddr_in6 sin6;
71#endif
72 } u;
73} vnc_sockaddr_t;
74
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +000075static rfb::LogWriter vlog("TcpSocket");
76
Pierre Ossman39b3b8f2015-01-29 17:35:45 +010077static rfb::BoolParameter UseIPv4("UseIPv4", "Use IPv4 for incoming and outgoing connections.", true);
78#ifdef HAVE_GETADDRINFO
79static rfb::BoolParameter UseIPv6("UseIPv6", "Use IPv6 for incoming and outgoing connections.", true);
80#endif
81
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +000082/* Tunnelling support. */
83int network::findFreeTcpPort (void)
84{
DRCb2618e52011-02-21 13:43:44 +000085 int sock;
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +000086 struct sockaddr_in addr;
87 memset(&addr, 0, sizeof(addr));
88 addr.sin_family = AF_INET;
89 addr.sin_addr.s_addr = INADDR_ANY;
90
91 if ((sock = socket (AF_INET, SOCK_STREAM, 0)) < 0)
92 throw SocketException ("unable to create socket", errorNumber);
93
DRCb2618e52011-02-21 13:43:44 +000094 addr.sin_port = 0;
95 if (bind (sock, (struct sockaddr *)&addr, sizeof (addr)) < 0)
96 throw SocketException ("unable to find free port", errorNumber);
97
98 socklen_t n = sizeof(addr);
99 if (getsockname (sock, (struct sockaddr *)&addr, &n) < 0)
100 throw SocketException ("unable to get port number", errorNumber);
101
102 closesocket (sock);
103 return ntohs(addr.sin_port);
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000104}
105
106
107// -=- Socket initialisation
108static bool socketsInitialised = false;
109static void initSockets() {
110 if (socketsInitialised)
111 return;
112#ifdef WIN32
113 WORD requiredVersion = MAKEWORD(2,0);
114 WSADATA initResult;
115
116 if (WSAStartup(requiredVersion, &initResult) != 0)
117 throw SocketException("unable to initialise Winsock2", errorNumber);
118#else
119 signal(SIGPIPE, SIG_IGN);
120#endif
121 socketsInitialised = true;
122}
123
124
125// -=- TcpSocket
126
127TcpSocket::TcpSocket(int sock, bool close)
128 : Socket(new FdInStream(sock), new FdOutStream(sock), true), closeFd(close)
129{
130}
131
132TcpSocket::TcpSocket(const char *host, int port)
133 : closeFd(true)
134{
Adam Tkac9cb6a422008-11-14 15:56:15 +0000135 int sock, err, result, family;
136 vnc_sockaddr_t sa;
Adam Tkacbe4c3ac2008-12-10 16:42:33 +0000137 socklen_t salen;
Adam Tkac9cb6a422008-11-14 15:56:15 +0000138#ifdef HAVE_GETADDRINFO
139 struct addrinfo *ai, *current, hints;
140#endif
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000141
142 // - Create a socket
143 initSockets();
Adam Tkac9cb6a422008-11-14 15:56:15 +0000144
145#ifdef HAVE_GETADDRINFO
146 memset(&hints, 0, sizeof(struct addrinfo));
147 hints.ai_family = AF_UNSPEC;
148 hints.ai_socktype = SOCK_STREAM;
149 hints.ai_canonname = NULL;
150 hints.ai_addr = NULL;
151 hints.ai_next = NULL;
152
153 if ((result = getaddrinfo(host, NULL, &hints, &ai)) != 0) {
154 throw Exception("unable to resolve host by name: %s",
155 gai_strerror(result));
156 }
157
Pierre Ossmanf1a35012015-03-03 16:02:42 +0100158 // This logic is too complex for the compiler to determine if
159 // sock is properly assigned or not.
160 sock = -1;
161
Adam Tkac9cb6a422008-11-14 15:56:15 +0000162 for (current = ai; current != NULL; current = current->ai_next) {
163 family = current->ai_family;
Pierre Ossman39b3b8f2015-01-29 17:35:45 +0100164
165 switch (family) {
166 case AF_INET:
167 if (!UseIPv4)
168 continue;
169 break;
170 case AF_INET6:
171 if (!UseIPv6)
172 continue;
173 break;
174 default:
Adam Tkac9cb6a422008-11-14 15:56:15 +0000175 continue;
Pierre Ossman39b3b8f2015-01-29 17:35:45 +0100176 }
Adam Tkac9cb6a422008-11-14 15:56:15 +0000177
178 salen = current->ai_addrlen;
179 memcpy(&sa, current->ai_addr, salen);
180
181 if (family == AF_INET)
182 sa.u.sin.sin_port = htons(port);
183 else
184 sa.u.sin6.sin6_port = htons(port);
185
186#else /* HAVE_GETADDRINFO */
Pierre Ossman39b3b8f2015-01-29 17:35:45 +0100187 if (!UseIPv4)
188 throw Exception("Only IPv4 available but it is disabled");
189
Adam Tkac9cb6a422008-11-14 15:56:15 +0000190 family = AF_INET;
191 salen = sizeof(struct sockaddr_in);
192
193 /* Try processing the host as an IP address */
194 memset(&sa, 0, sizeof(sa));
195 sa.u.sin.sin_family = AF_INET;
196 sa.u.sin.sin_addr.s_addr = inet_addr((char *)host);
197 sa.u.sin.sin_port = htons(port);
198 if ((int)sa.u.sin.sin_addr.s_addr == -1) {
199 /* Host was not an IP address - try resolving as DNS name */
200 struct hostent *hostinfo;
201 hostinfo = gethostbyname((char *)host);
202 if (hostinfo && hostinfo->h_addr) {
203 sa.u.sin.sin_addr.s_addr = ((struct in_addr *)hostinfo->h_addr)->s_addr;
204 } else {
205 err = errorNumber;
206 throw SocketException("unable to resolve host by name", err);
207 }
208 }
209#endif /* HAVE_GETADDRINFO */
210
211 sock = socket (family, SOCK_STREAM, 0);
212 if (sock == -1) {
213 err = errorNumber;
214#ifdef HAVE_GETADDRINFO
215 freeaddrinfo(ai);
216#endif /* HAVE_GETADDRINFO */
217 throw SocketException("unable to create socket", err);
218 }
219
220 /* Attempt to connect to the remote host */
Adam Tkacc9cda3b2009-10-30 11:13:34 +0000221 while ((result = connect(sock, &sa.u.sa, salen)) == -1) {
Adam Tkac9cb6a422008-11-14 15:56:15 +0000222 err = errorNumber;
223#ifndef WIN32
224 if (err == EINTR)
225 continue;
226#endif
227 closesocket(sock);
228 break;
229 }
230
231#ifdef HAVE_GETADDRINFO
232 if (result == 0)
233 break;
Adam Tkac9cb6a422008-11-14 15:56:15 +0000234 }
235
236 freeaddrinfo(ai);
Pierre Ossmanda9a38d2015-03-03 16:03:32 +0100237
238 if (current == NULL)
239 throw Exception("No useful address for host");
Adam Tkac9cb6a422008-11-14 15:56:15 +0000240#endif /* HAVE_GETADDRINFO */
241
242 if (result == -1)
243 throw SocketException("unable connect to socket", err);
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000244
245#ifndef WIN32
246 // - By default, close the socket on exec()
247 fcntl(sock, F_SETFD, FD_CLOEXEC);
248#endif
249
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000250 // Disable Nagle's algorithm, to reduce latency
251 enableNagles(sock, false);
252
253 // Create the input and output streams
254 instream = new FdInStream(sock);
255 outstream = new FdOutStream(sock);
256 ownStreams = true;
257}
258
259TcpSocket::~TcpSocket() {
260 if (closeFd)
261 closesocket(getFd());
262}
263
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000264int TcpSocket::getMyPort() {
265 return getSockPort(getFd());
266}
267
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000268char* TcpSocket::getPeerAddress() {
Tim Waugh6ae42df2014-11-17 17:07:07 +0000269 vnc_sockaddr_t sa;
270 socklen_t sa_size = sizeof(sa);
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000271
Tim Waugh6ae42df2014-11-17 17:07:07 +0000272 if (getpeername(getFd(), &sa.u.sa, &sa_size) != 0) {
273 vlog.error("unable to get peer name for socket");
274 return rfb::strDup("");
275 }
276
Pierre Ossman14263e12014-11-19 11:14:49 +0100277#if defined(HAVE_GETADDRINFO) && defined(HAVE_INET_PTON)
278 if (sa.u.sa.sa_family == AF_INET6) {
Pierre Ossman07cd2292014-11-19 11:16:04 +0100279 char buffer[INET6_ADDRSTRLEN + 2];
Pierre Ossman14263e12014-11-19 11:14:49 +0100280 const char *name;
Tim Waugh6ae42df2014-11-17 17:07:07 +0000281
Pierre Ossman07cd2292014-11-19 11:16:04 +0100282 buffer[0] = '[';
283
Pierre Ossman14263e12014-11-19 11:14:49 +0100284 name = inet_ntop(sa.u.sa.sa_family, &sa.u.sin6.sin6_addr,
Pierre Ossman07cd2292014-11-19 11:16:04 +0100285 buffer + 1, sizeof(buffer) - 2);
Pierre Ossman14263e12014-11-19 11:14:49 +0100286 if (name == NULL) {
287 vlog.error("unable to convert peer name to a string");
288 return rfb::strDup("");
289 }
Tim Waugh6ae42df2014-11-17 17:07:07 +0000290
Pierre Ossman07cd2292014-11-19 11:16:04 +0100291 strcat(buffer, "]");
292
293 return rfb::strDup(buffer);
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000294 }
Pierre Ossman14263e12014-11-19 11:14:49 +0100295#endif
296
297 if (sa.u.sa.sa_family == AF_INET) {
298 char *name;
299
300 name = inet_ntoa(sa.u.sin.sin_addr);
301 if (name == NULL) {
302 vlog.error("unable to convert peer name to a string");
303 return rfb::strDup("");
304 }
305
306 return rfb::strDup(name);
307 }
308
309 vlog.error("unknown address family for socket");
310 return rfb::strDup("");
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000311}
312
313int TcpSocket::getPeerPort() {
Tim Waugh6ae42df2014-11-17 17:07:07 +0000314 vnc_sockaddr_t sa;
315 socklen_t sa_size = sizeof(sa);
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000316
Tim Waugh6ae42df2014-11-17 17:07:07 +0000317 getpeername(getFd(), &sa.u.sa, &sa_size);
318
319 switch (sa.u.sa.sa_family) {
320#ifdef HAVE_GETADDRINFO
321 case AF_INET6:
322 return ntohs(sa.u.sin6.sin6_port);
323#endif /* HAVE_GETADDRINFO */
Pierre Ossman14263e12014-11-19 11:14:49 +0100324 case AF_INET:
Tim Waugh6ae42df2014-11-17 17:07:07 +0000325 return ntohs(sa.u.sin.sin_port);
Pierre Ossman14263e12014-11-19 11:14:49 +0100326 default:
327 return 0;
Tim Waugh6ae42df2014-11-17 17:07:07 +0000328 }
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000329}
330
331char* TcpSocket::getPeerEndpoint() {
332 rfb::CharArray address; address.buf = getPeerAddress();
333 int port = getPeerPort();
334
335 int buflen = strlen(address.buf) + 32;
336 char* buffer = new char[buflen];
337 sprintf(buffer, "%s::%d", address.buf, port);
338 return buffer;
339}
340
341bool TcpSocket::sameMachine() {
Adam Tkac897814f2009-11-12 10:32:43 +0000342 vnc_sockaddr_t peeraddr, myaddr;
343 socklen_t addrlen;
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000344
Adam Tkac897814f2009-11-12 10:32:43 +0000345 addrlen = sizeof(peeraddr);
346 if (getpeername(getFd(), &peeraddr.u.sa, &addrlen) < 0)
347 throw SocketException ("unable to get peer address", errorNumber);
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000348
Adam Tkac897814f2009-11-12 10:32:43 +0000349 addrlen = sizeof(myaddr); /* need to reset, since getpeername overwrote */
350 if (getsockname(getFd(), &myaddr.u.sa, &addrlen) < 0)
351 throw SocketException ("unable to get my address", errorNumber);
352
353 if (peeraddr.u.sa.sa_family != myaddr.u.sa.sa_family)
354 return false;
355
356#ifdef HAVE_GETADDRINFO
357 if (peeraddr.u.sa.sa_family == AF_INET6)
358 return IN6_ARE_ADDR_EQUAL(&peeraddr.u.sin6.sin6_addr,
359 &myaddr.u.sin6.sin6_addr);
360#endif
361
Pierre Ossman14263e12014-11-19 11:14:49 +0100362 if (peeraddr.u.sa.sa_family == AF_INET)
363 return (peeraddr.u.sin.sin_addr.s_addr == myaddr.u.sin.sin_addr.s_addr);
364
365 // No idea what this is. Assume we're on different machines.
366 return false;
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000367}
368
369void TcpSocket::shutdown()
370{
371 Socket::shutdown();
372 ::shutdown(getFd(), 2);
373}
374
375bool TcpSocket::enableNagles(int sock, bool enable) {
376 int one = enable ? 0 : 1;
377 if (setsockopt(sock, IPPROTO_TCP, TCP_NODELAY,
378 (char *)&one, sizeof(one)) < 0) {
379 int e = errorNumber;
380 vlog.error("unable to setsockopt TCP_NODELAY: %d", e);
381 return false;
382 }
383 return true;
384}
385
Pierre Ossman64069a92011-11-08 12:10:55 +0000386bool TcpSocket::cork(int sock, bool enable) {
387#ifndef TCP_CORK
388 return false;
389#else
390 int one = enable ? 1 : 0;
391 if (setsockopt(sock, IPPROTO_TCP, TCP_CORK, (char *)&one, sizeof(one)) < 0)
392 return false;
393 return true;
394#endif
395}
396
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000397bool TcpSocket::isSocket(int sock)
398{
Tim Waugh6ae42df2014-11-17 17:07:07 +0000399 vnc_sockaddr_t sa;
400 socklen_t sa_size = sizeof(sa);
401 return getsockname(sock, &sa.u.sa, &sa_size) >= 0;
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000402}
403
404bool TcpSocket::isConnected(int sock)
405{
Tim Waugh6ae42df2014-11-17 17:07:07 +0000406 vnc_sockaddr_t sa;
407 socklen_t sa_size = sizeof(sa);
408 return getpeername(sock, &sa.u.sa, &sa_size) >= 0;
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000409}
410
411int TcpSocket::getSockPort(int sock)
412{
Tim Waugh6ae42df2014-11-17 17:07:07 +0000413 vnc_sockaddr_t sa;
414 socklen_t sa_size = sizeof(sa);
415 if (getsockname(sock, &sa.u.sa, &sa_size) < 0)
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000416 return 0;
Tim Waugh6ae42df2014-11-17 17:07:07 +0000417
418 switch (sa.u.sa.sa_family) {
419#ifdef HAVE_GETADDRINFO
420 case AF_INET6:
421 return ntohs(sa.u.sin6.sin6_port);
422#endif /* HAVE_GETADDRINFO */
423
424 default:
425 return ntohs(sa.u.sin.sin_port);
426 }
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000427}
428
Tim Waughe4d97262014-11-21 16:07:34 +0000429static int bindIPv6 (const char *listenaddr,
430 int port,
431 bool localhostOnly)
432{
433#ifdef HAVE_GETADDRINFO
434 struct sockaddr_in6 addr6;
435 socklen_t sa_len;
436 int fd;
437
Pierre Ossman39b3b8f2015-01-29 17:35:45 +0100438 if (!UseIPv6)
439 return -1;
440
Tim Waughe4d97262014-11-21 16:07:34 +0000441 if ((fd = socket(AF_INET6, SOCK_STREAM, 0)) < 0)
442 return -1;
443
444#ifdef IPV6_V6ONLY
445 // - We made an IPv6-capable socket, and we need it to do IPv4 too
446 int opt = 0;
447 setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY, (char *)&opt, sizeof(opt));
448#else
449 vlog.error("IPV6_V6ONLY support is missing. "
450 "IPv4 clients may not be able to connect.");
451#endif
452
453 memset(&addr6, 0, (sa_len = sizeof(addr6)));
454 addr6.sin6_family = AF_INET6;
455 addr6.sin6_port = htons(port);
456
457 if (localhostOnly)
458 addr6.sin6_addr = in6addr_loopback;
459 else if (listenaddr != NULL) {
460#ifdef HAVE_INET_PTON
461 if (inet_pton(AF_INET6, listenaddr, &addr6.sin6_addr) != 1) {
462 closesocket(fd);
463 return -1;
464 }
465#else
466 // Unable to parse without inet_pton
467 closesocket(fd);
468 return -1;
469#endif
470 }
471
472 if (bind(fd, (struct sockaddr *) &addr6, sa_len) == -1) {
473 closesocket(fd);
474 return -1;
475 }
476
477 return fd;
478#else
479 return -1;
480#endif /* HAVE_GETADDRINFO */
481}
482
483static int bindIPv4 (const char *listenaddr,
484 int port,
485 bool localhostOnly)
486{
487 struct sockaddr_in addr;
488 socklen_t sa_len;
489 int fd;
490
Pierre Ossman39b3b8f2015-01-29 17:35:45 +0100491 if (!UseIPv4)
492 return -1;
493
Tim Waughe4d97262014-11-21 16:07:34 +0000494 if ((fd = socket(AF_INET, SOCK_STREAM, 0)) < 0)
495 return -1;
496
497 memset(&addr, 0, (sa_len = sizeof(addr)));
498 addr.sin_family = AF_INET;
499 addr.sin_port = htons(port);
500
501 if (localhostOnly)
502 addr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
503 else if (listenaddr != NULL) {
504#ifdef HAVE_INET_ATON
505 if (inet_aton(listenaddr, &addr.sin_addr) == 0)
506#else
507 /* Some systems (e.g. Windows) do not have inet_aton, sigh */
508 if ((addr.sin_addr.s_addr = inet_addr(listenaddr)) == INADDR_NONE)
509#endif
510 {
511 closesocket(fd);
512 throw Exception("invalid network interface address: %s", listenaddr);
513 }
514 } else
515 /* Bind to 0.0.0.0 by default. */
516 addr.sin_addr.s_addr = htonl(INADDR_ANY);
517
518 if (bind(fd, (struct sockaddr *) &addr, sa_len) == -1) {
519 closesocket(fd);
520 return -1;
521 }
522
523 return fd;
524}
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000525
Adam Tkac93ff5db2010-02-05 15:54:10 +0000526TcpListener::TcpListener(const char *listenaddr, int port, bool localhostOnly,
527 int sock, bool close_) : closeFd(close_)
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000528{
529 if (sock != -1) {
530 fd = sock;
531 return;
532 }
533
534 initSockets();
Tim Waughe4d97262014-11-21 16:07:34 +0000535 if ((fd = bindIPv6 (listenaddr, port, localhostOnly)) < 0)
536 if ((fd = bindIPv4 (listenaddr, port, localhostOnly)) < 0)
Tim Waugh4561f7e2014-11-12 10:24:02 +0000537 throw SocketException("unable to create listening socket", errorNumber);
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000538
539#ifndef WIN32
540 // - By default, close the socket on exec()
541 fcntl(fd, F_SETFD, FD_CLOEXEC);
542
543 int one = 1;
544 if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR,
545 (char *)&one, sizeof(one)) < 0) {
546 int e = errorNumber;
547 closesocket(fd);
548 throw SocketException("unable to create listening socket", e);
549 }
550#endif
551
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000552 // - Set it to be a listening socket
553 if (listen(fd, 5) < 0) {
554 int e = errorNumber;
555 closesocket(fd);
556 throw SocketException("unable to set socket to listening mode", e);
557 }
558}
559
560TcpListener::~TcpListener() {
561 if (closeFd) closesocket(fd);
562}
563
564void TcpListener::shutdown()
565{
566#ifdef WIN32
567 closesocket(getFd());
568#else
569 ::shutdown(getFd(), 2);
570#endif
571}
572
573
574Socket*
575TcpListener::accept() {
576 int new_sock = -1;
577
578 // Accept an incoming connection
579 if ((new_sock = ::accept(fd, 0, 0)) < 0)
580 throw SocketException("unable to accept new connection", errorNumber);
581
582#ifndef WIN32
583 // - By default, close the socket on exec()
584 fcntl(new_sock, F_SETFD, FD_CLOEXEC);
585#endif
586
587 // Disable Nagle's algorithm, to reduce latency
588 TcpSocket::enableNagles(new_sock, false);
589
590 // Create the socket object & check connection is allowed
591 TcpSocket* s = new TcpSocket(new_sock);
592 if (filter && !filter->verifyConnection(s)) {
593 delete s;
594 return 0;
595 }
596 return s;
597}
598
599void TcpListener::getMyAddresses(std::list<char*>* result) {
Tim Waugh6ae42df2014-11-17 17:07:07 +0000600#if defined(HAVE_GETADDRINFO) && defined(HAVE_INET_PTON)
Tim Waugh6ae42df2014-11-17 17:07:07 +0000601 struct addrinfo *ai, *current, hints;
602
603 memset(&hints, 0, sizeof(struct addrinfo));
604 hints.ai_family = AF_UNSPEC;
605 hints.ai_socktype = SOCK_STREAM;
606 hints.ai_canonname = NULL;
607 hints.ai_addr = NULL;
608 hints.ai_next = NULL;
609
610 if ((getaddrinfo(NULL, NULL, &hints, &ai)) != 0)
611 return;
612
613 for (current= ai; current != NULL; current = current->ai_next) {
614 if (current->ai_family != AF_INET && current->ai_family != AF_INET6)
615 continue;
616
617 char *addr = new char[INET6_ADDRSTRLEN];
618 inet_ntop(current->ai_family, current->ai_addr, addr, INET6_ADDRSTRLEN);
619 result->push_back(addr);
620 }
621 freeaddrinfo(ai);
622#else
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000623 const hostent* addrs = gethostbyname(0);
624 if (addrs == 0)
625 throw rdr::SystemException("gethostbyname", errorNumber);
626 if (addrs->h_addrtype != AF_INET)
627 throw rdr::Exception("getMyAddresses: bad family");
628 for (int i=0; addrs->h_addr_list[i] != 0; i++) {
629 const char* addrC = inet_ntoa(*((struct in_addr*)addrs->h_addr_list[i]));
630 char* addr = new char[strlen(addrC)+1];
631 strcpy(addr, addrC);
632 result->push_back(addr);
633 }
Tim Waugh6ae42df2014-11-17 17:07:07 +0000634#endif /* defined(HAVE_GETADDRINFO) && defined(HAVE_INET_PTON) */
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000635}
636
637int TcpListener::getMyPort() {
638 return TcpSocket::getSockPort(getFd());
639}
640
641
642TcpFilter::TcpFilter(const char* spec) {
643 rfb::CharArray tmp;
Adam Tkacd36b6262009-09-04 10:57:20 +0000644 tmp.buf = rfb::strDup(spec);
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000645 while (tmp.buf) {
646 rfb::CharArray first;
647 rfb::strSplit(tmp.buf, ',', &first.buf, &tmp.buf);
648 if (strlen(first.buf))
649 filter.push_back(parsePattern(first.buf));
650 }
651}
652
653TcpFilter::~TcpFilter() {
654}
655
656
657static bool
658patternMatchIP(const TcpFilter::Pattern& pattern, const char* value) {
659 unsigned long address = inet_addr((char *)value);
660 if (address == INADDR_NONE) return false;
661 return ((pattern.address & pattern.mask) == (address & pattern.mask));
662}
663
664bool
665TcpFilter::verifyConnection(Socket* s) {
666 rfb::CharArray name;
667
Tim Waugh6ae42df2014-11-17 17:07:07 +0000668#ifdef HAVE_GETADDRINFO
669 vnc_sockaddr_t sa;
670 socklen_t sa_size = sizeof(sa);
671 if (getpeername(s->getFd(), &sa.u.sa, &sa_size) != 0 ||
672 sa.u.sa.sa_family != AF_INET)
673 /* Matching only works for IPv4 */
674 return false;
675#endif /* HAVE_GETADDRINFO */
676
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000677 name.buf = s->getPeerAddress();
678 std::list<TcpFilter::Pattern>::iterator i;
679 for (i=filter.begin(); i!=filter.end(); i++) {
680 if (patternMatchIP(*i, name.buf)) {
681 switch ((*i).action) {
682 case Accept:
683 vlog.debug("ACCEPT %s", name.buf);
684 return true;
685 case Query:
686 vlog.debug("QUERY %s", name.buf);
687 s->setRequiresQuery();
688 return true;
689 case Reject:
690 vlog.debug("REJECT %s", name.buf);
691 return false;
692 }
693 }
694 }
695
696 vlog.debug("[REJECT] %s", name.buf);
697 return false;
698}
699
700
701TcpFilter::Pattern TcpFilter::parsePattern(const char* p) {
702 TcpFilter::Pattern pattern;
703
704 bool expandMask = false;
705 rfb::CharArray addr, mask;
706
707 if (rfb::strSplit(&p[1], '/', &addr.buf, &mask.buf)) {
708 if (rfb::strContains(mask.buf, '.')) {
709 pattern.mask = inet_addr(mask.buf);
710 } else {
711 pattern.mask = atoi(mask.buf);
712 expandMask = true;
713 }
714 } else {
715 pattern.mask = 32;
716 expandMask = true;
717 }
718 if (expandMask) {
719 unsigned long expanded = 0;
720 // *** check endianness!
721 for (int i=0; i<(int)pattern.mask; i++)
722 expanded |= 1<<(31-i);
723 pattern.mask = htonl(expanded);
724 }
725
726 pattern.address = inet_addr(addr.buf) & pattern.mask;
727 if ((pattern.address == INADDR_NONE) ||
728 (pattern.address == 0)) pattern.mask = 0;
729
730 switch(p[0]) {
731 case '+': pattern.action = TcpFilter::Accept; break;
732 case '-': pattern.action = TcpFilter::Reject; break;
733 case '?': pattern.action = TcpFilter::Query; break;
734 };
735
736 return pattern;
737}
738
739char* TcpFilter::patternToStr(const TcpFilter::Pattern& p) {
740 in_addr tmp;
741 rfb::CharArray addr, mask;
742 tmp.s_addr = p.address;
Adam Tkacd36b6262009-09-04 10:57:20 +0000743 addr.buf = rfb::strDup(inet_ntoa(tmp));
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000744 tmp.s_addr = p.mask;
Adam Tkacd36b6262009-09-04 10:57:20 +0000745 mask.buf = rfb::strDup(inet_ntoa(tmp));
Constantin Kaplinskya2adc8d2006-05-25 05:01:55 +0000746 char* result = new char[strlen(addr.buf)+1+strlen(mask.buf)+1+1];
747 switch (p.action) {
748 case Accept: result[0] = '+'; break;
749 case Reject: result[0] = '-'; break;
750 case Query: result[0] = '?'; break;
751 };
752 result[1] = 0;
753 strcat(result, addr.buf);
754 strcat(result, "/");
755 strcat(result, mask.buf);
756 return result;
757}