xref: /dflybsd-src/lib/libdmsg/dmsg.h (revision 9e1c08804a46f1c1a9cd11e190ddba7d2bc4abed)
1 /*
2  * Copyright (c) 2011-2012 The DragonFly Project.  All rights reserved.
3  *
4  * This code is derived from software contributed to The DragonFly Project
5  * by Matthew Dillon <dillon@dragonflybsd.org>
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  *
11  * 1. Redistributions of source code must retain the above copyright
12  *    notice, this list of conditions and the following disclaimer.
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in
15  *    the documentation and/or other materials provided with the
16  *    distribution.
17  * 3. Neither the name of The DragonFly Project nor the names of its
18  *    contributors may be used to endorse or promote products derived
19  *    from this software without specific, prior written permission.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
22  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
23  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
24  * FOR A PARTICULAR PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE
25  * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
26  * INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES (INCLUDING,
27  * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
28  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
29  * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
30  * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
31  * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32  * SUCH DAMAGE.
33  */
34 
35 #include <sys/types.h>
36 #include <sys/queue.h>
37 #include <sys/tree.h>
38 #include <sys/dmsg.h>
39 
40 #include <pthread.h>
41 
42 #if 0
43 #include <openssl/rsa.h>	/* public/private key functions */
44 #include <openssl/pem.h>	/* public/private key file load */
45 #endif
46 #include <openssl/err.h>
47 #include <openssl/evp.h>	/* aes_256_cbc functions */
48 
49 #define DMSG_DEFAULT_DIR	"/etc/hammer2"
50 #define DMSG_PATH_REMOTE	DMSG_DEFAULT_DIR "/remote"
51 
52 #define DMSG_LISTEN_PORT	987
53 
54 /***************************************************************************
55  *				CRYPTO HANDSHAKE			   *
56  ***************************************************************************
57  *
58  * The initial public-key exchange is implementing by transmitting a
59  * 512-byte buffer to the other side in a symmetrical fashion.  This
60  * buffer contains the following:
61  *
62  * (1) A random session key.  512 bits is specified.  We use aes_256_cbc()
63  *     and initialize the key with the first 256 bits and the iv[] with
64  *     the second.  Note that the transmitted and received session
65  *     keys are XOR'd together to create the session key used for
66  *     communications (so even if the verifier is compromised the session
67  *     will still be gobbly gook if the public key has not been completely
68  *     broken).
69  *
70  * (2) A verifier to determine that the decode was successful.  It encodes
71  *     an XOR of each group of 4 bytes from the session key.
72  *
73  * (3) Additional configuration and additional random data.
74  *
75  *     - The hammer2 message header magic for endian detect
76  *
77  *     - The hammer2 protocol version.  The two sides agree on the
78  *	 smaller of the two.
79  *
80  *     - All unused fields (junk*) are filled with random data.
81  *
82  * This structure must be exactly 512 bytes and expects to use 256-byte
83  * RSA keys.
84  */
85 struct dmsg_handshake {
86 	char pad1[8];		/* 000 */
87 	uint16_t magic;		/* 008 DMSG_HDR_MAGIC for endian detect */
88 	uint16_t version;	/* 00A hammer2 protocol version */
89 	uint32_t flags;		/* 00C protocol extension flags */
90 	uint8_t sess[64];	/* 010 512-bit session key */
91 	uint8_t verf[16];	/* 050 verifier = ~sess */
92 	char quickmsg[32];	/* 060 reason for connecting */
93 	char junk080[128];	/* 080-0FF */
94 	char pad2[8];		/* 100-107 */
95 	char junk100[256-8];	/* 108-1FF */
96 };
97 
98 typedef struct dmsg_handshake dmsg_handshake_t;
99 
100 
101 #define DMSG_CRYPTO_CHUNK_SIZE		DMSG_ALIGN
102 #define DMSG_MAX_IV_SIZE		32
103 
104 #define DMSG_CRYPTO_GCM_IV_FIXED_SIZE	4
105 #define DMSG_CRYPTO_GCM_IV_SIZE		12
106 #define DMSG_CRYPTO_GCM_KEY_SIZE	32
107 #define DMSG_CRYPTO_GCM_TAG_SIZE	16
108 
109 #define DMSG_CRYPTO_ALGO_GCM_IDX	0
110 
111 #define DMSG_CRYPTO_ALGO		DMSG_CRYPTO_ALGO_GCM_IDX
112 
113 /***************************************************************************
114  *				LOW LEVEL MESSAGING			   *
115  ***************************************************************************
116  *
117  * dmsg_msg - A standalone copy of a message, typically referenced by
118  *		 or embedded in other structures, or used with I/O queues.
119  *
120  * These structures are strictly temporary, so they do not have to be
121  * particularly optimized for size.  All possible message headers are
122  * directly embedded (any), and the message may contain a reference
123  * to allocated auxillary data.  The structure is recycled quite often
124  * by a connection.
125  */
126 struct dmsg_iocom;
127 struct dmsg_state;
128 struct dmsg_msg;
129 
130 TAILQ_HEAD(dmsg_state_queue, dmsg_state);
131 TAILQ_HEAD(dmsg_msg_queue, dmsg_msg);
132 RB_HEAD(dmsg_state_tree, dmsg_state);
133 
134 struct h2span_link;
135 struct h2span_relay;
136 struct h2span_conn;
137 
138 /*
139  * This represents a media, managed by LNK_CONN connection state
140  */
141 TAILQ_HEAD(dmsg_media_queue, dmsg_media);
142 
143 struct dmsg_media {
144 	TAILQ_ENTRY(dmsg_media) entry;
145 	uuid_t  mediaid;
146 	int     refs;
147 	void	*usrhandle;
148 };
149 
150 typedef struct dmsg_media dmsg_media_t;
151 
152 /*
153  * The state structure is ref-counted.  The iocom cannot go away while
154  * state structures are active.  However, the related h2span_* linkages
155  * can be destroyed and NULL'd out if the state is terminated in both
156  * directions.
157  */
158 struct dmsg_state {
159 	RB_ENTRY(dmsg_state) rbnode;		/* indexed by msgid */
160 	TAILQ_HEAD(, dmsg_state) subq;		/* active stacked states */
161 	TAILQ_ENTRY(dmsg_state) entry;		/* on parent subq */
162 	struct dmsg_iocom *iocom;
163 	struct dmsg_state *parent;		/* transaction stacking */
164 	uint32_t	icmd;			/* command creating state */
165 	uint32_t	txcmd;			/* mostly for CMDF flags */
166 	uint32_t	rxcmd;			/* mostly for CMDF flags */
167 	uint64_t	msgid;
168 	int		flags;
169 	int		error;
170 	int		refs;			/* prevent destruction */
171 	void (*func)(struct dmsg_msg *);
172 	union {
173 		void *any;
174 		struct h2span_link *link;
175 		struct h2span_conn *conn;
176 		struct h2span_relay *relay;
177 	} any;
178 	dmsg_media_t	*media;
179 };
180 
181 #define DMSG_STATE_INSERTED	0x0001
182 #define DMSG_STATE_DYNAMIC	0x0002
183 #define DMSG_STATE_NODEID	0x0004		/* manages a node id */
184 #define DMSG_STATE_ROUTED	0x0008		/* message is routed */
185 #define DMSG_STATE_OPPOSITE	0x0010		/* initiated by other end */
186 
187 /*
188  * This is the core in-memory representation of a message structure.
189  * state is the local representation of the transactional state and
190  * will point to &iocom->state0 for non-transactional messages.
191  *
192  * Message headers are embedded while auxillary data is separately allocated.
193  */
194 struct dmsg_msg {
195 	TAILQ_ENTRY(dmsg_msg) qentry;
196 	struct dmsg_state *state;		/* message state */
197 	size_t		hdr_size;
198 	size_t		aux_size;
199 	char		*aux_data;
200 	uint32_t	tcmd;			/* easy-switch cmd */
201 	dmsg_any_t 	any;			/* must be last element */
202 };
203 
204 typedef struct dmsg_state dmsg_state_t;
205 typedef struct dmsg_msg dmsg_msg_t;
206 typedef struct dmsg_msg_queue dmsg_msg_queue_t;
207 
208 int dmsg_state_cmp(dmsg_state_t *state1, dmsg_state_t *state2);
209 RB_PROTOTYPE(dmsg_state_tree, dmsg_state, rbnode, dmsg_state_cmp);
210 
211 /*
212  * dmsg_ioq - An embedded component of dmsg_conn, holds state
213  * for the buffering and parsing of incoming and outgoing messages.
214  *
215  * cdx - beg  - processed buffer data, encrypted or decrypted
216  * end - cdn  - unprocessed buffer data not yet encrypted or decrypted
217  */
218 struct dmsg_ioq {
219 	enum { DMSG_MSGQ_STATE_HEADER1,
220 	       DMSG_MSGQ_STATE_HEADER2,
221 	       DMSG_MSGQ_STATE_AUXDATA1,
222 	       DMSG_MSGQ_STATE_AUXDATA2,
223 	       DMSG_MSGQ_STATE_ERROR } state;
224 	size_t		fifo_beg;		/* buffered data */
225 	size_t		fifo_cdx;		/* cdx-beg processed */
226 	size_t		fifo_cdn;		/* end-cdn unprocessed */
227 	size_t		fifo_end;
228 	size_t		hbytes;			/* header size */
229 	size_t		abytes;			/* aligned aux_data size */
230 	size_t		unaligned_aux_size;	/* actual aux_data size */
231 	int		error;
232 	int		seq;			/* salt sequencer */
233 	int		msgcount;
234 	EVP_CIPHER_CTX	ctx;
235 	char		iv[DMSG_MAX_IV_SIZE]; /* encrypt or decrypt iv[] */
236 	dmsg_msg_t	*msg;
237 	dmsg_msg_queue_t msgq;
238 	char		buf[DMSG_BUF_SIZE];	/* staging buffer */
239 };
240 
241 typedef struct dmsg_ioq dmsg_ioq_t;
242 
243 #define DMSG_IOQ_ERROR_SYNC		1	/* bad magic / out of sync */
244 #define DMSG_IOQ_ERROR_EOF		2	/* unexpected EOF */
245 #define DMSG_IOQ_ERROR_SOCK		3	/* read() error on socket */
246 #define DMSG_IOQ_ERROR_FIELD		4	/* invalid field */
247 #define DMSG_IOQ_ERROR_HCRC		5	/* core header crc bad */
248 #define DMSG_IOQ_ERROR_XCRC		6	/* ext header crc bad */
249 #define DMSG_IOQ_ERROR_ACRC		7	/* aux data crc bad */
250 #define DMSG_IOQ_ERROR_STATE		8	/* bad state */
251 #define DMSG_IOQ_ERROR_NOPEER		9	/* bad socket peer */
252 #define DMSG_IOQ_ERROR_NORKEY		10	/* no remote keyfile found */
253 #define DMSG_IOQ_ERROR_NOLKEY		11	/* no local keyfile found */
254 #define DMSG_IOQ_ERROR_KEYXCHGFAIL	12	/* key exchange failed */
255 #define DMSG_IOQ_ERROR_KEYFMT		13	/* key file format problem */
256 #define DMSG_IOQ_ERROR_BADURANDOM	14	/* /dev/urandom is bad */
257 #define DMSG_IOQ_ERROR_MSGSEQ		15	/* message sequence error */
258 #define DMSG_IOQ_ERROR_EALREADY		16	/* ignore this message */
259 #define DMSG_IOQ_ERROR_TRANS		17	/* state transaction issue */
260 #define DMSG_IOQ_ERROR_IVWRAP		18	/* IVs exhaused */
261 #define DMSG_IOQ_ERROR_MACFAIL		19	/* MAC of encr alg failed */
262 #define DMSG_IOQ_ERROR_ALGO		20	/* Misc. encr alg error */
263 #define DMSG_IOQ_ERROR_ROUTED		21	/* ignore routed message */
264 #define DMSG_IOQ_ERROR_BAD_CIRCUIT	22	/* unconfigured circuit */
265 #define DMSG_IOQ_ERROR_UNUSED23		23
266 #define DMSG_IOQ_ERROR_ASSYM		24	/* Assymetric path */
267 
268 #define DMSG_IOQ_MAXIOVEC    16
269 
270 /*
271  * dmsg_iocom - governs a messaging stream connection
272  */
273 struct dmsg_iocom {
274 	char		*label;			/* label for error reporting */
275 	dmsg_ioq_t	ioq_rx;
276 	dmsg_ioq_t	ioq_tx;
277 	dmsg_msg_queue_t freeq;			/* free msgs hdr only */
278 	dmsg_msg_queue_t freeq_aux;		/* free msgs w/aux_data */
279 	dmsg_state_t	state0;			/* root state for stacking */
280 	struct dmsg_state_tree  staterd_tree;   /* active transactions */
281 	struct dmsg_state_tree  statewr_tree;   /* active transactions */
282 	int	sock_fd;			/* comm socket or pipe */
283 	int	alt_fd;				/* thread signal, tty, etc */
284 	int	wakeupfds[2];			/* pipe wakes up iocom thread */
285 	int	flags;
286 	int	rxmisc;
287 	int	txmisc;
288 	void	(*signal_callback)(struct dmsg_iocom *);
289 	void	(*altmsg_callback)(struct dmsg_iocom *);
290 	void	(*rcvmsg_callback)(dmsg_msg_t *msg);
291 	void	(*usrmsg_callback)(dmsg_msg_t *msg, int unmanaged);
292 	void	(*node_handler)(void **opaquep, dmsg_msg_t *msg, int op);
293 	dmsg_msg_queue_t txmsgq;		/* tx msgq from remote */
294 	struct h2span_conn *conn;		/* if LNK_CONN active */
295 	uint64_t	conn_msgid;		/* LNK_CONN circuit */
296 	pthread_mutex_t	mtx;			/* mutex for state*tree/rmsgq */
297 };
298 
299 typedef struct dmsg_iocom dmsg_iocom_t;
300 
301 #define DMSG_IOCOMF_EOF		0x00000001	/* EOF or ERROR on desc */
302 #define DMSG_IOCOMF_RREQ	0x00000002	/* request read-data event */
303 #define DMSG_IOCOMF_WREQ	0x00000004	/* request write-avail event */
304 #define DMSG_IOCOMF_RWORK	0x00000008	/* immediate work pending */
305 #define DMSG_IOCOMF_WWORK	0x00000010	/* immediate work pending */
306 #define DMSG_IOCOMF_PWORK	0x00000020	/* immediate work pending */
307 #define DMSG_IOCOMF_ARWORK	0x00000040	/* immediate work pending */
308 #define DMSG_IOCOMF_AWWORK	0x00000080	/* immediate work pending */
309 #define DMSG_IOCOMF_SWORK	0x00000100	/* immediate work pending */
310 #define DMSG_IOCOMF_CRYPTED	0x00000200	/* encrypt enabled */
311 #define DMSG_IOCOMF_CLOSEALT	0x00000400	/* close alt_fd */
312 
313 /*
314  * Crypto algorithm table and related typedefs.
315  */
316 typedef int (*algo_init_fn)(dmsg_ioq_t *, char *, int, char *, int, int);
317 typedef int (*algo_enc_fn)(dmsg_ioq_t *, char *, char *, int, int *);
318 typedef int (*algo_dec_fn)(dmsg_ioq_t *, char *, char *, int, int *);
319 
320 struct crypto_algo {
321 	const char	*name;
322 	int		keylen;
323 	int		taglen;
324 	algo_init_fn	init;
325 	algo_enc_fn	enc_chunk;
326 	algo_dec_fn	dec_chunk;
327 };
328 
329 /*
330  * Master service thread info
331  */
332 struct dmsg_master_service_info {
333 	int	fd;
334 	int	altfd;
335 	int	noclosealt;
336 	int	detachme;
337 	char	*label;
338 	void	*handle;
339 	void	(*altmsg_callback)(dmsg_iocom_t *iocom);
340 	void	(*usrmsg_callback)(dmsg_msg_t *msg, int unmanaged);
341 	void	(*node_handler)(void **opaquep, dmsg_msg_t *msg, int op);
342 	void	(*exit_callback)(void *handle);
343 };
344 
345 typedef struct dmsg_master_service_info dmsg_master_service_info_t;
346 
347 /*
348  * node callbacks
349  */
350 #define DMSG_NODEOP_ADD		1
351 #define DMSG_NODEOP_DEL		2
352 
353 /*
354  * icrc
355  */
356 uint32_t dmsg_icrc32(const void *buf, size_t size);
357 uint32_t dmsg_icrc32c(const void *buf, size_t size, uint32_t crc);
358 
359 /*
360  * debug
361  */
362 const char *dmsg_basecmd_str(uint32_t cmd);
363 const char *dmsg_msg_str(dmsg_msg_t *msg);
364 
365 /*
366  * subs
367  */
368 void *dmsg_alloc(size_t bytes);
369 void dmsg_free(void *ptr);
370 const char *dmsg_uuid_to_str(uuid_t *uuid, char **strp);
371 const char *dmsg_peer_type_to_str(uint8_t type);
372 int dmsg_connect(const char *hostname);
373 
374 /*
375  * Msg support functions
376  */
377 void dmsg_bswap_head(dmsg_hdr_t *head);
378 void dmsg_ioq_init(dmsg_iocom_t *iocom, dmsg_ioq_t *ioq);
379 void dmsg_ioq_done(dmsg_iocom_t *iocom, dmsg_ioq_t *ioq);
380 void dmsg_iocom_init(dmsg_iocom_t *iocom, int sock_fd, int alt_fd,
381 			void (*state_func)(dmsg_iocom_t *iocom),
382 			void (*rcvmsg_func)(dmsg_msg_t *msg),
383 			void (*usrmsg_func)(dmsg_msg_t *msg, int unmanaged),
384 			void (*altmsg_func)(dmsg_iocom_t *iocom));
385 void dmsg_iocom_restate(dmsg_iocom_t *iocom,
386 			void (*state_func)(dmsg_iocom_t *iocom),
387 			void (*rcvmsg_func)(dmsg_msg_t *msg));
388 void dmsg_iocom_label(dmsg_iocom_t *iocom, const char *ctl, ...);
389 void dmsg_iocom_signal(dmsg_iocom_t *iocom);
390 void dmsg_iocom_done(dmsg_iocom_t *iocom);
391 dmsg_msg_t *dmsg_msg_alloc(dmsg_state_t *state, size_t aux_size, uint32_t cmd,
392 			void (*func)(dmsg_msg_t *), void *data);
393 void dmsg_msg_reply(dmsg_msg_t *msg, uint32_t error);
394 void dmsg_msg_result(dmsg_msg_t *msg, uint32_t error);
395 void dmsg_state_reply(dmsg_state_t *state, uint32_t error);
396 void dmsg_state_result(dmsg_state_t *state, uint32_t error);
397 
398 void dmsg_msg_free(dmsg_msg_t *msg);
399 
400 void dmsg_iocom_core(dmsg_iocom_t *iocom);
401 dmsg_msg_t *dmsg_ioq_read(dmsg_iocom_t *iocom);
402 void dmsg_msg_write(dmsg_msg_t *msg);
403 
404 void dmsg_iocom_drain(dmsg_iocom_t *iocom);
405 void dmsg_iocom_flush1(dmsg_iocom_t *iocom);
406 void dmsg_iocom_flush2(dmsg_iocom_t *iocom);
407 
408 void dmsg_state_cleanuprx(dmsg_iocom_t *iocom, dmsg_msg_t *msg);
409 void dmsg_state_free(dmsg_state_t *state);
410 
411 /*
412  * Msg protocol functions
413  */
414 void dmsg_msg_lnk_signal(dmsg_iocom_t *iocom);
415 void dmsg_msg_lnk(dmsg_msg_t *msg);
416 void dmsg_msg_dbg(dmsg_msg_t *msg);
417 void dmsg_shell_tree(dmsg_iocom_t *iocom, char *cmdbuf __unused);
418 int dmsg_debug_findspan(uint64_t msgid, dmsg_state_t **statep);
419 dmsg_state_t *dmsg_findspan(const char *label);
420 
421 
422 /*
423  * Crypto functions
424  */
425 void dmsg_crypto_setup(void);
426 void dmsg_crypto_negotiate(dmsg_iocom_t *iocom);
427 void dmsg_crypto_decrypt(dmsg_iocom_t *iocom, dmsg_ioq_t *ioq);
428 int dmsg_crypto_encrypt(dmsg_iocom_t *iocom, dmsg_ioq_t *ioq,
429 			struct iovec *iov, int n, size_t *nactp);
430 
431 /*
432  * Service daemon functions
433  */
434 void *dmsg_master_service(void *data);
435 void dmsg_printf(dmsg_iocom_t *iocom, const char *ctl, ...) __printflike(2, 3);
436 
437 extern int DMsgDebugOpt;
438