tor-android/external/badvpn_dns/flooder/flooder.c

672 lines
19 KiB
C

/**
* @file flooder.c
* @author Ambroz Bizjak <ambrop7@gmail.com>
*
* @section LICENSE
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. Neither the name of the author nor the
* names of its contributors may be used to endorse or promote products
* derived from this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
* DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
* DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
* ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include <stdint.h>
#include <stdlib.h>
#include <string.h>
#include <stdio.h>
#include <protocol/addr.h>
#include <protocol/scproto.h>
#include <misc/loglevel.h>
#include <misc/version.h>
#include <misc/nsskey.h>
#include <misc/byteorder.h>
#include <misc/loggers_string.h>
#include <misc/open_standard_streams.h>
#include <base/BLog.h>
#include <system/BReactor.h>
#include <system/BSignal.h>
#include <system/BNetwork.h>
#include <flow/SinglePacketBuffer.h>
#include <flow/PacketProtoEncoder.h>
#include <nspr_support/BSSLConnection.h>
#include <server_connection/ServerConnection.h>
#ifndef BADVPN_USE_WINAPI
#include <base/BLog_syslog.h>
#endif
#include <flooder/flooder.h>
#include <generated/blog_channel_flooder.h>
#define LOGGER_STDOUT 1
#define LOGGER_SYSLOG 2
// command-line options
struct {
int help;
int version;
int logger;
#ifndef BADVPN_USE_WINAPI
char *logger_syslog_facility;
char *logger_syslog_ident;
#endif
int loglevel;
int loglevels[BLOG_NUM_CHANNELS];
int ssl;
char *nssdb;
char *client_cert_name;
char *server_name;
char *server_addr;
peerid_t floods[MAX_FLOODS];
int num_floods;
} options;
// server address we connect to
BAddr server_addr;
// server name to use for SSL
char server_name[256];
// reactor
BReactor ss;
// client certificate if using SSL
CERTCertificate *client_cert;
// client private key if using SSL
SECKEYPrivateKey *client_key;
// server connection
ServerConnection server;
// whether server is ready
int server_ready;
// my ID, defined only after server_ready
peerid_t my_id;
// flooding output
PacketRecvInterface flood_source;
PacketProtoEncoder flood_encoder;
SinglePacketBuffer flood_buffer;
// whether we were asked for a packet and blocked
int flood_blocking;
// index of next peer to send packet too
int flood_next;
/**
* Cleans up everything that can be cleaned up from inside the event loop.
*/
static void terminate (void);
/**
* Prints command line help.
*/
static void print_help (const char *name);
/**
* Prints program name, version and copyright notice.
*/
static void print_version (void);
/**
* Parses command line options into the options strucute.
*
* @return 1 on success, 0 on failure
*/
static int parse_arguments (int argc, char *argv[]);
/**
* Processes command line options.
*
* @return 1 on success, 0 on failure
*/
static int resolve_arguments (void);
/**
* Handler invoked when program termination is requested.
*/
static void signal_handler (void *unused);
static void server_handler_error (void *user);
static void server_handler_ready (void *user, peerid_t param_my_id, uint32_t ext_ip);
static void server_handler_newclient (void *user, peerid_t peer_id, int flags, const uint8_t *cert, int cert_len);
static void server_handler_endclient (void *user, peerid_t peer_id);
static void server_handler_message (void *user, peerid_t peer_id, uint8_t *data, int data_len);
static void flood_source_handler_recv (void *user, uint8_t *data);
int main (int argc, char *argv[])
{
if (argc <= 0) {
return 1;
}
// open standard streams
open_standard_streams();
// parse command-line arguments
if (!parse_arguments(argc, argv)) {
fprintf(stderr, "Failed to parse arguments\n");
print_help(argv[0]);
goto fail0;
}
// handle --help and --version
if (options.help) {
print_version();
print_help(argv[0]);
return 0;
}
if (options.version) {
print_version();
return 0;
}
// initialize logger
switch (options.logger) {
case LOGGER_STDOUT:
BLog_InitStdout();
break;
#ifndef BADVPN_USE_WINAPI
case LOGGER_SYSLOG:
if (!BLog_InitSyslog(options.logger_syslog_ident, options.logger_syslog_facility)) {
fprintf(stderr, "Failed to initialize syslog logger\n");
goto fail0;
}
break;
#endif
default:
ASSERT(0);
}
// configure logger channels
for (int i = 0; i < BLOG_NUM_CHANNELS; i++) {
if (options.loglevels[i] >= 0) {
BLog_SetChannelLoglevel(i, options.loglevels[i]);
}
else if (options.loglevel >= 0) {
BLog_SetChannelLoglevel(i, options.loglevel);
}
}
BLog(BLOG_NOTICE, "initializing "GLOBAL_PRODUCT_NAME" "PROGRAM_NAME" "GLOBAL_VERSION);
// initialize network
if (!BNetwork_GlobalInit()) {
BLog(BLOG_ERROR, "BNetwork_GlobalInit failed");
goto fail1;
}
// init time
BTime_Init();
// resolve addresses
if (!resolve_arguments()) {
BLog(BLOG_ERROR, "Failed to resolve arguments");
goto fail1;
}
// init reactor
if (!BReactor_Init(&ss)) {
BLog(BLOG_ERROR, "BReactor_Init failed");
goto fail1;
}
// setup signal handler
if (!BSignal_Init(&ss, signal_handler, NULL)) {
BLog(BLOG_ERROR, "BSignal_Init failed");
goto fail1a;
}
if (options.ssl) {
// init NSPR
PR_Init(PR_USER_THREAD, PR_PRIORITY_NORMAL, 0);
// register local NSPR file types
if (!BSSLConnection_GlobalInit()) {
BLog(BLOG_ERROR, "BSSLConnection_GlobalInit failed");
goto fail3;
}
// init NSS
if (NSS_Init(options.nssdb) != SECSuccess) {
BLog(BLOG_ERROR, "NSS_Init failed (%d)", (int)PR_GetError());
goto fail2;
}
// set cipher policy
if (NSS_SetDomesticPolicy() != SECSuccess) {
BLog(BLOG_ERROR, "NSS_SetDomesticPolicy failed (%d)", (int)PR_GetError());
goto fail3;
}
// init server cache
if (SSL_ConfigServerSessionIDCache(0, 0, 0, NULL) != SECSuccess) {
BLog(BLOG_ERROR, "SSL_ConfigServerSessionIDCache failed (%d)", (int)PR_GetError());
goto fail3;
}
// open server certificate and private key
if (!open_nss_cert_and_key(options.client_cert_name, &client_cert, &client_key)) {
BLog(BLOG_ERROR, "Cannot open certificate and key");
goto fail4;
}
}
// start connecting to server
if (!ServerConnection_Init(
&server, &ss, NULL, server_addr, SC_KEEPALIVE_INTERVAL, SERVER_BUFFER_MIN_PACKETS, options.ssl, 0, client_cert, client_key, server_name, NULL,
server_handler_error, server_handler_ready, server_handler_newclient, server_handler_endclient, server_handler_message
)) {
BLog(BLOG_ERROR, "ServerConnection_Init failed");
goto fail5;
}
// set server not ready
server_ready = 0;
// enter event loop
BLog(BLOG_NOTICE, "entering event loop");
BReactor_Exec(&ss);
if (server_ready) {
ServerConnection_ReleaseBuffers(&server);
SinglePacketBuffer_Free(&flood_buffer);
PacketProtoEncoder_Free(&flood_encoder);
PacketRecvInterface_Free(&flood_source);
}
ServerConnection_Free(&server);
fail5:
if (options.ssl) {
CERT_DestroyCertificate(client_cert);
SECKEY_DestroyPrivateKey(client_key);
fail4:
ASSERT_FORCE(SSL_ShutdownServerSessionIDCache() == SECSuccess)
fail3:
SSL_ClearSessionCache();
ASSERT_FORCE(NSS_Shutdown() == SECSuccess)
fail2:
ASSERT_FORCE(PR_Cleanup() == PR_SUCCESS)
PL_ArenaFinish();
}
BSignal_Finish();
fail1a:
BReactor_Free(&ss);
fail1:
BLog(BLOG_NOTICE, "exiting");
BLog_Free();
fail0:
DebugObjectGlobal_Finish();
return 1;
}
void terminate (void)
{
BLog(BLOG_NOTICE, "tearing down");
// exit event loop
BReactor_Quit(&ss, 0);
}
void print_help (const char *name)
{
printf(
"Usage:\n"
" %s\n"
" [--help]\n"
" [--version]\n"
" [--logger <"LOGGERS_STRING">]\n"
#ifndef BADVPN_USE_WINAPI
" (logger=syslog?\n"
" [--syslog-facility <string>]\n"
" [--syslog-ident <string>]\n"
" )\n"
#endif
" [--loglevel <0-5/none/error/warning/notice/info/debug>]\n"
" [--channel-loglevel <channel-name> <0-5/none/error/warning/notice/info/debug>] ...\n"
" [--ssl --nssdb <string> --client-cert-name <string>]\n"
" [--server-name <string>]\n"
" --server-addr <addr>\n"
" [--flood-id <id>] ...\n"
"Address format is a.b.c.d:port (IPv4) or [addr]:port (IPv6).\n",
name
);
}
void print_version (void)
{
printf(GLOBAL_PRODUCT_NAME" "PROGRAM_NAME" "GLOBAL_VERSION"\n"GLOBAL_COPYRIGHT_NOTICE"\n");
}
int parse_arguments (int argc, char *argv[])
{
if (argc <= 0) {
return 0;
}
options.help = 0;
options.version = 0;
options.logger = LOGGER_STDOUT;
#ifndef BADVPN_USE_WINAPI
options.logger_syslog_facility = "daemon";
options.logger_syslog_ident = argv[0];
#endif
options.loglevel = -1;
for (int i = 0; i < BLOG_NUM_CHANNELS; i++) {
options.loglevels[i] = -1;
}
options.ssl = 0;
options.nssdb = NULL;
options.client_cert_name = NULL;
options.server_name = NULL;
options.server_addr = NULL;
options.num_floods = 0;
int i;
for (i = 1; i < argc; i++) {
char *arg = argv[i];
if (!strcmp(arg, "--help")) {
options.help = 1;
}
else if (!strcmp(arg, "--version")) {
options.version = 1;
}
else if (!strcmp(arg, "--logger")) {
if (1 >= argc - i) {
fprintf(stderr, "%s: requires an argument\n", arg);
return 0;
}
char *arg2 = argv[i + 1];
if (!strcmp(arg2, "stdout")) {
options.logger = LOGGER_STDOUT;
}
#ifndef BADVPN_USE_WINAPI
else if (!strcmp(arg2, "syslog")) {
options.logger = LOGGER_SYSLOG;
}
#endif
else {
fprintf(stderr, "%s: wrong argument\n", arg);
return 0;
}
i++;
}
#ifndef BADVPN_USE_WINAPI
else if (!strcmp(arg, "--syslog-facility")) {
if (1 >= argc - i) {
fprintf(stderr, "%s: requires an argument\n", arg);
return 0;
}
options.logger_syslog_facility = argv[i + 1];
i++;
}
else if (!strcmp(arg, "--syslog-ident")) {
if (1 >= argc - i) {
fprintf(stderr, "%s: requires an argument\n", arg);
return 0;
}
options.logger_syslog_ident = argv[i + 1];
i++;
}
#endif
else if (!strcmp(arg, "--loglevel")) {
if (1 >= argc - i) {
fprintf(stderr, "%s: requires an argument\n", arg);
return 0;
}
if ((options.loglevel = parse_loglevel(argv[i + 1])) < 0) {
fprintf(stderr, "%s: wrong argument\n", arg);
return 0;
}
i++;
}
else if (!strcmp(arg, "--channel-loglevel")) {
if (2 >= argc - i) {
fprintf(stderr, "%s: requires two arguments\n", arg);
return 0;
}
int channel = BLogGlobal_GetChannelByName(argv[i + 1]);
if (channel < 0) {
fprintf(stderr, "%s: wrong channel argument\n", arg);
return 0;
}
int loglevel = parse_loglevel(argv[i + 2]);
if (loglevel < 0) {
fprintf(stderr, "%s: wrong loglevel argument\n", arg);
return 0;
}
options.loglevels[channel] = loglevel;
i += 2;
}
else if (!strcmp(arg, "--ssl")) {
options.ssl = 1;
}
else if (!strcmp(arg, "--nssdb")) {
if (1 >= argc - i) {
fprintf(stderr, "%s: requires an argument\n", arg);
return 0;
}
options.nssdb = argv[i + 1];
i++;
}
else if (!strcmp(arg, "--client-cert-name")) {
if (1 >= argc - i) {
fprintf(stderr, "%s: requires an argument\n", arg);
return 0;
}
options.client_cert_name = argv[i + 1];
i++;
}
else if (!strcmp(arg, "--server-name")) {
if (1 >= argc - i) {
fprintf(stderr, "%s: requires an argument\n", arg);
return 0;
}
options.server_name = argv[i + 1];
i++;
}
else if (!strcmp(arg, "--server-addr")) {
if (1 >= argc - i) {
fprintf(stderr, "%s: requires an argument\n", arg);
return 0;
}
options.server_addr = argv[i + 1];
i++;
}
else if (!strcmp(arg, "--flood-id")) {
if (1 >= argc - i) {
fprintf(stderr, "%s: requires an argument\n", arg);
return 0;
}
if (options.num_floods == MAX_FLOODS) {
fprintf(stderr, "%s: too many\n", arg);
return 0;
}
options.floods[options.num_floods] = atoi(argv[i + 1]);
options.num_floods++;
i++;
}
else {
fprintf(stderr, "unknown option: %s\n", arg);
return 0;
}
}
if (options.help || options.version) {
return 1;
}
if (options.ssl != !!options.nssdb) {
fprintf(stderr, "False: --ssl <=> --nssdb\n");
return 0;
}
if (options.ssl != !!options.client_cert_name) {
fprintf(stderr, "False: --ssl <=> --client-cert-name\n");
return 0;
}
if (!options.server_addr) {
fprintf(stderr, "False: --server-addr\n");
return 0;
}
return 1;
}
int resolve_arguments (void)
{
// resolve server address
ASSERT(options.server_addr)
if (!BAddr_Parse(&server_addr, options.server_addr, server_name, sizeof(server_name))) {
BLog(BLOG_ERROR, "server addr: BAddr_Parse failed");
return 0;
}
if (!addr_supported(server_addr)) {
BLog(BLOG_ERROR, "server addr: not supported");
return 0;
}
// override server name if requested
if (options.server_name) {
if (strlen(options.server_name) >= sizeof(server_name)) {
BLog(BLOG_ERROR, "server name: too long");
return 0;
}
strcpy(server_name, options.server_name);
}
return 1;
}
void signal_handler (void *unused)
{
BLog(BLOG_NOTICE, "termination requested");
terminate();
}
void server_handler_error (void *user)
{
BLog(BLOG_ERROR, "server connection failed, exiting");
terminate();
}
void server_handler_ready (void *user, peerid_t param_my_id, uint32_t ext_ip)
{
ASSERT(!server_ready)
// remember our ID
my_id = param_my_id;
// init flooding
// init source
PacketRecvInterface_Init(&flood_source, SC_MAX_ENC, flood_source_handler_recv, NULL, BReactor_PendingGroup(&ss));
// init encoder
PacketProtoEncoder_Init(&flood_encoder, &flood_source, BReactor_PendingGroup(&ss));
// init buffer
if (!SinglePacketBuffer_Init(&flood_buffer, PacketProtoEncoder_GetOutput(&flood_encoder), ServerConnection_GetSendInterface(&server), BReactor_PendingGroup(&ss))) {
BLog(BLOG_ERROR, "SinglePacketBuffer_Init failed, exiting");
goto fail1;
}
// set not blocking
flood_blocking = 0;
// set server ready
server_ready = 1;
BLog(BLOG_INFO, "server: ready, my ID is %d", (int)my_id);
return;
fail1:
PacketProtoEncoder_Free(&flood_encoder);
PacketRecvInterface_Free(&flood_source);
terminate();
}
void server_handler_newclient (void *user, peerid_t peer_id, int flags, const uint8_t *cert, int cert_len)
{
ASSERT(server_ready)
BLog(BLOG_INFO, "newclient %d", (int)peer_id);
}
void server_handler_endclient (void *user, peerid_t peer_id)
{
ASSERT(server_ready)
BLog(BLOG_INFO, "endclient %d", (int)peer_id);
}
void server_handler_message (void *user, peerid_t peer_id, uint8_t *data, int data_len)
{
ASSERT(server_ready)
ASSERT(data_len >= 0)
ASSERT(data_len <= SC_MAX_MSGLEN)
BLog(BLOG_INFO, "message from %d", (int)peer_id);
}
void flood_source_handler_recv (void *user, uint8_t *data)
{
ASSERT(server_ready)
ASSERT(!flood_blocking)
if (options.num_floods > 0) {
ASSERT(flood_next >= 0)
ASSERT(flood_next < options.num_floods)
}
if (options.num_floods == 0) {
flood_blocking = 1;
return;
}
peerid_t peer_id = options.floods[flood_next];
flood_next = (flood_next + 1) % options.num_floods;
BLog(BLOG_INFO, "message to %d", (int)peer_id);
struct sc_header header;
header.type = SCID_OUTMSG;
memcpy(data, &header, sizeof(header));
struct sc_client_outmsg omsg;
omsg.clientid = htol16(peer_id);
memcpy(data + sizeof(header), &omsg, sizeof(omsg));
memset(data + sizeof(struct sc_header) + sizeof(struct sc_client_outmsg), 0, SC_MAX_MSGLEN);
PacketRecvInterface_Done(&flood_source, sizeof(struct sc_header) + sizeof(struct sc_client_outmsg) + SC_MAX_MSGLEN);
}