dtlstransport.cpp 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593
  1. /**
  2. * Copyright (c) 2019 Paul-Louis Ageneau
  3. *
  4. * This library is free software; you can redistribute it and/or
  5. * modify it under the terms of the GNU Lesser General Public
  6. * License as published by the Free Software Foundation; either
  7. * version 2.1 of the License, or (at your option) any later version.
  8. *
  9. * This library is distributed in the hope that it will be useful,
  10. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  12. * Lesser General Public License for more details.
  13. *
  14. * You should have received a copy of the GNU Lesser General Public
  15. * License along with this library; if not, write to the Free Software
  16. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
  17. */
  18. #include "dtlstransport.hpp"
  19. #include "icetransport.hpp"
  20. #include <chrono>
  21. #include <cstring>
  22. #include <exception>
  23. #include <iostream>
  24. #if !USE_GNUTLS
  25. #ifdef _WIN32
  26. #include <winsock2.h> // for timeval
  27. #else
  28. #include <sys/time.h> // for timeval
  29. #endif
  30. #endif
  31. using namespace std::chrono;
  32. using std::shared_ptr;
  33. using std::string;
  34. using std::unique_ptr;
  35. using std::weak_ptr;
  36. namespace rtc {
  37. #if USE_GNUTLS
  38. void DtlsTransport::Init() {
  39. gnutls_global_init(); // optional
  40. }
  41. void DtlsTransport::Cleanup() { gnutls_global_deinit(); }
  42. DtlsTransport::DtlsTransport(shared_ptr<IceTransport> lower, certificate_ptr certificate,
  43. verifier_callback verifierCallback, state_callback stateChangeCallback)
  44. : Transport(lower, std::move(stateChangeCallback)), mCertificate(certificate),
  45. mVerifierCallback(std::move(verifierCallback)),
  46. mIsClient(lower->role() == Description::Role::Active), mCurrentDscp(0) {
  47. PLOG_DEBUG << "Initializing DTLS transport (GnuTLS)";
  48. gnutls_certificate_credentials_t creds = mCertificate->credentials();
  49. gnutls_certificate_set_verify_function(creds, CertificateCallback);
  50. unsigned int flags = GNUTLS_DATAGRAM | (mIsClient ? GNUTLS_CLIENT : GNUTLS_SERVER);
  51. gnutls::check(gnutls_init(&mSession, flags));
  52. try {
  53. // RFC 8261: SCTP performs segmentation and reassembly based on the path MTU.
  54. // Therefore, the DTLS layer MUST NOT use any compression algorithm.
  55. // See https://tools.ietf.org/html/rfc8261#section-5
  56. const char *priorities = "SECURE128:-VERS-SSL3.0:-ARCFOUR-128:-COMP-ALL:+COMP-NULL";
  57. const char *err_pos = NULL;
  58. gnutls::check(gnutls_priority_set_direct(mSession, priorities, &err_pos),
  59. "Failed to set TLS priorities");
  60. gnutls::check(gnutls_credentials_set(mSession, GNUTLS_CRD_CERTIFICATE, creds));
  61. gnutls_dtls_set_timeouts(mSession,
  62. 1000, // 1s retransmission timeout recommended by RFC 6347
  63. 30000); // 30s total timeout
  64. gnutls_handshake_set_timeout(mSession, 30000);
  65. gnutls_session_set_ptr(mSession, this);
  66. gnutls_transport_set_ptr(mSession, this);
  67. gnutls_transport_set_push_function(mSession, WriteCallback);
  68. gnutls_transport_set_pull_function(mSession, ReadCallback);
  69. gnutls_transport_set_pull_timeout_function(mSession, TimeoutCallback);
  70. } catch (...) {
  71. gnutls_deinit(mSession);
  72. throw;
  73. }
  74. }
  75. DtlsTransport::~DtlsTransport() {
  76. stop();
  77. gnutls_deinit(mSession);
  78. }
  79. void DtlsTransport::start() {
  80. Transport::start();
  81. registerIncoming();
  82. PLOG_DEBUG << "Starting DTLS recv thread";
  83. mRecvThread = std::thread(&DtlsTransport::runRecvLoop, this);
  84. }
  85. bool DtlsTransport::stop() {
  86. if (!Transport::stop())
  87. return false;
  88. PLOG_DEBUG << "Stopping DTLS recv thread";
  89. mIncomingQueue.stop();
  90. mRecvThread.join();
  91. return true;
  92. }
  93. bool DtlsTransport::send(message_ptr message) {
  94. if (!message || state() != State::Connected)
  95. return false;
  96. PLOG_VERBOSE << "Send size=" << message->size();
  97. mCurrentDscp = message->dscp;
  98. ssize_t ret;
  99. do {
  100. ret = gnutls_record_send(mSession, message->data(), message->size());
  101. } while (ret == GNUTLS_E_INTERRUPTED || ret == GNUTLS_E_AGAIN);
  102. if (ret == GNUTLS_E_LARGE_PACKET)
  103. return false;
  104. return gnutls::check(ret);
  105. }
  106. void DtlsTransport::incoming(message_ptr message) {
  107. if (!message) {
  108. mIncomingQueue.stop();
  109. return;
  110. }
  111. PLOG_VERBOSE << "Incoming size=" << message->size();
  112. mIncomingQueue.push(message);
  113. }
  114. bool DtlsTransport::outgoing(message_ptr message) {
  115. if (message->dscp == 0)
  116. message->dscp = mCurrentDscp;
  117. return Transport::outgoing(std::move(message));
  118. }
  119. void DtlsTransport::postHandshake() {
  120. // Dummy
  121. }
  122. void DtlsTransport::runRecvLoop() {
  123. const size_t maxMtu = 4096;
  124. // Handshake loop
  125. try {
  126. changeState(State::Connecting);
  127. gnutls_dtls_set_mtu(mSession, 1280 - 40 - 8); // min MTU over UDP/IPv6
  128. int ret;
  129. do {
  130. ret = gnutls_handshake(mSession);
  131. if (ret == GNUTLS_E_LARGE_PACKET)
  132. throw std::runtime_error("MTU is too low");
  133. } while (ret == GNUTLS_E_INTERRUPTED || ret == GNUTLS_E_AGAIN ||
  134. !gnutls::check(ret, "DTLS handshake failed"));
  135. // RFC 8261: DTLS MUST support sending messages larger than the current path MTU
  136. // See https://tools.ietf.org/html/rfc8261#section-5
  137. gnutls_dtls_set_mtu(mSession, maxMtu + 1);
  138. } catch (const std::exception &e) {
  139. PLOG_ERROR << "DTLS handshake: " << e.what();
  140. changeState(State::Failed);
  141. return;
  142. }
  143. // Receive loop
  144. try {
  145. PLOG_INFO << "DTLS handshake finished";
  146. postHandshake();
  147. changeState(State::Connected);
  148. const size_t bufferSize = maxMtu;
  149. char buffer[bufferSize];
  150. while (true) {
  151. ssize_t ret;
  152. do {
  153. ret = gnutls_record_recv(mSession, buffer, bufferSize);
  154. } while (ret == GNUTLS_E_INTERRUPTED || ret == GNUTLS_E_AGAIN);
  155. // Consider premature termination as remote closing
  156. if (ret == GNUTLS_E_PREMATURE_TERMINATION) {
  157. PLOG_DEBUG << "DTLS connection terminated";
  158. break;
  159. }
  160. if (gnutls::check(ret)) {
  161. if (ret == 0) {
  162. // Closed
  163. PLOG_DEBUG << "DTLS connection cleanly closed";
  164. break;
  165. }
  166. auto *b = reinterpret_cast<byte *>(buffer);
  167. recv(make_message(b, b + ret));
  168. }
  169. }
  170. } catch (const std::exception &e) {
  171. PLOG_ERROR << "DTLS recv: " << e.what();
  172. }
  173. gnutls_bye(mSession, GNUTLS_SHUT_RDWR);
  174. PLOG_INFO << "DTLS closed";
  175. changeState(State::Disconnected);
  176. recv(nullptr);
  177. }
  178. int DtlsTransport::CertificateCallback(gnutls_session_t session) {
  179. DtlsTransport *t = static_cast<DtlsTransport *>(gnutls_session_get_ptr(session));
  180. if (gnutls_certificate_type_get(session) != GNUTLS_CRT_X509) {
  181. return GNUTLS_E_CERTIFICATE_ERROR;
  182. }
  183. unsigned int count = 0;
  184. const gnutls_datum_t *array = gnutls_certificate_get_peers(session, &count);
  185. if (!array || count == 0) {
  186. return GNUTLS_E_CERTIFICATE_ERROR;
  187. }
  188. gnutls_x509_crt_t crt;
  189. gnutls::check(gnutls_x509_crt_init(&crt));
  190. int ret = gnutls_x509_crt_import(crt, &array[0], GNUTLS_X509_FMT_DER);
  191. if (ret != GNUTLS_E_SUCCESS) {
  192. gnutls_x509_crt_deinit(crt);
  193. return GNUTLS_E_CERTIFICATE_ERROR;
  194. }
  195. string fingerprint = make_fingerprint(crt);
  196. gnutls_x509_crt_deinit(crt);
  197. bool success = t->mVerifierCallback(fingerprint);
  198. return success ? GNUTLS_E_SUCCESS : GNUTLS_E_CERTIFICATE_ERROR;
  199. }
  200. ssize_t DtlsTransport::WriteCallback(gnutls_transport_ptr_t ptr, const void *data, size_t len) {
  201. DtlsTransport *t = static_cast<DtlsTransport *>(ptr);
  202. if (len > 0) {
  203. auto b = reinterpret_cast<const byte *>(data);
  204. t->outgoing(make_message(b, b + len));
  205. }
  206. gnutls_transport_set_errno(t->mSession, 0);
  207. return ssize_t(len);
  208. }
  209. ssize_t DtlsTransport::ReadCallback(gnutls_transport_ptr_t ptr, void *data, size_t maxlen) {
  210. DtlsTransport *t = static_cast<DtlsTransport *>(ptr);
  211. if (auto next = t->mIncomingQueue.pop()) {
  212. message_ptr message = std::move(*next);
  213. ssize_t len = std::min(maxlen, message->size());
  214. std::memcpy(data, message->data(), len);
  215. gnutls_transport_set_errno(t->mSession, 0);
  216. return len;
  217. }
  218. // Closed
  219. gnutls_transport_set_errno(t->mSession, 0);
  220. return 0;
  221. }
  222. int DtlsTransport::TimeoutCallback(gnutls_transport_ptr_t ptr, unsigned int ms) {
  223. DtlsTransport *t = static_cast<DtlsTransport *>(ptr);
  224. bool notEmpty = t->mIncomingQueue.wait(
  225. ms != GNUTLS_INDEFINITE_TIMEOUT ? std::make_optional(milliseconds(ms)) : nullopt);
  226. return notEmpty ? 1 : 0;
  227. }
  228. #else // USE_GNUTLS==0
  229. BIO_METHOD *DtlsTransport::BioMethods = NULL;
  230. int DtlsTransport::TransportExIndex = -1;
  231. std::mutex DtlsTransport::GlobalMutex;
  232. void DtlsTransport::Init() {
  233. std::lock_guard lock(GlobalMutex);
  234. openssl::init();
  235. if (!BioMethods) {
  236. BioMethods = BIO_meth_new(BIO_TYPE_BIO, "DTLS writer");
  237. if (!BioMethods)
  238. throw std::runtime_error("Failed to create BIO methods for DTLS writer");
  239. BIO_meth_set_create(BioMethods, BioMethodNew);
  240. BIO_meth_set_destroy(BioMethods, BioMethodFree);
  241. BIO_meth_set_write(BioMethods, BioMethodWrite);
  242. BIO_meth_set_ctrl(BioMethods, BioMethodCtrl);
  243. }
  244. if (TransportExIndex < 0) {
  245. TransportExIndex = SSL_get_ex_new_index(0, NULL, NULL, NULL, NULL);
  246. }
  247. }
  248. void DtlsTransport::Cleanup() {
  249. // Nothing to do
  250. }
  251. DtlsTransport::DtlsTransport(shared_ptr<IceTransport> lower, shared_ptr<Certificate> certificate,
  252. verifier_callback verifierCallback, state_callback stateChangeCallback)
  253. : Transport(lower, std::move(stateChangeCallback)), mCertificate(certificate),
  254. mVerifierCallback(std::move(verifierCallback)),
  255. mIsClient(lower->role() == Description::Role::Active), mCurrentDscp(0) {
  256. PLOG_DEBUG << "Initializing DTLS transport (OpenSSL)";
  257. try {
  258. mCtx = SSL_CTX_new(DTLS_method());
  259. if (!mCtx)
  260. throw std::runtime_error("Failed to create SSL context");
  261. openssl::check(SSL_CTX_set_cipher_list(mCtx, "ALL:!LOW:!EXP:!RC4:!MD5:@STRENGTH"),
  262. "Failed to set SSL priorities");
  263. // RFC 8261: SCTP performs segmentation and reassembly based on the path MTU.
  264. // Therefore, the DTLS layer MUST NOT use any compression algorithm.
  265. // See https://tools.ietf.org/html/rfc8261#section-5
  266. SSL_CTX_set_options(mCtx, SSL_OP_NO_SSLv3 | SSL_OP_NO_COMPRESSION | SSL_OP_NO_QUERY_MTU);
  267. SSL_CTX_set_min_proto_version(mCtx, DTLS1_VERSION);
  268. SSL_CTX_set_read_ahead(mCtx, 1);
  269. SSL_CTX_set_quiet_shutdown(mCtx, 1);
  270. SSL_CTX_set_info_callback(mCtx, InfoCallback);
  271. SSL_CTX_set_verify(mCtx, SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT,
  272. CertificateCallback);
  273. SSL_CTX_set_verify_depth(mCtx, 1);
  274. auto [x509, pkey] = mCertificate->credentials();
  275. SSL_CTX_use_certificate(mCtx, x509);
  276. SSL_CTX_use_PrivateKey(mCtx, pkey);
  277. openssl::check(SSL_CTX_check_private_key(mCtx), "SSL local private key check failed");
  278. mSsl = SSL_new(mCtx);
  279. if (!mSsl)
  280. throw std::runtime_error("Failed to create SSL instance");
  281. SSL_set_ex_data(mSsl, TransportExIndex, this);
  282. if (mIsClient)
  283. SSL_set_connect_state(mSsl);
  284. else
  285. SSL_set_accept_state(mSsl);
  286. mInBio = BIO_new(BIO_s_mem());
  287. mOutBio = BIO_new(BioMethods);
  288. if (!mInBio || !mOutBio)
  289. throw std::runtime_error("Failed to create BIO");
  290. BIO_set_mem_eof_return(mInBio, BIO_EOF);
  291. BIO_set_data(mOutBio, this);
  292. SSL_set_bio(mSsl, mInBio, mOutBio);
  293. auto ecdh = unique_ptr<EC_KEY, decltype(&EC_KEY_free)>(
  294. EC_KEY_new_by_curve_name(NID_X9_62_prime256v1), EC_KEY_free);
  295. SSL_set_options(mSsl, SSL_OP_SINGLE_ECDH_USE);
  296. SSL_set_tmp_ecdh(mSsl, ecdh.get());
  297. } catch (...) {
  298. if (mSsl)
  299. SSL_free(mSsl);
  300. if (mCtx)
  301. SSL_CTX_free(mCtx);
  302. throw;
  303. }
  304. }
  305. DtlsTransport::~DtlsTransport() {
  306. stop();
  307. SSL_free(mSsl);
  308. SSL_CTX_free(mCtx);
  309. }
  310. void DtlsTransport::start() {
  311. Transport::start();
  312. registerIncoming();
  313. PLOG_DEBUG << "Starting DTLS recv thread";
  314. mRecvThread = std::thread(&DtlsTransport::runRecvLoop, this);
  315. }
  316. bool DtlsTransport::stop() {
  317. if (!Transport::stop())
  318. return false;
  319. PLOG_DEBUG << "Stopping DTLS recv thread";
  320. mIncomingQueue.stop();
  321. mRecvThread.join();
  322. SSL_shutdown(mSsl);
  323. return true;
  324. }
  325. bool DtlsTransport::send(message_ptr message) {
  326. if (!message || state() != State::Connected)
  327. return false;
  328. PLOG_VERBOSE << "Send size=" << message->size();
  329. mCurrentDscp = message->dscp;
  330. int ret = SSL_write(mSsl, message->data(), int(message->size()));
  331. return openssl::check(mSsl, ret);
  332. }
  333. void DtlsTransport::incoming(message_ptr message) {
  334. if (!message) {
  335. mIncomingQueue.stop();
  336. return;
  337. }
  338. PLOG_VERBOSE << "Incoming size=" << message->size();
  339. mIncomingQueue.push(message);
  340. }
  341. bool DtlsTransport::outgoing(message_ptr message) {
  342. if (message->dscp == 0)
  343. message->dscp = mCurrentDscp;
  344. return Transport::outgoing(std::move(message));
  345. }
  346. void DtlsTransport::postHandshake() {
  347. // Dummy
  348. }
  349. void DtlsTransport::runRecvLoop() {
  350. const size_t maxMtu = 4096;
  351. try {
  352. changeState(State::Connecting);
  353. SSL_set_mtu(mSsl, 1280 - 40 - 8); // min MTU over UDP/IPv6
  354. // Initiate the handshake
  355. int ret = SSL_do_handshake(mSsl);
  356. openssl::check(mSsl, ret, "Handshake failed");
  357. const size_t bufferSize = maxMtu;
  358. byte buffer[bufferSize];
  359. while (mIncomingQueue.running()) {
  360. // Process pending messages
  361. while (auto next = mIncomingQueue.tryPop()) {
  362. message_ptr message = std::move(*next);
  363. BIO_write(mInBio, message->data(), int(message->size()));
  364. if (state() == State::Connecting) {
  365. // Continue the handshake
  366. ret = SSL_do_handshake(mSsl);
  367. if (!openssl::check(mSsl, ret, "Handshake failed"))
  368. break;
  369. if (SSL_is_init_finished(mSsl)) {
  370. // RFC 8261: DTLS MUST support sending messages larger than the current path
  371. // MTU See https://tools.ietf.org/html/rfc8261#section-5
  372. SSL_set_mtu(mSsl, maxMtu + 1);
  373. PLOG_INFO << "DTLS handshake finished";
  374. postHandshake();
  375. changeState(State::Connected);
  376. }
  377. } else {
  378. ret = SSL_read(mSsl, buffer, bufferSize);
  379. if (!openssl::check(mSsl, ret))
  380. break;
  381. if (ret > 0)
  382. recv(make_message(buffer, buffer + ret));
  383. }
  384. }
  385. // No more messages pending, retransmit and rearm timeout if connecting
  386. std::optional<milliseconds> duration;
  387. if (state() == State::Connecting) {
  388. // Warning: This function breaks the usual return value convention
  389. ret = DTLSv1_handle_timeout(mSsl);
  390. if (ret < 0) {
  391. throw std::runtime_error("Handshake timeout"); // write BIO can't fail
  392. } else if (ret > 0) {
  393. LOG_VERBOSE << "OpenSSL did DTLS retransmit";
  394. }
  395. struct timeval timeout = {};
  396. if (state() == State::Connecting && DTLSv1_get_timeout(mSsl, &timeout)) {
  397. duration = milliseconds(timeout.tv_sec * 1000 + timeout.tv_usec / 1000);
  398. // Also handle handshake timeout manually because OpenSSL actually doesn't...
  399. // OpenSSL backs off exponentially in base 2 starting from the recommended 1s
  400. // so this allows for 5 retransmissions and fails after roughly 30s.
  401. if (duration > 30s) {
  402. throw std::runtime_error("Handshake timeout");
  403. } else {
  404. LOG_VERBOSE << "OpenSSL DTLS retransmit timeout is " << duration->count()
  405. << "ms";
  406. }
  407. }
  408. }
  409. mIncomingQueue.wait(duration);
  410. }
  411. } catch (const std::exception &e) {
  412. PLOG_ERROR << "DTLS recv: " << e.what();
  413. }
  414. if (state() == State::Connected) {
  415. PLOG_INFO << "DTLS closed";
  416. changeState(State::Disconnected);
  417. recv(nullptr);
  418. } else {
  419. PLOG_ERROR << "DTLS handshake failed";
  420. changeState(State::Failed);
  421. }
  422. }
  423. int DtlsTransport::CertificateCallback(int /*preverify_ok*/, X509_STORE_CTX *ctx) {
  424. SSL *ssl =
  425. static_cast<SSL *>(X509_STORE_CTX_get_ex_data(ctx, SSL_get_ex_data_X509_STORE_CTX_idx()));
  426. DtlsTransport *t =
  427. static_cast<DtlsTransport *>(SSL_get_ex_data(ssl, DtlsTransport::TransportExIndex));
  428. X509 *crt = X509_STORE_CTX_get_current_cert(ctx);
  429. string fingerprint = make_fingerprint(crt);
  430. return t->mVerifierCallback(fingerprint) ? 1 : 0;
  431. }
  432. void DtlsTransport::InfoCallback(const SSL *ssl, int where, int ret) {
  433. DtlsTransport *t =
  434. static_cast<DtlsTransport *>(SSL_get_ex_data(ssl, DtlsTransport::TransportExIndex));
  435. if (where & SSL_CB_ALERT) {
  436. if (ret != 256) { // Close Notify
  437. PLOG_ERROR << "DTLS alert: " << SSL_alert_desc_string_long(ret);
  438. }
  439. t->mIncomingQueue.stop(); // Close the connection
  440. }
  441. }
  442. int DtlsTransport::BioMethodNew(BIO *bio) {
  443. BIO_set_init(bio, 1);
  444. BIO_set_data(bio, NULL);
  445. BIO_set_shutdown(bio, 0);
  446. return 1;
  447. }
  448. int DtlsTransport::BioMethodFree(BIO *bio) {
  449. if (!bio)
  450. return 0;
  451. BIO_set_data(bio, NULL);
  452. return 1;
  453. }
  454. int DtlsTransport::BioMethodWrite(BIO *bio, const char *in, int inl) {
  455. if (inl <= 0)
  456. return inl;
  457. auto transport = reinterpret_cast<DtlsTransport *>(BIO_get_data(bio));
  458. if (!transport)
  459. return -1;
  460. auto b = reinterpret_cast<const byte *>(in);
  461. transport->outgoing(make_message(b, b + inl));
  462. return inl; // can't fail
  463. }
  464. long DtlsTransport::BioMethodCtrl(BIO * /*bio*/, int cmd, long /*num*/, void * /*ptr*/) {
  465. switch (cmd) {
  466. case BIO_CTRL_FLUSH:
  467. return 1;
  468. case BIO_CTRL_DGRAM_QUERY_MTU:
  469. return 0; // SSL_OP_NO_QUERY_MTU must be set
  470. case BIO_CTRL_WPENDING:
  471. case BIO_CTRL_PENDING:
  472. return 0;
  473. default:
  474. break;
  475. }
  476. return 0;
  477. }
  478. #endif
  479. } // namespace rtc