null_mechanism.cpp 9.78 KB
Newer Older
1
/*
2
    Copyright (c) 2007-2015 Contributors as noted in the AUTHORS file
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30

    This file is part of 0MQ.

    0MQ is free software; you can redistribute it and/or modify it under
    the terms of the GNU Lesser General Public License as published by
    the Free Software Foundation; either version 3 of the License, or
    (at your option) any later version.

    0MQ is distributed in the hope that it will be useful,
    but WITHOUT ANY WARRANTY; without even the implied warranty of
    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
    GNU Lesser General Public License for more details.

    You should have received a copy of the GNU Lesser General Public License
    along with this program.  If not, see <http://www.gnu.org/licenses/>.
*/

#include "platform.hpp"
#ifdef ZMQ_HAVE_WINDOWS
#include "windows.hpp"
#endif

#include <stddef.h>
#include <string.h>
#include <stdlib.h>

#include "err.hpp"
#include "msg.hpp"
31
#include "session_base.hpp"
32 33 34
#include "wire.hpp"
#include "null_mechanism.hpp"

35 36 37 38 39 40 41
zmq::null_mechanism_t::null_mechanism_t (session_base_t *session_,
                                         const std::string &peer_address_,
                                         const options_t &options_) :
    mechanism_t (options_),
    session (session_),
    peer_address (peer_address_),
    ready_command_sent (false),
42
    error_command_sent (false),
43
    ready_command_received (false),
44
    error_command_received (false),
45 46 47
    zap_connected (false),
    zap_request_sent (false),
    zap_reply_received (false)
48
{
49 50 51 52
    //  NULL mechanism only uses ZAP if there's a domain defined
    //  This prevents ZAP requests on naive sockets
    if (options.zap_domain.size () > 0
    &&  session->zap_connect () == 0)
53
        zap_connected = true;
54 55 56 57 58 59
}

zmq::null_mechanism_t::~null_mechanism_t ()
{
}

60
int zmq::null_mechanism_t::next_handshake_command (msg_t *msg_)
61
{
62
    if (ready_command_sent || error_command_sent) {
63 64 65
        errno = EAGAIN;
        return -1;
    }
66 67 68 69 70 71 72 73 74 75 76 77
    if (zap_connected && !zap_reply_received) {
        if (zap_request_sent) {
            errno = EAGAIN;
            return -1;
        }
        send_zap_request ();
        zap_request_sent = true;
        const int rc = receive_and_process_zap_reply ();
        if (rc != 0)
            return -1;
        zap_reply_received = true;
    }
78

79 80
    if (zap_reply_received
    &&  strncmp (status_code, "200", sizeof status_code) != 0) {
81
        const int rc = msg_->init_size (6 + 1 + sizeof status_code);
82 83 84 85
        zmq_assert (rc == 0);
        unsigned char *msg_data =
            static_cast <unsigned char *> (msg_->data ());
        memcpy (msg_data, "\5ERROR", 6);
86 87
        msg_data [6] = sizeof status_code;
        memcpy (msg_data + 7, status_code, sizeof status_code);
88 89 90 91
        error_command_sent = true;
        return 0;
    }

92
    unsigned char *const command_buffer = (unsigned char *) malloc (512);
93 94 95 96 97
    alloc_assert (command_buffer);

    unsigned char *ptr = command_buffer;

    //  Add mechanism string
98
    memcpy (ptr, "\5READY", 6);
99
    ptr += 6;
100 101 102 103 104 105 106 107

    //  Add socket type property
    const char *socket_type = socket_type_string (options.type);
    ptr += add_property (ptr, "Socket-Type", socket_type, strlen (socket_type));

    //  Add identity property
    if (options.type == ZMQ_REQ
    ||  options.type == ZMQ_DEALER
108 109
    ||  options.type == ZMQ_ROUTER)
        ptr += add_property (ptr, "Identity", options.identity, options.identity_size);
110 111 112 113 114 115 116 117 118 119 120 121

    const size_t command_size = ptr - command_buffer;
    const int rc = msg_->init_size (command_size);
    errno_assert (rc == 0);
    memcpy (msg_->data (), command_buffer, command_size);
    free (command_buffer);

    ready_command_sent = true;

    return 0;
}

122
int zmq::null_mechanism_t::process_handshake_command (msg_t *msg_)
123
{
124
    if (ready_command_received || error_command_received) {
125 126
        //  Temporary support for security debugging
        puts ("NULL I: client sent invalid NULL handshake (duplicate READY)");
127 128 129 130
        errno = EPROTO;
        return -1;
    }

131
    const unsigned char *cmd_data =
132
        static_cast <unsigned char *> (msg_->data ());
133
    const size_t data_size = msg_->size ();
134

135 136 137 138 139 140 141
    int rc = 0;
    if (data_size >= 6 && !memcmp (cmd_data, "\5READY", 6))
        rc = process_ready_command (cmd_data, data_size);
    else
    if (data_size >= 6 && !memcmp (cmd_data, "\5ERROR", 6))
        rc = process_error_command (cmd_data, data_size);
    else {
142 143
        //  Temporary support for security debugging
        puts ("NULL I: client sent invalid NULL handshake (not READY)");
144
        errno = EPROTO;
145
        rc = -1;
146 147
    }

148 149 150 151 152
    if (rc == 0) {
        int rc = msg_->close ();
        errno_assert (rc == 0);
        rc = msg_->init ();
        errno_assert (rc == 0);
153
    }
154 155
    return rc;
}
156

157 158 159
int zmq::null_mechanism_t::process_ready_command (
        const unsigned char *cmd_data, size_t data_size)
{
160
    ready_command_received = true;
161 162
    return parse_metadata (cmd_data + 6, data_size - 6);
}
163

164 165 166
int zmq::null_mechanism_t::process_error_command (
        const unsigned char *cmd_data, size_t data_size)
{
167 168 169 170 171 172
    if (data_size < 7) {
        errno = EPROTO;
        return -1;
    }
    const size_t error_reason_len = static_cast <size_t> (cmd_data [6]);
    if (error_reason_len > data_size - 7) {
173 174 175
        errno = EPROTO;
        return -1;
    }
176
    error_command_received = true;
177
    return 0;
178 179
}

180 181 182 183 184 185 186 187 188 189 190 191
int zmq::null_mechanism_t::zap_msg_available ()
{
    if (zap_reply_received) {
        errno = EFSM;
        return -1;
    }
    const int rc = receive_and_process_zap_reply ();
    if (rc == 0)
        zap_reply_received = true;
    return rc;
}

192
zmq::mechanism_t::status_t zmq::null_mechanism_t::status () const
193
{
194 195 196 197 198 199 200
    const bool command_sent =
        ready_command_sent || error_command_sent;
    const bool command_received =
        ready_command_received || error_command_received;

    if (ready_command_sent && ready_command_received)
        return ready;
201
    else
202 203 204 205
    if (command_sent && command_received)
        return error;
    else
        return handshaking;
206
}
207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236

void zmq::null_mechanism_t::send_zap_request ()
{
    int rc;
    msg_t msg;

    //  Address delimiter frame
    rc = msg.init ();
    errno_assert (rc == 0);
    msg.set_flags (msg_t::more);
    rc = session->write_zap_msg (&msg);
    errno_assert (rc == 0);

    //  Version frame
    rc = msg.init_size (3);
    errno_assert (rc == 0);
    memcpy (msg.data (), "1.0", 3);
    msg.set_flags (msg_t::more);
    rc = session->write_zap_msg (&msg);
    errno_assert (rc == 0);

    //  Request id frame
    rc = msg.init_size (1);
    errno_assert (rc == 0);
    memcpy (msg.data (), "1", 1);
    msg.set_flags (msg_t::more);
    rc = session->write_zap_msg (&msg);
    errno_assert (rc == 0);

    //  Domain frame
237
    rc = msg.init_size (options.zap_domain.length ());
238
    errno_assert (rc == 0);
239
    memcpy (msg.data (), options.zap_domain.c_str (), options.zap_domain.length ());
240 241 242 243 244 245 246 247 248 249 250 251
    msg.set_flags (msg_t::more);
    rc = session->write_zap_msg (&msg);
    errno_assert (rc == 0);

    //  Address frame
    rc = msg.init_size (peer_address.length ());
    errno_assert (rc == 0);
    memcpy (msg.data (), peer_address.c_str (), peer_address.length ());
    msg.set_flags (msg_t::more);
    rc = session->write_zap_msg (&msg);
    errno_assert (rc == 0);

252
    //  Identity frame
253 254 255 256 257 258 259
    rc = msg.init_size (options.identity_size);
    errno_assert (rc == 0);
    memcpy (msg.data (), options.identity, options.identity_size);
    msg.set_flags (msg_t::more);
    rc = session->write_zap_msg (&msg);
    errno_assert (rc == 0);

260
    //  Mechanism frame
261
    rc = msg.init_size (4);
262
    errno_assert (rc == 0);
263
    memcpy (msg.data (), "NULL", 4);
264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283
    rc = session->write_zap_msg (&msg);
    errno_assert (rc == 0);
}

int zmq::null_mechanism_t::receive_and_process_zap_reply ()
{
    int rc = 0;
    msg_t msg [7];  //  ZAP reply consists of 7 frames

    //  Initialize all reply frames
    for (int i = 0; i < 7; i++) {
        rc = msg [i].init ();
        errno_assert (rc == 0);
    }

    for (int i = 0; i < 7; i++) {
        rc = session->read_zap_msg (&msg [i]);
        if (rc == -1)
            break;
        if ((msg [i].flags () & msg_t::more) == (i < 6? 0: msg_t::more)) {
284 285
            //  Temporary support for security debugging
            puts ("NULL I: ZAP handler sent incomplete reply message");
286 287 288 289 290 291 292 293 294 295 296
            errno = EPROTO;
            rc = -1;
            break;
        }
    }

    if (rc != 0)
        goto error;

    //  Address delimiter frame
    if (msg [0].size () > 0) {
297 298
        //  Temporary support for security debugging
        puts ("NULL I: ZAP handler sent malformed reply message");
299
        errno = EPROTO;
300
        rc = -1;
301 302 303 304 305
        goto error;
    }

    //  Version frame
    if (msg [1].size () != 3 || memcmp (msg [1].data (), "1.0", 3)) {
306 307
        //  Temporary support for security debugging
        puts ("NULL I: ZAP handler sent bad version number");
308
        errno = EPROTO;
309
        rc = -1;
310 311 312 313 314
        goto error;
    }

    //  Request id frame
    if (msg [2].size () != 1 || memcmp (msg [2].data (), "1", 1)) {
315 316
        //  Temporary support for security debugging
        puts ("NULL I: ZAP handler sent bad request ID");
317
        errno = EPROTO;
318
        rc = -1;
319 320 321 322
        goto error;
    }

    //  Status code frame
323
    if (msg [3].size () != 3) {
324 325
        //  Temporary support for security debugging
        puts ("NULL I: ZAP handler rejected client authentication");
326
        errno = EPROTO;
327
        rc = -1;
328 329 330
        goto error;
    }

331 332 333
    //  Save status code
    memcpy (status_code, msg [3].data (), sizeof status_code);

334 335 336
    //  Save user id
    set_user_id (msg [5].data (), msg [5].size ());

337 338
    //  Process metadata frame
    rc = parse_metadata (static_cast <const unsigned char*> (msg [6].data ()),
339
                         msg [6].size (), true);
340 341 342 343 344 345 346 347 348

error:
    for (int i = 0; i < 7; i++) {
        const int rc2 = msg [i].close ();
        errno_assert (rc2 == 0);
    }

    return rc;
}