2 * Copyright (C) 1997-2006 Andre Noll <maan@systemlinux.org>
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License as published by
6 * the Free Software Foundation; either version 2 of the License, or
7 * (at your option) any later version.
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, write to the Free Software
16 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111, USA.
19 /** \file client.c the client program used to connect to para_server */
23 #include "client.cmdline.h"
26 #include <openssl/rc4.h>
31 enum {CL_CONNECTED, CL_SENT_AUTH, CL_RECEIVED_CHALLENGE, CL_SENT_CH_RESPONSE,
32 CL_RECEIVED_PROCEED, CL_SENT_COMMAND, CL_SENDING_STDIN, CL_RECV_DATA};
34 struct private_client_data {
37 struct client_args_info conf;
49 static struct private_client_data *pcd;
54 void para_log(int ll, const char* fmt,...)
58 /* ignore log message if loglevel is not high enough */
59 if (pcd && ll < pcd->conf.loglevel_arg)
62 vfprintf(stderr, fmt, argp);
66 static void client_close(struct private_client_data *pcd)
73 free(pcd->config_file);
78 static int client_parse_config(int argc, char *argv[],
79 struct private_client_data **pcd_ptr)
81 char *home = para_homedir();
84 struct private_client_data *p =
85 para_calloc(sizeof(struct private_client_data));
88 cmdline_parser(argc, argv, &p->conf);
89 ret = - E_CLIENT_SYNTAX;
90 if (!p->conf.inputs_num)
92 p->user = p->conf.user_given?
93 para_strdup(p->conf.user_arg) : para_logname();
95 p->key_file = p->conf.key_file_given?
96 para_strdup(p->conf.key_file_arg) :
97 make_message("%s/.paraslash/key.%s", home, p->user);
99 p->config_file = p->conf.config_file_given?
100 para_strdup(p->conf.config_file_arg) :
101 make_message("%s/.paraslash/client.conf", home);
102 ret = stat(p->config_file, &statbuf);
103 if (ret && p->conf.config_file_given) {
108 cmdline_parser_configfile(p->config_file, &p->conf, 0, 0, 0);
119 static RC4_KEY rc4_recv_key;
120 static RC4_KEY rc4_send_key;
121 static unsigned char rc4_buf[2 * RC4_KEY_LEN];
123 static void rc4_send(unsigned long len, const unsigned char *indata, unsigned char *outdata)
125 RC4(&rc4_send_key, len, indata, outdata);
128 static void rc4_recv(unsigned long len, const unsigned char *indata, unsigned char *outdata)
130 RC4(&rc4_recv_key, len, indata, outdata);
132 void (*crypt_function_recv)(unsigned long len, const unsigned char *indata, unsigned char *outdata);
133 void (*crypt_function_send)(unsigned long len, const unsigned char *indata, unsigned char *outdata);
136 static void append_str(char **data, const char* append)
139 char *tmp = make_message("%s\n%s", *data, append);
143 *data = para_strdup(append);
147 static int send_stdin(int fd)
152 PARA_NOTICE_LOG("%s", "sending stdin\n");
154 ret = read(STDIN_FILENO, buf, sizeof(buf));
157 ret = send_bin_buffer(fd, buf, ret);
167 int main(int argc, char *argv[])
170 int numbytes, i, received, ret;
172 struct sockaddr_in their_addr;
173 char *command = NULL;
176 long unsigned challenge_nr;
178 ret = client_parse_config(argc, argv, &pcd);
181 if (pcd->conf.loglevel_arg <= NOTICE)
182 cmdline_parser_print_version();
184 "current loglevel: %d\n"
185 "using config_file: %s\n"
186 "using key_file: %s\n"
187 "connecting to %s:%d\n",
188 pcd->conf.loglevel_arg,
191 pcd->conf.hostname_arg,
192 pcd->conf.server_port_arg
195 for (i = 0; i < pcd->conf.inputs_num; i++)
196 append_str(&command, pcd->conf.inputs[i]);
197 crypt_function_recv = NULL;
198 crypt_function_send = NULL;
199 /* get the host info */
200 PARA_NOTICE_LOG("getting host info of %s\n",
201 pcd->conf.hostname_arg);
202 ret = get_host_info(pcd->conf.hostname_arg, &he);
210 /* init their_addr */
211 init_sockaddr(&their_addr, pcd->conf.server_port_arg, he);
213 PARA_NOTICE_LOG("connecting to %s\n", pcd->conf.hostname_arg);
214 ret = para_connect(pcd->fd, &their_addr);
217 /* receive welcome message */
218 ret = recv_buffer(pcd->fd, buf, sizeof(buf));
221 /* send auth command */
222 auth_str = make_message("auth %s%s", pcd->conf.plain_given? "" : "rc4 ",
224 PARA_INFO_LOG("<-- %s--> %s\n", buf, auth_str);
225 ret = send_buffer(pcd->fd, auth_str);
228 /* receive challenge number */
229 ret = recv_buffer(pcd->fd, buf, sizeof(buf));
233 ret = -E_INVALID_CHALLENGE;
234 PARA_ERROR_LOG("received the following: %s\n", buf);
237 PARA_INFO_LOG("%s", "<-- [challenge]\n");
238 /* decrypt challenge number */
239 ret = para_decrypt_challenge(pcd->key_file, &challenge_nr,
240 (unsigned char *) buf, 64);
243 /* send decrypted challenge */
244 PARA_INFO_LOG("--> %lu\n", challenge_nr);
245 ret = send_va_buffer(pcd->fd, "%s%lu", CHALLENGE_RESPONSE_MSG, challenge_nr);
248 /* wait for approval */
249 PARA_NOTICE_LOG("%s", "waiting for approval from server\n");
250 ret = recv_buffer(pcd->fd, buf, sizeof(buf));
254 PARA_INFO_LOG("++++ server info ++++\n%s\n++++ end of server "
256 /* check if server has sent "Proceed" message */
257 ret = -E_CLIENT_AUTH;
258 if (!strstr(buf, PROCEED_MSG))
260 if (numbytes >= PROCEED_MSG_LEN + 32) {
261 PARA_INFO_LOG("%s", "decrypting session key\n");
262 ret = para_decrypt_buffer(pcd->key_file, rc4_buf,
263 (unsigned char *)buf + PROCEED_MSG_LEN + 1,
264 numbytes - PROCEED_MSG_LEN - 1);
267 RC4_set_key(&rc4_send_key, RC4_KEY_LEN, rc4_buf);
268 RC4_set_key(&rc4_recv_key, RC4_KEY_LEN, rc4_buf + RC4_KEY_LEN);
269 PARA_INFO_LOG("rc4 encrytion activated: %x:%x:%x:%x\n",
270 rc4_buf[0], rc4_buf[1], rc4_buf[2], rc4_buf[3]);
271 crypt_function_recv = rc4_recv;
272 crypt_function_send = rc4_send;
275 PARA_INFO_LOG("--> %s\n", command);
276 ret = send_buffer(pcd->fd, command);
281 ret = send_buffer(pcd->fd, EOC_MSG "\n");
284 PARA_NOTICE_LOG("%s", "command sent.\n");
287 ret = recv_bin_buffer(pcd->fd, buf, sizeof(buf) - 1);
290 PARA_NOTICE_LOG("%s", "connection closed by peer\n");
295 if (!received && strstr(buf, AWAITING_DATA_MSG)) {
296 ret = send_stdin(pcd->fd);
300 ret = write(STDOUT_FILENO, buf, numbytes);
301 if (ret != numbytes) {
302 ret = -E_SHORT_CLIENT_WRITE;
309 PARA_ERROR_LOG("%s\n", PARA_STRERROR(-ret));
310 return ret >= 0? EXIT_SUCCESS: EXIT_FAILURE;