start working on encryption

This commit is contained in:
Ferdinand Schober
2024-09-02 15:35:52 +02:00
committed by Ferdinand Schober
parent 0d074e19f1
commit 79bc64e56e
9 changed files with 1263 additions and 92 deletions

5
.gitignore vendored
View File

@@ -4,4 +4,7 @@
.vs/
.vscode/
.direnv/
result
result
*.pem
*.csr
extfile.conf

1043
Cargo.lock generated

File diff suppressed because it is too large Load Diff

View File

@@ -52,6 +52,14 @@ slab = "0.4.9"
thiserror = "2.0.0"
tokio-util = "0.7.11"
local-channel = "0.1.5"
webrtc-dtls = "0.10.0"
webrtc-util = "0.9.0"
rustls = { version = "0.23.12", default-features = false, features = [
"std",
"ring",
] }
rcgen = "0.13.1"
rustls-pemfile = "2.1.3"
[target.'cfg(unix)'.dependencies]
libc = "0.2.148"

74
gen-key.sh Executable file
View File

@@ -0,0 +1,74 @@
export SERVER_NAME="$1"
export CLIENT_NAME="$2"
export EXTFILE='extfile.conf'
if [ -z "${CLIENT_NAME}" ]; then
echo "usage: $0 <client-name> <server-name>" >&2
exit 1
fi
if [ -z "${SERVER_NAME}" ]; then
echo "usage: $0 <client-name> <server-name>" >&2
exit 1
fi
echo 'subjectAltName = DNS:iridium' > "${EXTFILE}"
# server
## generate EC private key
openssl ecparam \
-name prime256v1 \
-genkey \
-noout \
-out "${SERVER_NAME}.pem"
## generate certificate signing request
openssl req \
-new \
-key "${SERVER_NAME}.pem" \
-sha256 \
-subj '/C=NL' \
-out "${SERVER_NAME}.csr"
## generate CA certificate (server public key)
openssl x509 \
-req \
-in "${SERVER_NAME}.csr" \
-extfile "${EXTFILE}" \
-days 365 \
-signkey "${SERVER_NAME}.pem" \
-sha256 \
-out "${SERVER_NAME}.pub.pem"
# client
## generate client private key
openssl ecparam \
-name prime256v1 \
-genkey \
-noout \
-out "${CLIENT_NAME}.pem"
## generate client csr (= public key)
openssl req \
-key "${CLIENT_NAME}.pem" \
-new -sha256 \
-subj '/C=NL' \
-out "${CLIENT_NAME}.csr"
## generate client certificate (=public key signed by CA)
openssl x509 \
-req \
-in "${CLIENT_NAME}.csr" \
-extfile "${EXTFILE}" \
-days 365 \
-CA "${SERVER_NAME}.pub.pem" \
-CAkey "${SERVER_NAME}.pem" \
-set_serial '0xabcd' \
-sha256 -out "${CLIENT_NAME}.pub.pem"
# cleanup
rm "${EXTFILE}" \
"${SERVER_NAME}.csr" \
"${CLIENT_NAME}.csr"

69
src/crypto.rs Normal file
View File

@@ -0,0 +1,69 @@
use std::io::{self, Read};
use std::path::PathBuf;
use std::{fs::File, io::BufReader};
use rcgen::KeyPair;
use rustls::pki_types::CertificateDer;
use thiserror::Error;
use webrtc_dtls::crypto::{Certificate, CryptoPrivateKey};
#[derive(Debug, Error)]
pub enum Error {
#[error("block is not a private key, unable to load key")]
ErrBlockIsNotPrivateKey,
#[error("unknown key time in PKCS#8 wrapping, unable to load key")]
ErrUnknownKeyTime,
#[error("no private key found, unable to load key")]
ErrNoPrivateKeyFound,
#[error("block is not a certificate, unable to load certificates")]
ErrBlockIsNotCertificate,
#[error("no certificate found, unable to load certificates")]
ErrNoCertificateFound,
#[error(transparent)]
Io(#[from] io::Error),
#[error(transparent)]
Dtls(#[from] webrtc_dtls::Error),
#[error("{0}")]
Other(String),
}
/// load_key_and_certificate reads certificates or key from file
pub fn load_key_and_certificate(
key_path: PathBuf,
certificate_path: PathBuf,
) -> Result<Certificate, Error> {
let private_key = load_key(key_path)?;
let certificate = load_certificate(certificate_path)?;
Ok(Certificate {
certificate,
private_key,
})
}
/// load_key Load/read key from file
pub fn load_key(path: PathBuf) -> Result<CryptoPrivateKey, Error> {
let f = File::open(path)?;
let mut reader = BufReader::new(f);
let mut buf = vec![];
reader.read_to_end(&mut buf)?;
let s = String::from_utf8(buf).expect("utf8 of file");
let key_pair = KeyPair::from_pem(s.as_str()).expect("key pair in file");
Ok(CryptoPrivateKey::from_key_pair(&key_pair).expect("crypto key pair"))
}
/// load_certificate Load/read certificate(s) from file
pub fn load_certificate(path: PathBuf) -> Result<Vec<CertificateDer<'static>>, Error> {
let f = File::open(path)?;
let mut reader = BufReader::new(f);
match rustls_pemfile::certs(&mut reader).collect::<Result<Vec<_>, _>>() {
Ok(certs) => Ok(certs.into_iter().map(CertificateDer::from).collect()),
Err(_) => Err(Error::ErrNoCertificateFound),
}
}

View File

@@ -4,4 +4,5 @@ pub mod dns;
pub mod server;
pub mod capture_test;
pub mod crypto;
pub mod emulation_test;

6
src/plugin.rs Normal file
View File

@@ -0,0 +1,6 @@
use input_capture::CaptureEvent;
struct PluginManager {
capture_hook: Vec<Box<dyn Fn(CaptureEvent)>>,
capture_transform: Vec<Box<dyn Fn(CaptureEvent) -> CaptureEvent>>,
}

View File

@@ -159,6 +159,7 @@ async fn handle_capture_event(
/* released capture */
State::Receiving => ProtoEvent::Leave(0),
};
log::error!("SENDING: {event:?} -> {addr:?}");
sender_tx.send((event, addr)).expect("sender closed");
};

View File

@@ -1,8 +1,19 @@
use local_channel::mpsc::{Receiver, Sender};
use std::{io, net::SocketAddr};
use std::{cell::RefCell, collections::HashMap, io, net::SocketAddr, rc::Rc, sync::Arc};
use webrtc_dtls::{
config::{ClientAuthType, Config, ExtendedMasterSecretType},
conn::DTLSConn,
listener::listen,
};
use webrtc_util::{conn::Listener, Conn};
use thiserror::Error;
use tokio::{net::UdpSocket, task::JoinHandle};
use tokio::{
net::UdpSocket,
task::{spawn_local, JoinHandle},
};
use crate::crypto;
use super::Server;
use lan_mouse_proto::{ProtoEvent, ProtocolError};
@@ -14,64 +25,94 @@ pub(crate) async fn new(
) -> io::Result<JoinHandle<()>> {
// bind the udp socket
let listen_addr = SocketAddr::new("0.0.0.0".parse().unwrap(), server.port.get());
let mut socket = UdpSocket::bind(listen_addr).await?;
Ok(tokio::task::spawn_local(async move {
let mut sender_rx = udp_send_rx;
Ok(spawn_local(async move {
let sender_rx = Rc::new(RefCell::new(udp_send_rx));
loop {
let udp_receiver = udp_receiver(&socket, &udp_recv_tx);
let udp_sender = udp_sender(&socket, &mut sender_rx);
let udp_receiver = spawn_local(listen_dtls(listen_addr, udp_recv_tx.clone()));
let udp_sender = spawn_local(udp_sender(sender_rx.clone()));
log::info!("starting sender + receiver");
tokio::select! {
_ = udp_receiver => break, /* channel closed */
e = udp_receiver => panic!("{e:?}"), /* channel closed */
_ = udp_sender => break, /* channel closed */
_ = server.notifies.port_changed.notified() => update_port(&server, &mut socket).await,
_ = server.cancelled() => break, /* cancellation requested */
}
}
}))
}
async fn update_port(server: &Server, socket: &mut UdpSocket) {
let new_port = server.port.get();
let current_port = socket.local_addr().expect("socket not bound").port();
// if port is the same, we dont need to change it
if current_port == new_port {
return;
async fn listen_dtls(
listen_addr: SocketAddr,
udp_recv_tx: Sender<Result<(ProtoEvent, SocketAddr), NetworkError>>,
) -> Result<(), NetworkError> {
let server_cert = crypto::load_key_and_certificate("alice.pem".into(), "alice.pub.pem".into())?;
let mut cert_pool = rustls::RootCertStore::empty();
let certs = crypto::load_certificate("alice.pub.pem".into())?;
for cert in certs.into_iter() {
cert_pool.add(cert)?;
}
// bind new socket
let listen_addr = SocketAddr::new("0.0.0.0".parse().unwrap(), new_port);
let new_socket = UdpSocket::bind(listen_addr).await;
let err = match new_socket {
Ok(new_socket) => {
*socket = new_socket;
None
}
Err(e) => Some(e.to_string()),
let cfg = Config {
certificates: vec![server_cert],
extended_master_secret: ExtendedMasterSecretType::Require,
client_auth: ClientAuthType::RequireAndVerifyClientCert,
client_cas: cert_pool,
..Default::default()
};
// notify frontend of the actual port
let port = socket.local_addr().expect("socket not bound").port();
server.notify_port_changed(port, err);
}
async fn udp_receiver(
socket: &UdpSocket,
receiver_tx: &Sender<Result<(ProtoEvent, SocketAddr), NetworkError>>,
) {
let listener = Arc::new(listen(listen_addr, cfg).await?);
loop {
let event = receive_event(socket).await;
receiver_tx.send(event).expect("channel closed");
while let Ok((conn, addr)) = listener.accept().await {
let udp_recv_tx = udp_recv_tx.clone();
spawn_local(async move {
loop {
let mut buf = [0u8; lan_mouse_proto::MAX_EVENT_SIZE];
let event: Result<_, NetworkError> = match conn.recv(&mut buf).await {
Ok(_len) => match ProtoEvent::try_from(buf) {
Ok(e) => Ok((e, addr)),
Err(e) => Err(e.into()),
},
Err(e) => Err(e.into()),
};
udp_recv_tx.send(event).expect("channel closed");
}
});
}
}
}
async fn udp_sender(socket: &UdpSocket, rx: &mut Receiver<(ProtoEvent, SocketAddr)>) {
async fn udp_sender(rx: Rc<RefCell<Receiver<(ProtoEvent, SocketAddr)>>>) {
let mut connection_pool: HashMap<SocketAddr, DTLSConn> = HashMap::new();
loop {
let (event, addr) = rx.recv().await.expect("channel closed");
if let Err(e) = send_event(socket, event, addr) {
log::warn!("udp send failed: {e}");
log::error!("waiting for event to send ...");
let (event, addr) = rx.borrow_mut().recv().await.expect("channel closed");
log::error!("{:20} ------>->->-> {addr}", event.to_string());
if !connection_pool.contains_key(&addr) {
let socket = Arc::new(UdpSocket::bind("0.0.0.0:0").await.unwrap());
socket.connect(addr).await.unwrap();
let certificate =
crypto::load_key_and_certificate("bob.pem".into(), "bob.pub.pem".into()).unwrap();
let mut cert_pool = rustls::RootCertStore::empty();
let certs = crypto::load_certificate("alice.pub.pem".into()).unwrap();
for cert in certs.into_iter() {
cert_pool.add(cert.to_owned()).unwrap();
}
let config = Config {
certificates: vec![certificate],
extended_master_secret: ExtendedMasterSecretType::Require,
roots_cas: cert_pool,
server_name: "webrtc.rs".to_owned(),
..Default::default()
};
log::error!("connecting to {addr}");
let conn = DTLSConn::new(socket, config, true, None).await.unwrap();
log::error!("connected {addr}!");
connection_pool.insert(addr, conn);
};
let conn = connection_pool.get(&addr).unwrap();
log::error!("{:20} ------>->->-> {addr}", event.to_string());
let (data, len): ([u8; lan_mouse_proto::MAX_EVENT_SIZE], usize) = event.into();
// When udp blocks, we dont want to block the event loop.
// Dropping events is better than potentially crashing the input capture.
conn.send_to(&data[..len], addr).await.unwrap();
}
}
@@ -81,19 +122,12 @@ pub(crate) enum NetworkError {
Protocol(#[from] ProtocolError),
#[error("network error: `{0}`")]
Io(#[from] io::Error),
}
async fn receive_event(socket: &UdpSocket) -> Result<(ProtoEvent, SocketAddr), NetworkError> {
let mut buf = [0u8; lan_mouse_proto::MAX_EVENT_SIZE];
let (_len, src) = socket.recv_from(&mut buf).await?;
let event = ProtoEvent::try_from(buf)?;
Ok((event, src))
}
fn send_event(sock: &UdpSocket, e: ProtoEvent, addr: SocketAddr) -> Result<usize, NetworkError> {
log::trace!("{:20} ------>->->-> {addr}", e.to_string());
let (data, len): ([u8; lan_mouse_proto::MAX_EVENT_SIZE], usize) = e.into();
// When udp blocks, we dont want to block the event loop.
// Dropping events is better than potentially crashing the input capture.
Ok(sock.try_send_to(&data[..len], addr)?)
#[error(transparent)]
Crypt(#[from] crypto::Error),
#[error(transparent)]
Rustls(#[from] rustls::Error),
#[error(transparent)]
WebrtcDtls(#[from] webrtc_dtls::Error),
#[error(transparent)]
WebrtcUtil(#[from] webrtc_util::Error),
}