5 Author: Pekka Riikonen <priikone@poseidon.pspt.fi>
7 Copyright (C) 1997 - 2001 Pekka Riikonen
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 2 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
21 * This is the actual SILC server than handles everything relating to
22 * servicing the SILC connections. This is also a SILC router as a router
23 * is also normal server.
27 #include "serverincludes.h"
28 #include "server_internal.h"
30 /* Static prototypes */
31 SILC_TASK_CALLBACK(silc_server_connect_router);
32 SILC_TASK_CALLBACK(silc_server_connect_to_router);
33 SILC_TASK_CALLBACK(silc_server_connect_to_router_second);
34 SILC_TASK_CALLBACK(silc_server_connect_to_router_final);
35 SILC_TASK_CALLBACK(silc_server_accept_new_connection);
36 SILC_TASK_CALLBACK(silc_server_accept_new_connection_second);
37 SILC_TASK_CALLBACK(silc_server_accept_new_connection_final);
38 SILC_TASK_CALLBACK(silc_server_packet_process);
39 SILC_TASK_CALLBACK(silc_server_packet_parse_real);
40 SILC_TASK_CALLBACK(silc_server_timeout_remote);
41 SILC_TASK_CALLBACK(silc_server_failure_callback);
43 /* Allocates a new SILC server object. This has to be done before the server
44 can be used. After allocation one must call silc_server_init to initialize
45 the server. The new allocated server object is returned to the new_server
48 int silc_server_alloc(SilcServer *new_server)
52 SILC_LOG_DEBUG(("Allocating new server object"));
54 server = silc_calloc(1, sizeof(*server));
55 server->server_type = SILC_SERVER;
56 server->standalone = TRUE;
57 server->local_list = silc_calloc(1, sizeof(*server->local_list));
58 server->global_list = silc_calloc(1, sizeof(*server->global_list));
59 server->pending_commands = silc_dlist_init();
61 server->sim = silc_dlist_init();
69 /* Free's the SILC server object. This is called at the very end before
72 void silc_server_free(SilcServer server)
79 if (server->local_list)
80 silc_free(server->local_list);
81 if (server->global_list)
82 silc_free(server->global_list);
84 silc_rng_free(server->rng);
87 while ((sim = silc_dlist_get(server->sim)) != SILC_LIST_END) {
88 silc_dlist_del(server->sim, sim);
91 silc_dlist_uninit(server->sim);
95 silc_free(server->params);
97 if (server->pending_commands)
98 silc_dlist_uninit(server->pending_commands);
104 /* Initializes the entire SILC server. This is called always before running
105 the server. This is called only once at the initialization of the program.
106 This binds the server to its listenning port. After this function returns
107 one should call silc_server_run to start the server. This returns TRUE
108 when everything is ok to run the server. Configuration file must be
109 read and parsed before calling this. */
111 int silc_server_init(SilcServer server)
113 int *sock = NULL, sock_count = 0, i;
115 SilcServerEntry id_entry;
117 SILC_LOG_DEBUG(("Initializing server"));
119 assert(server->config);
121 /* XXX After server is made as Silc Server Library this can be given
122 as argument, for now this is hard coded */
123 server->params = silc_calloc(1, sizeof(*server->params));
124 server->params->retry_count = SILC_SERVER_RETRY_COUNT;
125 server->params->retry_interval_min = SILC_SERVER_RETRY_INTERVAL_MIN;
126 server->params->retry_interval_max = SILC_SERVER_RETRY_INTERVAL_MAX;
127 server->params->retry_keep_trying = FALSE;
128 server->params->protocol_timeout = 60;
129 server->params->require_reverse_mapping = FALSE;
131 /* Set log files where log message should be saved. */
132 server->config->server = server;
133 silc_server_config_setlogfiles(server->config);
135 /* Register all configured ciphers, PKCS and hash functions. */
136 silc_server_config_register_ciphers(server->config);
137 silc_server_config_register_pkcs(server->config);
138 silc_server_config_register_hashfuncs(server->config);
139 silc_server_config_register_hmacs(server->config);
141 /* Initialize random number generator for the server. */
142 server->rng = silc_rng_alloc();
143 silc_rng_init(server->rng);
144 silc_rng_global_init(server->rng);
146 /* Initialize hash functions for server to use */
147 silc_hash_alloc("md5", &server->md5hash);
148 silc_hash_alloc("sha1", &server->sha1hash);
150 /* Initialize none cipher */
151 silc_cipher_alloc("none", &server->none_cipher);
153 /* XXXXX Generate RSA key pair */
155 unsigned char *public_key;
156 unsigned char *private_key;
157 unsigned int pk_len, prv_len;
160 if (stat("pubkey.pub", &st) < 0 && stat("privkey.prv", &st) < 0) {
162 if (silc_pkcs_alloc("rsa", &server->pkcs) == FALSE) {
163 SILC_LOG_ERROR(("Could not create RSA key pair"));
167 if (server->pkcs->pkcs->init(server->pkcs->context,
168 1024, server->rng) == FALSE) {
169 SILC_LOG_ERROR(("Could not generate RSA key pair"));
173 public_key = server->pkcs->pkcs->get_public_key(server->pkcs->context,
175 private_key = server->pkcs->pkcs->get_private_key(server->pkcs->context,
178 SILC_LOG_HEXDUMP(("public key"), public_key, pk_len);
179 SILC_LOG_HEXDUMP(("private key"), private_key, prv_len);
182 silc_pkcs_public_key_alloc("rsa", "UN=root, HN=dummy",
184 server->private_key =
185 silc_pkcs_private_key_alloc("rsa", private_key, prv_len);
188 silc_pkcs_save_public_key("pubkey.pub", server->public_key,
190 silc_pkcs_save_private_key("privkey.prv", server->private_key, NULL,
193 memset(public_key, 0, pk_len);
194 memset(private_key, 0, prv_len);
195 silc_free(public_key);
196 silc_free(private_key);
198 silc_pkcs_load_public_key("pubkey.pub", &server->public_key,
200 silc_pkcs_load_private_key("privkey.prv", &server->private_key,
205 /* Create a listening server. Note that our server can listen on
206 multiple ports. All listeners are created here and now. */
207 /* XXX Still check this whether to use server_info or listen_port. */
209 while(server->config->listen_port) {
212 tmp = silc_net_create_server(server->config->listen_port->port,
213 server->config->listen_port->host);
217 sock = silc_realloc(sock, (sizeof(int *) * (sock_count + 1)));
218 sock[sock_count] = tmp;
219 server->config->listen_port = server->config->listen_port->next;
223 /* Initialize ID caches */
224 server->local_list->clients =
225 silc_idcache_alloc(0, silc_idlist_client_destructor);
226 server->local_list->servers = silc_idcache_alloc(0, NULL);
227 server->local_list->channels = silc_idcache_alloc(0, NULL);
229 /* These are allocated for normal server as well as these hold some
230 global information that the server has fetched from its router. For
231 router these are used as they are supposed to be used on router. */
232 server->global_list->clients =
233 silc_idcache_alloc(0, silc_idlist_client_destructor);
234 server->global_list->servers = silc_idcache_alloc(0, NULL);
235 server->global_list->channels = silc_idcache_alloc(0, NULL);
237 /* Allocate the entire socket list that is used in server. Eventually
238 all connections will have entry in this table (it is a table of
239 pointers to the actual object that is allocated individually
241 server->sockets = silc_calloc(SILC_SERVER_MAX_CONNECTIONS,
242 sizeof(*server->sockets));
244 for (i = 0; i < sock_count; i++) {
245 SilcSocketConnection newsocket = NULL;
247 /* Set socket to non-blocking mode */
248 silc_net_set_socket_nonblock(sock[i]);
249 server->sock = sock[i];
251 /* Create a Server ID for the server. */
252 silc_id_create_server_id(sock[i], server->rng, &id);
258 server->id_string = silc_id_id2str(id, SILC_ID_SERVER);
259 server->id_string_len = silc_id_get_len(SILC_ID_SERVER);
260 server->id_type = SILC_ID_SERVER;
261 server->server_name = server->config->server_info->server_name;
263 /* Add ourselves to the server list. We don't have a router yet
264 beacuse we haven't established a route yet. It will be done later.
265 For now, NULL is sent as router. This allocates new entry to
268 silc_idlist_add_server(server->local_list,
269 server->config->server_info->server_name,
270 server->server_type, server->id, NULL, NULL);
272 SILC_LOG_ERROR(("Could not add ourselves to cache"));
276 /* Add ourselves also to the socket table. The entry allocated above
277 is sent as argument for fast referencing in the future. */
278 silc_socket_alloc(sock[i], SILC_SOCKET_TYPE_SERVER, id_entry,
281 server->sockets[sock[i]] = newsocket;
283 /* Put the allocated socket pointer also to the entry allocated above
284 for fast back-referencing to the socket list. */
285 id_entry->connection = (void *)server->sockets[sock[i]];
286 server->id_entry = id_entry;
289 /* Register the task queues. In SILC we have by default three task queues.
290 One task queue for non-timeout tasks which perform different kind of
291 I/O on file descriptors, timeout task queue for timeout tasks, and,
292 generic non-timeout task queue whose tasks apply to all connections. */
293 silc_task_queue_alloc(&server->io_queue, TRUE);
294 if (!server->io_queue) {
297 silc_task_queue_alloc(&server->timeout_queue, TRUE);
298 if (!server->timeout_queue) {
301 silc_task_queue_alloc(&server->generic_queue, TRUE);
302 if (!server->generic_queue) {
306 /* Register protocols */
307 silc_server_protocols_register();
309 /* Initialize the scheduler */
310 silc_schedule_init(&server->io_queue, &server->timeout_queue,
311 &server->generic_queue,
312 SILC_SERVER_MAX_CONNECTIONS);
314 /* Add the first task to the queue. This is task that is executed by
315 timeout. It expires as soon as the caller calls silc_server_run. This
316 task performs authentication protocol and key exchange with our
318 silc_task_register(server->timeout_queue, sock[0],
319 silc_server_connect_to_router,
320 (void *)server, 0, 1,
322 SILC_TASK_PRI_NORMAL);
324 /* Add listener task to the queue. This task receives new connections to the
325 server. This task remains on the queue until the end of the program. */
326 silc_task_register(server->io_queue, sock[0],
327 silc_server_accept_new_connection,
328 (void *)server, 0, 0,
330 SILC_TASK_PRI_NORMAL);
331 server->listenning = TRUE;
333 /* If server connections has been configured then we must be router as
334 normal server cannot have server connections, only router connections. */
335 if (server->config->servers)
336 server->server_type = SILC_ROUTER;
338 SILC_LOG_DEBUG(("Server initialized"));
340 /* We are done here, return succesfully */
343 silc_task_queue_free(server->timeout_queue);
345 silc_task_queue_free(server->io_queue);
347 for (i = 0; i < sock_count; i++)
348 silc_net_close_server(sock[i]);
353 /* Fork server to background and set gid+uid to non-root.
354 Silcd will not run as root, so trying to set either user or group to
355 root will cause silcd to exit. */
357 void silc_server_daemonise(SilcServer server)
359 /* Are we executing silcd as root or a regular user? */
366 if (!server->config->identity || !server->config->identity->user ||
367 !server->config->identity->group) {
368 fprintf(stderr, "Error:"
369 "\tSILC server must not be run as root. For the security of your\n"
370 "\tsystem it is strongly suggested that you run SILC under dedicated\n"
371 "\tuser account. Modify the [Identity] configuration section to run\n"
372 "\tthe server as non-root user.\n");
376 /* Get the values given for user and group in configuration file */
377 user=server->config->identity->user;
378 group=server->config->identity->group;
380 /* Check whether the user/group information is text */
381 if (atoi(user)!=0 || atoi(group)!=0) {
382 SILC_LOG_DEBUG(("Invalid user and/or group information"));
383 SILC_LOG_DEBUG(("User and/or group given as number"));
384 fprintf(stderr, "Invalid user and/or group information\n");
385 fprintf(stderr, "Please assign them as names, not numbers\n");
389 /* Catch the nasty incident of string "0" returning 0 from atoi */
390 if (strcmp("0", user)==0 || strcmp("0", group)==0) {
391 SILC_LOG_DEBUG(("User and/or group configured to 0. Unacceptable"));
392 fprintf(stderr, "User and/or group configured to 0. Exiting\n");
400 fprintf(stderr, "No such user %s found\n", user);
405 fprintf(stderr, "No such group %s found\n", group);
409 /* Check whether user and/or group is set to root. If yes, exit
410 immediately. Otherwise, setgid and setuid server to user.group */
411 if (gr->gr_gid==0 || pw->pw_uid==0) {
412 fprintf(stderr, "Error:"
413 "\tSILC server must not be run as root. For the security of your\n"
414 "\tsystem it is strongly suggested that you run SILC under dedicated\n"
415 "\tuser account. Modify the [Identity] configuration section to run\n"
416 "\tthe server as non-root user.\n");
419 /* Fork server to background, making it a daemon */
421 SILC_LOG_DEBUG(("Server started as root. Dropping privileges."));
422 SILC_LOG_DEBUG(("Forking SILC server to background"));
427 SILC_LOG_DEBUG(("Changing to group %s", group));
428 if(setgid(gr->gr_gid)==0) {
429 SILC_LOG_DEBUG(("Setgid to %s", group));
431 SILC_LOG_DEBUG(("Setgid to %s failed", group));
432 fprintf(stderr, "Tried to setgid %s but no such group. Exiting\n",
436 SILC_LOG_DEBUG(("Changing to user nobody"));
437 if(setuid(pw->pw_uid)==0) {
438 SILC_LOG_DEBUG(("Setuid to %s", user));
440 SILC_LOG_DEBUG(("Setuid to %s failed", user));
441 fprintf(stderr, "Tried to setuid %s but no such user. Exiting\n",
447 /* Fork server to background, making it a daemon */
449 SILC_LOG_DEBUG(("Server started as user"));
450 SILC_LOG_DEBUG(("Forking SILC server to background"));
457 /* Stops the SILC server. This function is used to shutdown the server.
458 This is usually called after the scheduler has returned. After stopping
459 the server one should call silc_server_free. */
461 void silc_server_stop(SilcServer server)
463 SILC_LOG_DEBUG(("Stopping server"));
465 /* Stop the scheduler, although it might be already stopped. This
466 doesn't hurt anyone. This removes all the tasks and task queues,
468 silc_schedule_stop();
469 silc_schedule_uninit();
471 silc_server_protocols_unregister();
473 SILC_LOG_DEBUG(("Server stopped"));
476 /* The heart of the server. This runs the scheduler thus runs the server.
477 When this returns the server has been stopped and the program will
480 void silc_server_run(SilcServer server)
482 SILC_LOG_DEBUG(("Running server"));
484 /* Start the scheduler, the heart of the SILC server. When this returns
485 the program will be terminated. */
489 /* Timeout callback that will be called to retry connecting to remote
490 router. This is used by both normal and router server. This will wait
491 before retrying the connecting. The timeout is generated by exponential
492 backoff algorithm. */
494 SILC_TASK_CALLBACK(silc_server_connect_to_router_retry)
496 SilcServerConnection sconn = (SilcServerConnection)context;
497 SilcServer server = sconn->server;
499 SILC_LOG_INFO(("Retrying connecting to a router"));
501 /* Calculate next timeout */
502 if (sconn->retry_count >= 1) {
503 sconn->retry_timeout = sconn->retry_timeout * SILC_SERVER_RETRY_MULTIPLIER;
504 if (sconn->retry_timeout > SILC_SERVER_RETRY_INTERVAL_MAX)
505 sconn->retry_timeout = SILC_SERVER_RETRY_INTERVAL_MAX;
507 sconn->retry_timeout = server->params->retry_interval_min;
509 sconn->retry_count++;
510 sconn->retry_timeout = sconn->retry_timeout +
511 silc_rng_get_rn32(server->rng) % SILC_SERVER_RETRY_RANDOMIZER;
513 /* If we've reached max retry count, give up. */
514 if (sconn->retry_count > server->params->retry_count &&
515 server->params->retry_keep_trying == FALSE) {
516 SILC_LOG_ERROR(("Could not connect to router, giving up"));
520 /* Wait one before retrying */
521 silc_task_register(server->timeout_queue, fd, silc_server_connect_router,
522 context, sconn->retry_timeout,
523 server->params->retry_interval_min_usec,
524 SILC_TASK_TIMEOUT, SILC_TASK_PRI_NORMAL);
527 /* Generic routine to use connect to a router. */
529 SILC_TASK_CALLBACK(silc_server_connect_router)
531 SilcServerConnection sconn = (SilcServerConnection)context;
532 SilcServer server = sconn->server;
533 SilcSocketConnection newsocket;
534 SilcProtocol protocol;
535 SilcServerKEInternalContext *proto_ctx;
538 /* Connect to remote host */
539 sock = silc_net_create_connection(sconn->remote_port,
542 SILC_LOG_ERROR(("Could not connect to router"));
543 silc_task_register(server->timeout_queue, fd,
544 silc_server_connect_to_router_retry,
545 context, 0, 1, SILC_TASK_TIMEOUT,
546 SILC_TASK_PRI_NORMAL);
550 /* Set socket options */
551 silc_net_set_socket_nonblock(sock);
552 silc_net_set_socket_opt(sock, SOL_SOCKET, SO_REUSEADDR, 1);
554 /* Create socket connection for the connection. Even though we
555 know that we are connecting to a router we will mark the socket
556 to be unknown connection until we have executed authentication
558 silc_socket_alloc(sock, SILC_SOCKET_TYPE_UNKNOWN, NULL, &newsocket);
559 server->sockets[sock] = newsocket;
560 newsocket->hostname = strdup(sconn->remote_host);
561 newsocket->ip = strdup(sconn->remote_host);
562 newsocket->port = sconn->remote_port;
563 sconn->sock = newsocket;
565 /* Allocate internal protocol context. This is sent as context
567 proto_ctx = silc_calloc(1, sizeof(*proto_ctx));
568 proto_ctx->server = (void *)server;
569 proto_ctx->context = (void *)sconn;
570 proto_ctx->sock = newsocket;
571 proto_ctx->rng = server->rng;
572 proto_ctx->responder = FALSE;
574 /* Perform key exchange protocol. silc_server_connect_to_router_second
575 will be called after the protocol is finished. */
576 silc_protocol_alloc(SILC_PROTOCOL_SERVER_KEY_EXCHANGE,
577 &protocol, proto_ctx,
578 silc_server_connect_to_router_second);
579 newsocket->protocol = protocol;
581 /* Register a timeout task that will be executed if the protocol
582 is not executed within set limit. */
583 proto_ctx->timeout_task =
584 silc_task_register(server->timeout_queue, sock,
585 silc_server_timeout_remote,
586 server, server->params->protocol_timeout,
587 server->params->protocol_timeout_usec,
591 /* Register the connection for network input and output. This sets
592 that scheduler will listen for incoming packets for this connection
593 and sets that outgoing packets may be sent to this connection as
594 well. However, this doesn't set the scheduler for outgoing traffic,
595 it will be set separately by calling SILC_SET_CONNECTION_FOR_OUTPUT,
596 later when outgoing data is available. */
597 context = (void *)server;
598 SILC_REGISTER_CONNECTION_FOR_IO(sock);
600 /* Run the protocol */
601 protocol->execute(server->timeout_queue, 0, protocol, sock, 0, 0);
604 /* This function connects to our primary router or if we are a router this
605 establishes all our primary routes. This is called at the start of the
606 server to do authentication and key exchange with our router - called
609 SILC_TASK_CALLBACK(silc_server_connect_to_router)
611 SilcServer server = (SilcServer)context;
612 SilcServerConnection sconn;
614 SILC_LOG_DEBUG(("Connecting to router(s)"));
616 /* If we are normal SILC server we need to connect to our cell's
618 if (server->server_type == SILC_SERVER) {
619 SILC_LOG_DEBUG(("We are normal server"));
621 /* Create connection to the router, if configured. */
622 if (server->config->routers) {
624 /* Allocate connection object for hold connection specific stuff. */
625 sconn = silc_calloc(1, sizeof(*sconn));
626 sconn->server = server;
627 sconn->remote_host = strdup(server->config->routers->host);
628 sconn->remote_port = server->config->routers->port;
630 silc_task_register(server->timeout_queue, fd,
631 silc_server_connect_router,
632 (void *)sconn, 0, 1, SILC_TASK_TIMEOUT,
633 SILC_TASK_PRI_NORMAL);
638 /* If we are a SILC router we need to establish all of our primary
640 if (server->server_type == SILC_ROUTER) {
641 SilcServerConfigSectionServerConnection *ptr;
643 SILC_LOG_DEBUG(("We are router"));
645 /* Create the connections to all our routes */
646 ptr = server->config->routers;
649 SILC_LOG_DEBUG(("Router connection [%s] %s:%d",
650 ptr->initiator ? "Initiator" : "Responder",
651 ptr->host, ptr->port));
653 if (ptr->initiator) {
654 /* Allocate connection object for hold connection specific stuff. */
655 sconn = silc_calloc(1, sizeof(*sconn));
656 sconn->server = server;
657 sconn->remote_host = strdup(ptr->host);
658 sconn->remote_port = ptr->port;
660 silc_task_register(server->timeout_queue, fd,
661 silc_server_connect_router,
662 (void *)sconn, 0, 1, SILC_TASK_TIMEOUT,
663 SILC_TASK_PRI_NORMAL);
673 SILC_LOG_DEBUG(("No router(s), server will be standalone"));
675 /* There wasn't a configured router, we will continue but we don't
676 have a connection to outside world. We will be standalone server. */
677 server->standalone = TRUE;
680 /* Second part of connecting to router(s). Key exchange protocol has been
681 executed and now we will execute authentication protocol. */
683 SILC_TASK_CALLBACK(silc_server_connect_to_router_second)
685 SilcProtocol protocol = (SilcProtocol)context;
686 SilcServerKEInternalContext *ctx =
687 (SilcServerKEInternalContext *)protocol->context;
688 SilcServer server = (SilcServer)ctx->server;
689 SilcServerConnection sconn = (SilcServerConnection)ctx->context;
690 SilcSocketConnection sock = NULL;
691 SilcServerConnAuthInternalContext *proto_ctx;
693 SILC_LOG_DEBUG(("Start"));
695 if (protocol->state == SILC_PROTOCOL_STATE_ERROR) {
696 /* Error occured during protocol */
697 silc_protocol_free(protocol);
698 silc_ske_free_key_material(ctx->keymat);
700 silc_packet_context_free(ctx->packet);
702 silc_ske_free(ctx->ske);
704 silc_free(ctx->dest_id);
706 silc_task_unregister_by_callback(server->timeout_queue,
707 silc_server_failure_callback);
708 silc_server_disconnect_remote(server, sock, "Server closed connection: "
709 "Key exchange failed");
713 /* We now have the key material as the result of the key exchange
714 protocol. Take the key material into use. Free the raw key material
715 as soon as we've set them into use. */
716 if (!silc_server_protocol_ke_set_keys(ctx->ske, ctx->sock, ctx->keymat,
717 ctx->ske->prop->cipher,
718 ctx->ske->prop->pkcs,
719 ctx->ske->prop->hash,
720 ctx->ske->prop->hmac,
722 silc_protocol_free(protocol);
723 silc_ske_free_key_material(ctx->keymat);
725 silc_packet_context_free(ctx->packet);
727 silc_ske_free(ctx->ske);
729 silc_free(ctx->dest_id);
731 silc_task_unregister_by_callback(server->timeout_queue,
732 silc_server_failure_callback);
733 silc_server_disconnect_remote(server, sock, "Server closed connection: "
734 "Key exchange failed");
737 silc_ske_free_key_material(ctx->keymat);
739 /* Allocate internal context for the authentication protocol. This
740 is sent as context for the protocol. */
741 proto_ctx = silc_calloc(1, sizeof(*proto_ctx));
742 proto_ctx->server = (void *)server;
743 proto_ctx->context = (void *)sconn;
744 proto_ctx->sock = sock = server->sockets[fd];
745 proto_ctx->ske = ctx->ske; /* Save SKE object from previous protocol */
746 proto_ctx->dest_id_type = ctx->dest_id_type;
747 proto_ctx->dest_id = ctx->dest_id;
749 /* Resolve the authentication method used in this connection */
750 proto_ctx->auth_meth = SILC_AUTH_PASSWORD;
751 if (server->config->routers) {
752 SilcServerConfigSectionServerConnection *conn = NULL;
754 /* Check if we find a match from user configured connections */
755 conn = silc_server_config_find_router_conn(server->config,
759 /* Match found. Use the configured authentication method */
760 proto_ctx->auth_meth = conn->auth_meth;
761 if (conn->auth_data) {
762 proto_ctx->auth_data = strdup(conn->auth_data);
763 proto_ctx->auth_data_len = strlen(conn->auth_data);
766 /* No match found. */
773 /* Free old protocol as it is finished now */
774 silc_protocol_free(protocol);
776 silc_packet_context_free(ctx->packet);
778 sock->protocol = NULL;
780 /* Allocate the authentication protocol. This is allocated here
781 but we won't start it yet. We will be receiving party of this
782 protocol thus we will wait that connecting party will make
784 silc_protocol_alloc(SILC_PROTOCOL_SERVER_CONNECTION_AUTH,
785 &sock->protocol, proto_ctx,
786 silc_server_connect_to_router_final);
788 /* Register timeout task. If the protocol is not executed inside
789 this timelimit the connection will be terminated. Currently
790 this is 15 seconds and is hard coded limit (XXX). */
791 proto_ctx->timeout_task =
792 silc_task_register(server->timeout_queue, sock->sock,
793 silc_server_timeout_remote,
794 (void *)server, 15, 0,
798 /* Run the protocol */
799 sock->protocol->execute(server->timeout_queue, 0,
800 sock->protocol, sock->sock, 0, 0);
803 /* Finalizes the connection to router. Registers a server task to the
804 queue so that we can accept new connections. */
806 SILC_TASK_CALLBACK(silc_server_connect_to_router_final)
808 SilcProtocol protocol = (SilcProtocol)context;
809 SilcServerConnAuthInternalContext *ctx =
810 (SilcServerConnAuthInternalContext *)protocol->context;
811 SilcServer server = (SilcServer)ctx->server;
812 SilcServerConnection sconn = (SilcServerConnection)ctx->context;
813 SilcSocketConnection sock = ctx->sock;
814 SilcServerEntry id_entry;
816 SilcServerHBContext hb_context;
817 unsigned char *id_string;
819 SILC_LOG_DEBUG(("Start"));
821 if (protocol->state == SILC_PROTOCOL_STATE_ERROR) {
822 /* Error occured during protocol */
824 silc_free(ctx->dest_id);
825 silc_server_disconnect_remote(server, sock, "Server closed connection: "
826 "Authentication failed");
830 /* Add a task to the queue. This task receives new connections to the
831 server. This task remains on the queue until the end of the program. */
832 if (!server->listenning) {
833 silc_task_register(server->io_queue, server->sock,
834 silc_server_accept_new_connection,
835 (void *)server, 0, 0,
837 SILC_TASK_PRI_NORMAL);
838 server->listenning = TRUE;
841 /* Send NEW_SERVER packet to the router. We will become registered
842 to the SILC network after sending this packet. */
843 id_string = silc_id_id2str(server->id, SILC_ID_SERVER);
844 packet = silc_buffer_alloc(2 + 2 + SILC_ID_SERVER_LEN +
845 strlen(server->server_name));
846 silc_buffer_pull_tail(packet, SILC_BUFFER_END(packet));
847 silc_buffer_format(packet,
848 SILC_STR_UI_SHORT(SILC_ID_SERVER_LEN),
849 SILC_STR_UI_XNSTRING(id_string, SILC_ID_SERVER_LEN),
850 SILC_STR_UI_SHORT(strlen(server->server_name)),
851 SILC_STR_UI_XNSTRING(server->server_name,
852 strlen(server->server_name)),
855 /* Send the packet */
856 silc_server_packet_send(server, ctx->sock, SILC_PACKET_NEW_SERVER, 0,
857 packet->data, packet->len, TRUE);
858 silc_buffer_free(packet);
859 silc_free(id_string);
861 SILC_LOG_DEBUG(("Connected to router %s", sock->hostname));
863 /* Add the connected router to local server list */
864 server->standalone = FALSE;
865 id_entry = silc_idlist_add_server(server->local_list, sock->hostname,
866 SILC_ROUTER, ctx->dest_id, NULL, sock);
869 silc_free(ctx->dest_id);
870 silc_server_disconnect_remote(server, sock, "Server closed connection: "
871 "Authentication failed");
875 silc_idlist_add_data(id_entry, (SilcIDListData)sock->user_data);
876 silc_free(sock->user_data);
877 sock->user_data = (void *)id_entry;
878 sock->type = SILC_SOCKET_TYPE_ROUTER;
879 server->id_entry->router = id_entry;
880 server->router = id_entry;
881 server->router->data.registered = TRUE;
883 /* Perform keepalive. The `hb_context' will be freed automatically
884 when finally calling the silc_socket_free function. XXX hardcoded
886 hb_context = silc_calloc(1, sizeof(*hb_context));
887 hb_context->server = server;
888 silc_socket_set_heartbeat(sock, 600, hb_context,
889 silc_server_perform_heartbeat,
890 server->timeout_queue);
892 /* If we are router then announce our possible servers. */
893 if (server->server_type == SILC_ROUTER)
894 silc_server_announce_servers(server);
896 /* Announce our clients and channels to the router */
897 silc_server_announce_clients(server);
898 silc_server_announce_channels(server);
901 /* Free the temporary connection data context */
903 silc_free(sconn->remote_host);
907 /* Free the protocol object */
908 silc_protocol_free(protocol);
910 silc_packet_context_free(ctx->packet);
912 silc_ske_free(ctx->ske);
914 sock->protocol = NULL;
917 /* Accepts new connections to the server. Accepting new connections are
918 done in three parts to make it async. */
920 SILC_TASK_CALLBACK(silc_server_accept_new_connection)
922 SilcServer server = (SilcServer)context;
923 SilcSocketConnection newsocket;
924 SilcServerKEInternalContext *proto_ctx;
927 SILC_LOG_DEBUG(("Accepting new connection"));
929 server->stat.conn_attempts++;
931 sock = silc_net_accept_connection(server->sock);
933 SILC_LOG_ERROR(("Could not accept new connection: %s", strerror(errno)));
934 server->stat.conn_failures++;
938 /* Check max connections */
939 if (sock > SILC_SERVER_MAX_CONNECTIONS) {
940 if (server->config->redirect) {
941 /* XXX Redirecting connection to somewhere else now?? */
942 /*silc_server_send_notify("Server is full, trying to redirect..."); */
944 SILC_LOG_ERROR(("Refusing connection, server is full"));
945 server->stat.conn_failures++;
950 /* Set socket options */
951 silc_net_set_socket_nonblock(sock);
952 silc_net_set_socket_opt(sock, SOL_SOCKET, SO_REUSEADDR, 1);
954 /* We don't create a ID yet, since we don't know what type of connection
955 this is yet. But, we do add the connection to the socket table. */
956 silc_socket_alloc(sock, SILC_SOCKET_TYPE_UNKNOWN, NULL, &newsocket);
957 server->sockets[sock] = newsocket;
959 /* XXX This MUST be done async as this will block the entire server
960 process. Either we have to do our own resolver stuff or in the future
961 we can use threads. */
962 /* Perform name and address lookups for the remote host. */
963 silc_net_check_host_by_sock(sock, &newsocket->hostname, &newsocket->ip);
964 if ((server->params->require_reverse_mapping && !newsocket->hostname) ||
966 SILC_LOG_ERROR(("IP/DNS lookup failed"));
967 server->stat.conn_failures++;
970 if (!newsocket->hostname)
971 newsocket->hostname = strdup(newsocket->ip);
972 newsocket->port = silc_net_get_remote_port(sock);
974 SILC_LOG_INFO(("Incoming connection from %s (%s)", newsocket->hostname,
977 /* Allocate internal context for key exchange protocol. This is
978 sent as context for the protocol. */
979 proto_ctx = silc_calloc(1, sizeof(*proto_ctx));
980 proto_ctx->server = context;
981 proto_ctx->sock = newsocket;
982 proto_ctx->rng = server->rng;
983 proto_ctx->responder = TRUE;
985 /* Prepare the connection for key exchange protocol. We allocate the
986 protocol but will not start it yet. The connector will be the
987 initiator of the protocol thus we will wait for initiation from
988 there before we start the protocol. */
989 server->stat.auth_attempts++;
990 silc_protocol_alloc(SILC_PROTOCOL_SERVER_KEY_EXCHANGE,
991 &newsocket->protocol, proto_ctx,
992 silc_server_accept_new_connection_second);
994 /* Register a timeout task that will be executed if the connector
995 will not start the key exchange protocol within 60 seconds. For
996 now, this is a hard coded limit. After 60 secs the connection will
997 be closed if the key exchange protocol has not been started. */
998 proto_ctx->timeout_task =
999 silc_task_register(server->timeout_queue, newsocket->sock,
1000 silc_server_timeout_remote,
1005 /* Register the connection for network input and output. This sets
1006 that scheduler will listen for incoming packets for this connection
1007 and sets that outgoing packets may be sent to this connection as well.
1008 However, this doesn't set the scheduler for outgoing traffic, it
1009 will be set separately by calling SILC_SET_CONNECTION_FOR_OUTPUT,
1010 later when outgoing data is available. */
1011 SILC_REGISTER_CONNECTION_FOR_IO(sock);
1014 /* Second part of accepting new connection. Key exchange protocol has been
1015 performed and now it is time to do little connection authentication
1016 protocol to figure out whether this connection is client or server
1017 and whether it has right to access this server (especially server
1018 connections needs to be authenticated). */
1020 SILC_TASK_CALLBACK(silc_server_accept_new_connection_second)
1022 SilcProtocol protocol = (SilcProtocol)context;
1023 SilcServerKEInternalContext *ctx =
1024 (SilcServerKEInternalContext *)protocol->context;
1025 SilcServer server = (SilcServer)ctx->server;
1026 SilcSocketConnection sock = NULL;
1027 SilcServerConnAuthInternalContext *proto_ctx;
1029 SILC_LOG_DEBUG(("Start"));
1031 if (protocol->state == SILC_PROTOCOL_STATE_ERROR ||
1032 protocol->state == SILC_PROTOCOL_STATE_FAILURE) {
1033 /* Error occured during protocol */
1034 silc_protocol_free(protocol);
1035 silc_ske_free_key_material(ctx->keymat);
1037 silc_packet_context_free(ctx->packet);
1039 silc_ske_free(ctx->ske);
1041 silc_free(ctx->dest_id);
1043 silc_task_unregister_by_callback(server->timeout_queue,
1044 silc_server_failure_callback);
1045 silc_server_disconnect_remote(server, sock, "Server closed connection: "
1046 "Key exchange failed");
1047 server->stat.auth_failures++;
1051 /* We now have the key material as the result of the key exchange
1052 protocol. Take the key material into use. Free the raw key material
1053 as soon as we've set them into use. */
1054 if (!silc_server_protocol_ke_set_keys(ctx->ske, ctx->sock, ctx->keymat,
1055 ctx->ske->prop->cipher,
1056 ctx->ske->prop->pkcs,
1057 ctx->ske->prop->hash,
1058 ctx->ske->prop->hmac,
1060 silc_protocol_free(protocol);
1061 silc_ske_free_key_material(ctx->keymat);
1063 silc_packet_context_free(ctx->packet);
1065 silc_ske_free(ctx->ske);
1067 silc_free(ctx->dest_id);
1069 silc_task_unregister_by_callback(server->timeout_queue,
1070 silc_server_failure_callback);
1071 silc_server_disconnect_remote(server, sock, "Server closed connection: "
1072 "Key exchange failed");
1073 server->stat.auth_failures++;
1076 silc_ske_free_key_material(ctx->keymat);
1078 /* Allocate internal context for the authentication protocol. This
1079 is sent as context for the protocol. */
1080 proto_ctx = silc_calloc(1, sizeof(*proto_ctx));
1081 proto_ctx->server = (void *)server;
1082 proto_ctx->sock = sock = server->sockets[fd];
1083 proto_ctx->ske = ctx->ske; /* Save SKE object from previous protocol */
1084 proto_ctx->responder = TRUE;
1085 proto_ctx->dest_id_type = ctx->dest_id_type;
1086 proto_ctx->dest_id = ctx->dest_id;
1088 /* Free old protocol as it is finished now */
1089 silc_protocol_free(protocol);
1091 silc_packet_context_free(ctx->packet);
1093 sock->protocol = NULL;
1095 /* Allocate the authentication protocol. This is allocated here
1096 but we won't start it yet. We will be receiving party of this
1097 protocol thus we will wait that connecting party will make
1098 their first move. */
1099 silc_protocol_alloc(SILC_PROTOCOL_SERVER_CONNECTION_AUTH,
1100 &sock->protocol, proto_ctx,
1101 silc_server_accept_new_connection_final);
1103 /* Register timeout task. If the protocol is not executed inside
1104 this timelimit the connection will be terminated. Currently
1105 this is 60 seconds and is hard coded limit (XXX). */
1106 proto_ctx->timeout_task =
1107 silc_task_register(server->timeout_queue, sock->sock,
1108 silc_server_timeout_remote,
1109 (void *)server, 60, 0,
1114 /* Final part of accepting new connection. The connection has now
1115 been authenticated and keys has been exchanged. We also know whether
1116 this is client or server connection. */
1118 SILC_TASK_CALLBACK(silc_server_accept_new_connection_final)
1120 SilcProtocol protocol = (SilcProtocol)context;
1121 SilcServerConnAuthInternalContext *ctx =
1122 (SilcServerConnAuthInternalContext *)protocol->context;
1123 SilcServer server = (SilcServer)ctx->server;
1124 SilcSocketConnection sock = ctx->sock;
1125 SilcServerHBContext hb_context;
1126 void *id_entry = NULL;
1128 SILC_LOG_DEBUG(("Start"));
1130 if (protocol->state == SILC_PROTOCOL_STATE_ERROR ||
1131 protocol->state == SILC_PROTOCOL_STATE_FAILURE) {
1132 /* Error occured during protocol */
1133 silc_protocol_free(protocol);
1135 silc_packet_context_free(ctx->packet);
1137 silc_ske_free(ctx->ske);
1139 silc_free(ctx->dest_id);
1142 sock->protocol = NULL;
1143 silc_task_unregister_by_callback(server->timeout_queue,
1144 silc_server_failure_callback);
1145 silc_server_disconnect_remote(server, sock, "Server closed connection: "
1146 "Authentication failed");
1147 server->stat.auth_failures++;
1151 sock->type = ctx->conn_type;
1152 switch(sock->type) {
1153 case SILC_SOCKET_TYPE_CLIENT:
1155 SilcClientEntry client;
1157 SILC_LOG_DEBUG(("Remote host is client"));
1158 SILC_LOG_INFO(("Connection from %s (%s) is client", sock->hostname,
1161 /* Add the client to the client ID cache. The nickname and Client ID
1162 and other information is created after we have received NEW_CLIENT
1163 packet from client. */
1164 client = silc_idlist_add_client(server->local_list,
1165 NULL, NULL, NULL, NULL, NULL, sock);
1167 SILC_LOG_ERROR(("Could not add new client to cache"));
1168 silc_free(sock->user_data);
1173 server->stat.my_clients++;
1174 server->stat.clients++;
1175 if (server->server_type == SILC_ROUTER)
1176 server->stat.cell_clients++;
1178 id_entry = (void *)client;
1181 case SILC_SOCKET_TYPE_SERVER:
1182 case SILC_SOCKET_TYPE_ROUTER:
1184 SilcServerEntry new_server;
1186 SILC_LOG_DEBUG(("Remote host is %s",
1187 sock->type == SILC_SOCKET_TYPE_SERVER ?
1188 "server" : "router"));
1189 SILC_LOG_INFO(("Connection from %s (%s) is %s", sock->hostname,
1190 sock->ip, sock->type == SILC_SOCKET_TYPE_SERVER ?
1191 "server" : "router"));
1193 /* Add the server into server cache. The server name and Server ID
1194 is updated after we have received NEW_SERVER packet from the
1195 server. We mark ourselves as router for this server if we really
1198 silc_idlist_add_server(server->local_list, NULL,
1199 sock->type == SILC_SOCKET_TYPE_SERVER ?
1200 SILC_SERVER : SILC_ROUTER, NULL,
1201 sock->type == SILC_SOCKET_TYPE_SERVER ?
1202 server->id_entry : NULL, sock);
1204 SILC_LOG_ERROR(("Could not add new server to cache"));
1205 silc_free(sock->user_data);
1210 if (sock->type == SILC_SOCKET_TYPE_SERVER)
1211 server->stat.my_servers++;
1213 server->stat.my_routers++;
1214 server->stat.servers++;
1216 id_entry = (void *)new_server;
1218 /* There is connection to other server now, if it is router then
1219 we will have connection to outside world. If we are router but
1220 normal server connected to us then we will remain standalone,
1221 if we are standlone. */
1222 if (server->standalone && sock->type == SILC_SOCKET_TYPE_ROUTER) {
1223 SILC_LOG_DEBUG(("We are not standalone server anymore"));
1224 server->standalone = FALSE;
1225 if (!server->id_entry->router) {
1226 server->id_entry->router = id_entry;
1227 server->router = id_entry;
1236 /* Add the common data structure to the ID entry. */
1238 silc_idlist_add_data(id_entry, (SilcIDListData)sock->user_data);
1240 /* Add to sockets internal pointer for fast referencing */
1241 silc_free(sock->user_data);
1242 sock->user_data = id_entry;
1244 /* Connection has been fully established now. Everything is ok. */
1245 SILC_LOG_DEBUG(("New connection authenticated"));
1247 /* Perform keepalive. The `hb_context' will be freed automatically
1248 when finally calling the silc_socket_free function. XXX hardcoded
1250 hb_context = silc_calloc(1, sizeof(*hb_context));
1251 hb_context->server = server;
1252 silc_socket_set_heartbeat(sock, 600, hb_context,
1253 silc_server_perform_heartbeat,
1254 server->timeout_queue);
1256 silc_task_unregister_by_callback(server->timeout_queue,
1257 silc_server_failure_callback);
1258 silc_protocol_free(protocol);
1260 silc_packet_context_free(ctx->packet);
1262 silc_ske_free(ctx->ske);
1264 silc_free(ctx->dest_id);
1266 sock->protocol = NULL;
1269 /* This function is used to read packets from network and send packets to
1270 network. This is usually a generic task. */
1272 SILC_TASK_CALLBACK(silc_server_packet_process)
1274 SilcServer server = (SilcServer)context;
1275 SilcSocketConnection sock = server->sockets[fd];
1276 SilcIDListData idata;
1277 SilcCipher cipher = NULL;
1278 SilcHmac hmac = NULL;
1284 SILC_LOG_DEBUG(("Processing packet"));
1286 /* Packet sending */
1288 if (type == SILC_TASK_WRITE) {
1289 /* Do not send data to disconnected connection */
1290 if (SILC_IS_DISCONNECTED(sock))
1293 server->stat.packets_sent++;
1295 if (sock->outbuf->data - sock->outbuf->head)
1296 silc_buffer_push(sock->outbuf, sock->outbuf->data - sock->outbuf->head);
1298 ret = silc_server_packet_send_real(server, sock, TRUE);
1300 /* If returned -2 could not write to connection now, will do
1308 /* The packet has been sent and now it is time to set the connection
1309 back to only for input. When there is again some outgoing data
1310 available for this connection it will be set for output as well.
1311 This call clears the output setting and sets it only for input. */
1312 SILC_SET_CONNECTION_FOR_INPUT(fd);
1313 SILC_UNSET_OUTBUF_PENDING(sock);
1315 silc_buffer_clear(sock->outbuf);
1319 /* Packet receiving */
1321 /* Read some data from connection */
1322 ret = silc_packet_receive(sock);
1328 SILC_LOG_DEBUG(("Read EOF"));
1330 /* If connection is disconnecting already we will finally
1331 close the connection */
1332 if (SILC_IS_DISCONNECTING(sock)) {
1333 if (sock->user_data)
1334 silc_server_free_sock_user_data(server, sock);
1335 silc_server_close_connection(server, sock);
1339 SILC_LOG_DEBUG(("Premature EOF from connection %d", sock->sock));
1340 SILC_SET_DISCONNECTING(sock);
1342 /* If the closed connection was our primary router connection the
1343 start re-connecting phase. */
1344 if (!server->standalone && sock->type == SILC_SOCKET_TYPE_ROUTER &&
1345 sock == server->router->connection)
1346 silc_task_register(server->timeout_queue, 0,
1347 silc_server_connect_to_router,
1350 SILC_TASK_PRI_NORMAL);
1352 if (sock->user_data)
1353 silc_server_free_sock_user_data(server, sock);
1354 silc_server_close_connection(server, sock);
1358 /* If connection is disconnecting or disconnected we will ignore
1360 if (SILC_IS_DISCONNECTING(sock) || SILC_IS_DISCONNECTED(sock)) {
1361 SILC_LOG_DEBUG(("Ignoring read data from disonnected connection"));
1365 server->stat.packets_received++;
1367 /* Get keys and stuff from ID entry */
1368 idata = (SilcIDListData)sock->user_data;
1370 idata->last_receive = time(NULL);
1371 cipher = idata->receive_key;
1375 /* Process the packet. This will call the parser that will then
1376 decrypt and parse the packet. */
1377 silc_packet_receive_process(sock, cipher, hmac, silc_server_packet_parse,
1381 /* Callback function that the silc_packet_decrypt will call to make the
1382 decision whether the packet is normal or special packet. We will
1383 return TRUE if it is normal and FALSE if it is special */
1385 static int silc_server_packet_decrypt_check(SilcPacketType packet_type,
1387 SilcPacketContext *packet,
1390 SilcPacketParserContext *parse_ctx = (SilcPacketParserContext *)context;
1391 SilcServer server = (SilcServer)parse_ctx->context;
1393 /* Packet is normal packet, if:
1395 1) packet is private message packet and does not have private key set
1396 2) is other packet than channel message packet
1397 3) is channel message packet and remote is router and we are router
1399 all other packets are special packets
1401 if ((packet_type == SILC_PACKET_PRIVATE_MESSAGE &&
1402 !(buffer->data[2] & SILC_PACKET_FLAG_PRIVMSG_KEY)) ||
1403 packet_type != SILC_PACKET_CHANNEL_MESSAGE ||
1404 (packet_type == SILC_PACKET_CHANNEL_MESSAGE &&
1405 parse_ctx->sock->type == SILC_SOCKET_TYPE_ROUTER &&
1406 server->server_type == SILC_ROUTER))
1412 /* Parses whole packet, received earlier. */
1414 SILC_TASK_CALLBACK(silc_server_packet_parse_real)
1416 SilcPacketParserContext *parse_ctx = (SilcPacketParserContext *)context;
1417 SilcServer server = (SilcServer)parse_ctx->context;
1418 SilcSocketConnection sock = parse_ctx->sock;
1419 SilcPacketContext *packet = parse_ctx->packet;
1422 SILC_LOG_DEBUG(("Start"));
1424 /* Decrypt the received packet */
1425 ret = silc_packet_decrypt(parse_ctx->cipher, parse_ctx->hmac,
1426 packet->buffer, packet,
1427 silc_server_packet_decrypt_check, parse_ctx);
1432 /* Parse the packet. Packet type is returned. */
1433 ret = silc_packet_parse(packet);
1435 /* Parse the packet header in special way as this is "special"
1437 ret = silc_packet_parse_special(packet);
1440 if (ret == SILC_PACKET_NONE)
1443 /* Check that the the current client ID is same as in the client's packet. */
1444 if (sock->type == SILC_SOCKET_TYPE_CLIENT) {
1445 SilcClientEntry client = (SilcClientEntry)sock->user_data;
1446 if (client && client->id) {
1447 void *id = silc_id_str2id(packet->src_id, packet->src_id_len,
1448 packet->src_id_type);
1449 if (SILC_ID_CLIENT_COMPARE(client->id, id)) {
1457 if (server->server_type == SILC_ROUTER) {
1458 /* Route the packet if it is not destined to us. Other ID types but
1459 server are handled separately after processing them. */
1460 if (packet->dst_id_type == SILC_ID_SERVER &&
1461 sock->type != SILC_SOCKET_TYPE_CLIENT &&
1462 SILC_ID_SERVER_COMPARE(packet->dst_id, server->id_string)) {
1464 /* Route the packet to fastest route for the destination ID */
1465 void *id = silc_id_str2id(packet->dst_id, packet->dst_id_len,
1466 packet->dst_id_type);
1469 silc_server_packet_route(server,
1470 silc_server_route_get(server, id,
1471 packet->dst_id_type),
1477 /* Broadcast packet if it is marked as broadcast packet and it is
1478 originated from router and we are router. */
1479 if (sock->type == SILC_SOCKET_TYPE_ROUTER &&
1480 packet->flags & SILC_PACKET_FLAG_BROADCAST) {
1481 silc_server_packet_broadcast(server, server->router->connection, packet);
1485 /* Parse the incoming packet type */
1486 silc_server_packet_parse_type(server, sock, packet);
1489 silc_buffer_clear(sock->inbuf);
1490 silc_packet_context_free(packet);
1491 silc_free(parse_ctx);
1494 /* Parser callback called by silc_packet_receive_process. This merely
1495 registers timeout that will handle the actual parsing when appropriate. */
1497 void silc_server_packet_parse(SilcPacketParserContext *parser_context)
1499 SilcServer server = (SilcServer)parser_context->context;
1500 SilcSocketConnection sock = parser_context->sock;
1502 switch (sock->type) {
1503 case SILC_SOCKET_TYPE_CLIENT:
1504 case SILC_SOCKET_TYPE_UNKNOWN:
1505 /* Parse the packet with timeout */
1506 silc_task_register(server->timeout_queue, sock->sock,
1507 silc_server_packet_parse_real,
1508 (void *)parser_context, 0, 100000,
1510 SILC_TASK_PRI_NORMAL);
1512 case SILC_SOCKET_TYPE_SERVER:
1513 case SILC_SOCKET_TYPE_ROUTER:
1514 /* Packets from servers are parsed as soon as possible */
1515 silc_task_register(server->timeout_queue, sock->sock,
1516 silc_server_packet_parse_real,
1517 (void *)parser_context, 0, 1,
1519 SILC_TASK_PRI_NORMAL);
1526 /* Parses the packet type and calls what ever routines the packet type
1527 requires. This is done for all incoming packets. */
1529 void silc_server_packet_parse_type(SilcServer server,
1530 SilcSocketConnection sock,
1531 SilcPacketContext *packet)
1533 SilcPacketType type = packet->type;
1535 SILC_LOG_DEBUG(("Parsing packet type %d", type));
1537 /* Parse the packet type */
1539 case SILC_PACKET_DISCONNECT:
1540 SILC_LOG_DEBUG(("Disconnect packet"));
1541 if (packet->flags & SILC_PACKET_FLAG_LIST)
1545 case SILC_PACKET_SUCCESS:
1547 * Success received for something. For now we can have only
1548 * one protocol for connection executing at once hence this
1549 * success message is for whatever protocol is executing currently.
1551 SILC_LOG_DEBUG(("Success packet"));
1552 if (packet->flags & SILC_PACKET_FLAG_LIST)
1554 if (sock->protocol) {
1555 sock->protocol->execute(server->timeout_queue, 0,
1556 sock->protocol, sock->sock, 0, 0);
1560 case SILC_PACKET_FAILURE:
1562 * Failure received for something. For now we can have only
1563 * one protocol for connection executing at once hence this
1564 * failure message is for whatever protocol is executing currently.
1566 SILC_LOG_DEBUG(("Failure packet"));
1567 if (packet->flags & SILC_PACKET_FLAG_LIST)
1569 if (sock->protocol) {
1570 SilcServerFailureContext f;
1571 f = silc_calloc(1, sizeof(*f));
1575 /* We will wait 5 seconds to process this failure packet */
1576 silc_task_register(server->timeout_queue, sock->sock,
1577 silc_server_failure_callback, (void *)f, 5, 0,
1578 SILC_TASK_TIMEOUT, SILC_TASK_PRI_NORMAL);
1582 case SILC_PACKET_REJECT:
1583 SILC_LOG_DEBUG(("Reject packet"));
1584 if (packet->flags & SILC_PACKET_FLAG_LIST)
1589 case SILC_PACKET_NOTIFY:
1591 * Received notify packet. Server can receive notify packets from
1592 * router. Server then relays the notify messages to clients if needed.
1594 SILC_LOG_DEBUG(("Notify packet"));
1595 if (packet->flags & SILC_PACKET_FLAG_LIST)
1596 silc_server_notify_list(server, sock, packet);
1598 silc_server_notify(server, sock, packet);
1604 case SILC_PACKET_CHANNEL_MESSAGE:
1606 * Received channel message. Channel messages are special packets
1607 * (although probably most common ones) thus they are handled
1610 SILC_LOG_DEBUG(("Channel Message packet"));
1611 if (packet->flags & SILC_PACKET_FLAG_LIST)
1613 silc_server_channel_message(server, sock, packet);
1616 case SILC_PACKET_CHANNEL_KEY:
1618 * Received key for channel. As channels are created by the router
1619 * the keys are as well. We will distribute the key to all of our
1620 * locally connected clients on the particular channel. Router
1621 * never receives this channel and thus is ignored.
1623 SILC_LOG_DEBUG(("Channel Key packet"));
1624 if (packet->flags & SILC_PACKET_FLAG_LIST)
1626 silc_server_channel_key(server, sock, packet);
1632 case SILC_PACKET_COMMAND:
1634 * Recived command. Processes the command request and allocates the
1635 * command context and calls the command.
1637 SILC_LOG_DEBUG(("Command packet"));
1638 if (packet->flags & SILC_PACKET_FLAG_LIST)
1640 silc_server_command_process(server, sock, packet);
1643 case SILC_PACKET_COMMAND_REPLY:
1645 * Received command reply packet. Received command reply to command. It
1646 * may be reply to command sent by us or reply to command sent by client
1647 * that we've routed further.
1649 SILC_LOG_DEBUG(("Command Reply packet"));
1650 if (packet->flags & SILC_PACKET_FLAG_LIST)
1652 silc_server_command_reply(server, sock, packet);
1656 * Private Message packets
1658 case SILC_PACKET_PRIVATE_MESSAGE:
1660 * Received private message packet. The packet is coming from either
1663 SILC_LOG_DEBUG(("Private Message packet"));
1664 if (packet->flags & SILC_PACKET_FLAG_LIST)
1666 silc_server_private_message(server, sock, packet);
1669 case SILC_PACKET_PRIVATE_MESSAGE_KEY:
1671 * Private message key packet.
1673 if (packet->flags & SILC_PACKET_FLAG_LIST)
1675 silc_server_private_message_key(server, sock, packet);
1679 * Key Exchange protocol packets
1681 case SILC_PACKET_KEY_EXCHANGE:
1682 SILC_LOG_DEBUG(("KE packet"));
1683 if (packet->flags & SILC_PACKET_FLAG_LIST)
1686 if (sock->protocol && sock->protocol->protocol->type
1687 == SILC_PROTOCOL_SERVER_KEY_EXCHANGE) {
1689 SilcServerKEInternalContext *proto_ctx =
1690 (SilcServerKEInternalContext *)sock->protocol->context;
1692 proto_ctx->packet = silc_packet_context_dup(packet);
1694 /* Let the protocol handle the packet */
1695 sock->protocol->execute(server->timeout_queue, 0,
1696 sock->protocol, sock->sock, 0, 100000);
1698 SILC_LOG_ERROR(("Received Key Exchange packet but no key exchange "
1699 "protocol active, packet dropped."));
1701 /* XXX Trigger KE protocol?? Rekey actually, maybe. */
1705 case SILC_PACKET_KEY_EXCHANGE_1:
1706 SILC_LOG_DEBUG(("KE 1 packet"));
1707 if (packet->flags & SILC_PACKET_FLAG_LIST)
1710 if (sock->protocol && sock->protocol->protocol->type
1711 == SILC_PROTOCOL_SERVER_KEY_EXCHANGE) {
1713 SilcServerKEInternalContext *proto_ctx =
1714 (SilcServerKEInternalContext *)sock->protocol->context;
1716 if (proto_ctx->packet)
1717 silc_packet_context_free(proto_ctx->packet);
1719 proto_ctx->packet = silc_packet_context_dup(packet);
1720 proto_ctx->dest_id_type = packet->src_id_type;
1721 proto_ctx->dest_id = silc_id_str2id(packet->src_id, packet->src_id_len,
1722 packet->src_id_type);
1723 if (!proto_ctx->dest_id)
1726 /* Let the protocol handle the packet */
1727 sock->protocol->execute(server->timeout_queue, 0,
1728 sock->protocol, sock->sock,
1731 SILC_LOG_ERROR(("Received Key Exchange 1 packet but no key exchange "
1732 "protocol active, packet dropped."));
1736 case SILC_PACKET_KEY_EXCHANGE_2:
1737 SILC_LOG_DEBUG(("KE 2 packet"));
1738 if (packet->flags & SILC_PACKET_FLAG_LIST)
1741 if (sock->protocol && sock->protocol->protocol->type
1742 == SILC_PROTOCOL_SERVER_KEY_EXCHANGE) {
1744 SilcServerKEInternalContext *proto_ctx =
1745 (SilcServerKEInternalContext *)sock->protocol->context;
1747 if (proto_ctx->packet)
1748 silc_packet_context_free(proto_ctx->packet);
1750 proto_ctx->packet = silc_packet_context_dup(packet);
1751 proto_ctx->dest_id_type = packet->src_id_type;
1752 proto_ctx->dest_id = silc_id_str2id(packet->src_id, packet->src_id_len,
1753 packet->src_id_type);
1754 if (!proto_ctx->dest_id)
1757 /* Let the protocol handle the packet */
1758 sock->protocol->execute(server->timeout_queue, 0,
1759 sock->protocol, sock->sock,
1762 SILC_LOG_ERROR(("Received Key Exchange 2 packet but no key exchange "
1763 "protocol active, packet dropped."));
1767 case SILC_PACKET_CONNECTION_AUTH_REQUEST:
1769 * Connection authentication request packet. When we receive this packet
1770 * we will send to the other end information about our mandatory
1771 * authentication method for the connection. This packet maybe received
1774 SILC_LOG_DEBUG(("Connection authentication request packet"));
1775 if (packet->flags & SILC_PACKET_FLAG_LIST)
1780 * Connection Authentication protocol packets
1782 case SILC_PACKET_CONNECTION_AUTH:
1783 /* Start of the authentication protocol. We receive here the
1784 authentication data and will verify it. */
1785 SILC_LOG_DEBUG(("Connection auth packet"));
1786 if (packet->flags & SILC_PACKET_FLAG_LIST)
1789 if (sock->protocol && sock->protocol->protocol->type
1790 == SILC_PROTOCOL_SERVER_CONNECTION_AUTH) {
1792 SilcServerConnAuthInternalContext *proto_ctx =
1793 (SilcServerConnAuthInternalContext *)sock->protocol->context;
1795 proto_ctx->packet = silc_packet_context_dup(packet);
1797 /* Let the protocol handle the packet */
1798 sock->protocol->execute(server->timeout_queue, 0,
1799 sock->protocol, sock->sock, 0, 0);
1801 SILC_LOG_ERROR(("Received Connection Auth packet but no authentication "
1802 "protocol active, packet dropped."));
1806 case SILC_PACKET_NEW_ID:
1808 * Received New ID packet. This includes some new ID that has been
1809 * created. It may be for client, server or channel. This is the way
1810 * to distribute information about new registered entities in the
1813 SILC_LOG_DEBUG(("New ID packet"));
1814 if (packet->flags & SILC_PACKET_FLAG_LIST)
1815 silc_server_new_id_list(server, sock, packet);
1817 silc_server_new_id(server, sock, packet);
1820 case SILC_PACKET_NEW_CLIENT:
1822 * Received new client packet. This includes client information that
1823 * we will use to create initial client ID. After creating new
1824 * ID we will send it to the client.
1826 SILC_LOG_DEBUG(("New Client packet"));
1827 if (packet->flags & SILC_PACKET_FLAG_LIST)
1829 silc_server_new_client(server, sock, packet);
1832 case SILC_PACKET_NEW_SERVER:
1834 * Received new server packet. This includes Server ID and some other
1835 * information that we may save. This is received after server has
1838 SILC_LOG_DEBUG(("New Server packet"));
1839 if (packet->flags & SILC_PACKET_FLAG_LIST)
1841 silc_server_new_server(server, sock, packet);
1844 case SILC_PACKET_NEW_CHANNEL:
1846 * Received new channel packet. Information about new channel in the
1847 * network are distributed using this packet.
1849 SILC_LOG_DEBUG(("New Channel packet"));
1850 if (packet->flags & SILC_PACKET_FLAG_LIST)
1851 silc_server_new_channel_list(server, sock, packet);
1853 silc_server_new_channel(server, sock, packet);
1856 case SILC_PACKET_HEARTBEAT:
1858 * Received heartbeat.
1860 SILC_LOG_DEBUG(("Heartbeat packet"));
1861 if (packet->flags & SILC_PACKET_FLAG_LIST)
1865 case SILC_PACKET_KEY_AGREEMENT:
1867 * Received heartbeat.
1869 SILC_LOG_DEBUG(("Key agreement packet"));
1870 if (packet->flags & SILC_PACKET_FLAG_LIST)
1872 silc_server_key_agreement(server, sock, packet);
1876 SILC_LOG_ERROR(("Incorrect packet type %d, packet dropped", type));
1882 /* Creates connection to a remote router. */
1884 void silc_server_create_connection(SilcServer server,
1885 char *remote_host, unsigned int port)
1887 SilcServerConnection sconn;
1889 /* Allocate connection object for hold connection specific stuff. */
1890 sconn = silc_calloc(1, sizeof(*sconn));
1891 sconn->server = server;
1892 sconn->remote_host = strdup(remote_host);
1893 sconn->remote_port = port;
1895 silc_task_register(server->timeout_queue, 0,
1896 silc_server_connect_router,
1897 (void *)sconn, 0, 1, SILC_TASK_TIMEOUT,
1898 SILC_TASK_PRI_NORMAL);
1901 /* Closes connection to socket connection */
1903 void silc_server_close_connection(SilcServer server,
1904 SilcSocketConnection sock)
1906 SILC_LOG_DEBUG(("Closing connection %d", sock->sock));
1908 /* We won't listen for this connection anymore */
1909 silc_schedule_unset_listen_fd(sock->sock);
1911 /* Unregister all tasks */
1912 silc_task_unregister_by_fd(server->io_queue, sock->sock);
1913 silc_task_unregister_by_fd(server->timeout_queue, sock->sock);
1915 /* Close the actual connection */
1916 silc_net_close_connection(sock->sock);
1917 server->sockets[sock->sock] = NULL;
1918 silc_socket_free(sock);
1921 /* Sends disconnect message to remote connection and disconnects the
1924 void silc_server_disconnect_remote(SilcServer server,
1925 SilcSocketConnection sock,
1926 const char *fmt, ...)
1929 unsigned char buf[4096];
1934 memset(buf, 0, sizeof(buf));
1936 vsprintf(buf, fmt, ap);
1939 SILC_LOG_DEBUG(("Disconnecting remote host"));
1941 SILC_LOG_INFO(("Disconnecting %s:%d [%s]", sock->hostname,
1943 (sock->type == SILC_SOCKET_TYPE_UNKNOWN ? "Unknown" :
1944 sock->type == SILC_SOCKET_TYPE_CLIENT ? "Client" :
1945 sock->type == SILC_SOCKET_TYPE_SERVER ? "Server" :
1948 /* Notify remote end that the conversation is over. The notify message
1949 is tried to be sent immediately. */
1950 silc_server_packet_send(server, sock, SILC_PACKET_DISCONNECT, 0,
1951 buf, strlen(buf), TRUE);
1953 /* Mark the connection to be disconnected */
1954 SILC_SET_DISCONNECTED(sock);
1955 silc_server_close_connection(server, sock);
1960 SilcClientEntry client;
1961 } *FreeClientInternal;
1963 SILC_TASK_CALLBACK(silc_server_free_client_data_timeout)
1965 FreeClientInternal i = (FreeClientInternal)context;
1967 silc_idlist_del_data(i->client);
1968 silc_idcache_purge_by_context(i->server->local_list->clients, i->client);
1972 /* Frees client data and notifies about client's signoff. */
1974 void silc_server_free_client_data(SilcServer server,
1975 SilcSocketConnection sock,
1976 SilcClientEntry client, char *signoff)
1978 FreeClientInternal i = silc_calloc(1, sizeof(*i));
1980 /* Send SIGNOFF notify to routers. */
1981 if (!server->standalone && server->router)
1982 silc_server_send_notify_signoff(server, server->router->connection,
1983 server->server_type == SILC_SERVER ?
1984 FALSE : TRUE, client->id,
1985 SILC_ID_CLIENT_LEN, signoff);
1987 /* Remove client from all channels */
1988 silc_server_remove_from_channels(server, sock, client, TRUE, signoff, TRUE);
1990 /* We will not delete the client entry right away. We will take it
1991 into history (for WHOWAS command) for 5 minutes */
1994 silc_task_register(server->timeout_queue, 0,
1995 silc_server_free_client_data_timeout,
1997 SILC_TASK_TIMEOUT, SILC_TASK_PRI_LOW);
1998 client->data.registered = FALSE;
2000 /* Free the client entry and everything in it */
2001 server->stat.my_clients--;
2002 server->stat.clients--;
2003 if (server->server_type == SILC_ROUTER)
2004 server->stat.cell_clients--;
2007 /* Frees user_data pointer from socket connection object. This also sends
2008 appropriate notify packets to the network to inform about leaving
2011 void silc_server_free_sock_user_data(SilcServer server,
2012 SilcSocketConnection sock)
2014 SILC_LOG_DEBUG(("Start"));
2016 switch(sock->type) {
2017 case SILC_SOCKET_TYPE_CLIENT:
2019 SilcClientEntry user_data = (SilcClientEntry)sock->user_data;
2020 silc_server_free_client_data(server, sock, user_data, NULL);
2023 case SILC_SOCKET_TYPE_SERVER:
2024 case SILC_SOCKET_TYPE_ROUTER:
2026 SilcServerEntry user_data = (SilcServerEntry)sock->user_data;
2028 /* Send REMOVE_ID packet to routers. */
2029 if (!server->standalone && server->router)
2030 silc_server_send_notify_server_signoff(server,
2031 server->router->connection,
2032 server->server_type ==
2034 FALSE : TRUE, user_data->id,
2035 SILC_ID_SERVER_LEN);
2037 /* Then also free all client entries that this server owns as
2038 they will become invalid now as well. */
2039 silc_server_remove_clients_by_server(server, user_data);
2041 /* If this was our primary router connection then we're lost to
2042 the outside world. */
2043 if (server->router == user_data) {
2044 server->id_entry->router = NULL;
2045 server->router = NULL;
2046 server->standalone = TRUE;
2049 /* Free the server entry */
2050 silc_idlist_del_data(user_data);
2051 silc_idlist_del_server(server->local_list, user_data);
2052 server->stat.my_servers--;
2053 server->stat.servers--;
2054 if (server->server_type == SILC_ROUTER)
2055 server->stat.cell_servers--;
2060 SilcUnknownEntry user_data = (SilcUnknownEntry)sock->user_data;
2062 silc_idlist_del_data(user_data);
2063 silc_free(user_data);
2068 sock->user_data = NULL;
2071 /* This function is used to remove all client entries by the server `entry'.
2072 This is called when the connection is lost to the server. In this case
2073 we must invalidate all the client entries owned by the server `entry'. */
2075 int silc_server_remove_clients_by_server(SilcServer server,
2076 SilcServerEntry entry)
2078 SilcIDCacheList list = NULL;
2079 SilcIDCacheEntry id_cache = NULL;
2080 SilcClientEntry client = NULL;
2082 SILC_LOG_DEBUG(("Start"));
2084 if (silc_idcache_find_by_id(server->local_list->clients,
2085 SILC_ID_CACHE_ANY, SILC_ID_CLIENT, &list)) {
2087 if (silc_idcache_list_first(list, &id_cache)) {
2089 client = (SilcClientEntry)id_cache->context;
2091 if (client->router != entry) {
2092 if (!silc_idcache_list_next(list, &id_cache))
2098 /* Remove the client entry */
2099 silc_server_remove_from_channels(server, NULL, client, TRUE,
2101 silc_idlist_del_client(server->local_list, client);
2103 if (!silc_idcache_list_next(list, &id_cache))
2107 silc_idcache_list_free(list);
2110 if (silc_idcache_find_by_id(server->global_list->clients,
2111 SILC_ID_CACHE_ANY, SILC_ID_CLIENT, &list)) {
2113 if (silc_idcache_list_first(list, &id_cache)) {
2115 client = (SilcClientEntry)id_cache->context;
2117 if (client->router != entry) {
2118 if (!silc_idcache_list_next(list, &id_cache))
2124 /* Remove the client entry */
2125 silc_server_remove_from_channels(server, NULL, client, TRUE,
2127 silc_idlist_del_client(server->global_list, client);
2129 if (!silc_idcache_list_next(list, &id_cache))
2133 silc_idcache_list_free(list);
2139 /* Checks whether given channel has global users. If it does this returns
2140 TRUE and FALSE if there is only locally connected clients on the channel. */
2142 int silc_server_channel_has_global(SilcChannelEntry channel)
2144 SilcChannelClientEntry chl;
2146 silc_list_start(channel->user_list);
2147 while ((chl = silc_list_get(channel->user_list)) != SILC_LIST_END) {
2148 if (chl->client->router)
2155 /* Checks whether given channel has locally connected users. If it does this
2156 returns TRUE and FALSE if there is not one locally connected client. */
2158 int silc_server_channel_has_local(SilcChannelEntry channel)
2160 SilcChannelClientEntry chl;
2162 silc_list_start(channel->user_list);
2163 while ((chl = silc_list_get(channel->user_list)) != SILC_LIST_END) {
2164 if (!chl->client->router)
2171 /* Removes client from all channels it has joined. This is used when client
2172 connection is disconnected. If the client on a channel is last, the
2173 channel is removed as well. This sends the SIGNOFF notify types. */
2175 void silc_server_remove_from_channels(SilcServer server,
2176 SilcSocketConnection sock,
2177 SilcClientEntry client,
2179 char *signoff_message,
2182 SilcChannelEntry channel;
2183 SilcChannelClientEntry chl;
2186 SILC_LOG_DEBUG(("Start"));
2188 if (!client || !client->id)
2191 clidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
2193 /* Remove the client from all channels. The client is removed from
2194 the channels' user list. */
2195 silc_list_start(client->channels);
2196 while ((chl = silc_list_get(client->channels)) != SILC_LIST_END) {
2197 channel = chl->channel;
2199 /* Remove channel from client's channel list */
2200 silc_list_del(client->channels, chl);
2202 /* Remove channel if there is no users anymore */
2203 if (server->server_type == SILC_ROUTER &&
2204 silc_list_count(channel->user_list) < 2) {
2205 if (!silc_idlist_del_channel(server->local_list, channel))
2206 silc_idlist_del_channel(server->global_list, channel);
2207 server->stat.my_channels--;
2211 /* Remove client from channel's client list */
2212 silc_list_del(channel->user_list, chl);
2214 server->stat.my_chanclients--;
2216 /* If there is no global users on the channel anymore mark the channel
2217 as local channel. */
2218 if (server->server_type == SILC_SERVER &&
2219 !silc_server_channel_has_global(channel))
2220 channel->global_users = FALSE;
2222 /* If there is not at least one local user on the channel then we don't
2223 need the channel entry anymore, we can remove it safely. */
2224 if (server->server_type == SILC_SERVER &&
2225 !silc_server_channel_has_local(channel)) {
2226 /* Notify about leaving client if this channel has global users. */
2227 if (notify && channel->global_users)
2228 silc_server_send_notify_to_channel(server, NULL, channel, FALSE,
2229 SILC_NOTIFY_TYPE_SIGNOFF,
2230 signoff_message ? 2 : 1,
2231 clidp->data, clidp->len,
2232 signoff_message, signoff_message ?
2233 strlen(signoff_message) : 0);
2235 if (!silc_idlist_del_channel(server->local_list, channel))
2236 silc_idlist_del_channel(server->global_list, channel);
2237 server->stat.my_channels--;
2241 /* Send notify to channel about client leaving SILC and thus
2242 the entire channel. */
2244 silc_server_send_notify_to_channel(server, NULL, channel, FALSE,
2245 SILC_NOTIFY_TYPE_SIGNOFF,
2246 signoff_message ? 2 : 1,
2247 clidp->data, clidp->len,
2248 signoff_message, signoff_message ?
2249 strlen(signoff_message) : 0);
2252 /* Re-generate channel key */
2253 silc_server_create_channel_key(server, channel, 0);
2255 /* Send the channel key to the channel. The key of course is not sent
2256 to the client who was removed f rom the channel. */
2257 silc_server_send_channel_key(server, client->connection, channel,
2258 server->server_type == SILC_ROUTER ?
2259 FALSE : !server->standalone);
2263 silc_buffer_free(clidp);
2266 /* Removes client from one channel. This is used for example when client
2267 calls LEAVE command to remove itself from the channel. Returns TRUE
2268 if channel still exists and FALSE if the channel is removed when
2269 last client leaves the channel. If `notify' is FALSE notify messages
2272 int silc_server_remove_from_one_channel(SilcServer server,
2273 SilcSocketConnection sock,
2274 SilcChannelEntry channel,
2275 SilcClientEntry client,
2278 SilcChannelEntry ch;
2279 SilcChannelClientEntry chl;
2282 SILC_LOG_DEBUG(("Start"));
2284 clidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
2286 /* Remove the client from the channel. The client is removed from
2287 the channel's user list. */
2288 silc_list_start(client->channels);
2289 while ((chl = silc_list_get(client->channels)) != SILC_LIST_END) {
2290 if (chl->channel != channel)
2295 /* Remove channel from client's channel list */
2296 silc_list_del(client->channels, chl);
2298 /* Remove channel if there is no users anymore */
2299 if (server->server_type == SILC_ROUTER &&
2300 silc_list_count(channel->user_list) < 2) {
2301 if (!silc_idlist_del_channel(server->local_list, channel))
2302 silc_idlist_del_channel(server->global_list, channel);
2303 silc_buffer_free(clidp);
2304 server->stat.my_channels--;
2308 /* Remove client from channel's client list */
2309 silc_list_del(channel->user_list, chl);
2311 server->stat.my_chanclients--;
2313 /* If there is no global users on the channel anymore mark the channel
2314 as local channel. */
2315 if (server->server_type == SILC_SERVER &&
2316 !silc_server_channel_has_global(channel))
2317 channel->global_users = FALSE;
2319 /* If there is not at least one local user on the channel then we don't
2320 need the channel entry anymore, we can remove it safely. */
2321 if (server->server_type == SILC_SERVER &&
2322 !silc_server_channel_has_local(channel)) {
2323 /* Notify about leaving client if this channel has global users. */
2324 if (notify && channel->global_users)
2325 silc_server_send_notify_to_channel(server, NULL, channel, FALSE,
2326 SILC_NOTIFY_TYPE_LEAVE, 1,
2327 clidp->data, clidp->len);
2329 if (!silc_idlist_del_channel(server->local_list, channel))
2330 silc_idlist_del_channel(server->global_list, channel);
2331 silc_buffer_free(clidp);
2332 server->stat.my_channels--;
2336 /* Send notify to channel about client leaving the channel */
2338 silc_server_send_notify_to_channel(server, NULL, channel, FALSE,
2339 SILC_NOTIFY_TYPE_LEAVE, 1,
2340 clidp->data, clidp->len);
2344 silc_buffer_free(clidp);
2348 /* Returns TRUE if the given client is on the channel. FALSE if not.
2349 This works because we assure that the user list on the channel is
2350 always in up to date thus we can only check the channel list from
2351 `client' which is faster than checking the user list from `channel'. */
2353 int silc_server_client_on_channel(SilcClientEntry client,
2354 SilcChannelEntry channel)
2356 SilcChannelClientEntry chl;
2358 if (!client || !channel)
2361 silc_list_start(client->channels);
2362 while ((chl = silc_list_get(client->channels)) != SILC_LIST_END)
2363 if (chl->channel == channel)
2369 /* Timeout callback. This is called if connection is idle or for some
2370 other reason is not responding within some period of time. This
2371 disconnects the remote end. */
2373 SILC_TASK_CALLBACK(silc_server_timeout_remote)
2375 SilcServer server = (SilcServer)context;
2376 SilcSocketConnection sock = server->sockets[fd];
2381 if (sock->user_data)
2382 silc_server_free_sock_user_data(server, sock);
2384 silc_server_disconnect_remote(server, sock,
2385 "Server closed connection: "
2386 "Connection timeout");
2389 /* Creates new channel. Sends NEW_CHANNEL packet to primary route. This
2390 function may be used only by router. In real SILC network all channels
2391 are created by routers thus this function is never used by normal
2394 SilcChannelEntry silc_server_create_new_channel(SilcServer server,
2395 SilcServerID *router_id,
2401 SilcChannelID *channel_id;
2402 SilcChannelEntry entry;
2406 SILC_LOG_DEBUG(("Creating new channel"));
2409 cipher = "aes-256-cbc";
2411 hmac = "hmac-sha1-96";
2413 /* Allocate cipher */
2414 if (!silc_cipher_alloc(cipher, &key))
2418 if (!silc_hmac_alloc(hmac, NULL, &newhmac)) {
2419 silc_cipher_free(key);
2423 channel_name = strdup(channel_name);
2425 /* Create the channel */
2426 silc_id_create_channel_id(router_id, server->rng, &channel_id);
2427 entry = silc_idlist_add_channel(server->local_list, channel_name,
2428 SILC_CHANNEL_MODE_NONE, channel_id,
2429 NULL, key, newhmac);
2431 silc_free(channel_name);
2435 /* Now create the actual key material */
2436 silc_server_create_channel_key(server, entry,
2437 silc_cipher_get_key_len(key) / 8);
2439 /* Notify other routers about the new channel. We send the packet
2440 to our primary route. */
2441 if (broadcast && server->standalone == FALSE) {
2442 silc_server_send_new_channel(server, server->router->connection, TRUE,
2443 channel_name, entry->id, SILC_ID_CHANNEL_LEN);
2446 server->stat.my_channels++;
2451 /* Same as above but creates the channel with Channel ID `channel_id. */
2454 silc_server_create_new_channel_with_id(SilcServer server,
2458 SilcChannelID *channel_id,
2461 SilcChannelEntry entry;
2465 SILC_LOG_DEBUG(("Creating new channel"));
2468 cipher = "aes-256-cbc";
2470 hmac = "hmac-sha1-96";
2472 /* Allocate cipher */
2473 if (!silc_cipher_alloc(cipher, &key))
2477 if (!silc_hmac_alloc(hmac, NULL, &newhmac)) {
2478 silc_cipher_free(key);
2482 channel_name = strdup(channel_name);
2484 /* Create the channel */
2485 entry = silc_idlist_add_channel(server->local_list, channel_name,
2486 SILC_CHANNEL_MODE_NONE, channel_id,
2487 NULL, key, newhmac);
2489 silc_free(channel_name);
2493 /* Now create the actual key material */
2494 silc_server_create_channel_key(server, entry,
2495 silc_cipher_get_key_len(key) / 8);
2497 /* Notify other routers about the new channel. We send the packet
2498 to our primary route. */
2499 if (broadcast && server->standalone == FALSE) {
2500 silc_server_send_new_channel(server, server->router->connection, TRUE,
2501 channel_name, entry->id, SILC_ID_CHANNEL_LEN);
2504 server->stat.my_channels++;
2509 /* Generates new channel key. This is used to create the initial channel key
2510 but also to re-generate new key for channel. If `key_len' is provided
2511 it is the bytes of the key length. */
2513 void silc_server_create_channel_key(SilcServer server,
2514 SilcChannelEntry channel,
2515 unsigned int key_len)
2518 unsigned char channel_key[32], hash[32];
2521 SILC_LOG_DEBUG(("Generating channel key"));
2523 if (!channel->channel_key)
2524 if (!silc_cipher_alloc("aes-256-cbc", &channel->channel_key))
2529 else if (channel->key_len)
2530 len = channel->key_len / 8;
2532 len = silc_cipher_get_key_len(channel->channel_key) / 8;
2534 /* Create channel key */
2535 for (i = 0; i < len; i++) channel_key[i] = silc_rng_get_byte(server->rng);
2538 silc_cipher_set_key(channel->channel_key, channel_key, len * 8);
2540 /* Remove old key if exists */
2542 memset(channel->key, 0, channel->key_len / 8);
2543 silc_free(channel->key);
2547 channel->key_len = len * 8;
2548 channel->key = silc_calloc(len, sizeof(*channel->key));
2549 memcpy(channel->key, channel_key, len);
2550 memset(channel_key, 0, sizeof(channel_key));
2552 /* Generate HMAC key from the channel key data and set it */
2554 silc_hmac_alloc("hmac-sha1-96", NULL, &channel->hmac);
2555 silc_hash_make(channel->hmac->hash, channel->key, len, hash);
2556 silc_hmac_set_key(channel->hmac, hash, silc_hash_len(channel->hmac->hash));
2557 memset(hash, 0, sizeof(hash));
2560 /* Saves the channel key found in the encoded `key_payload' buffer. This
2561 function is used when we receive Channel Key Payload and also when we're
2562 processing JOIN command reply. Returns entry to the channel. */
2564 SilcChannelEntry silc_server_save_channel_key(SilcServer server,
2565 SilcBuffer key_payload,
2566 SilcChannelEntry channel)
2568 SilcChannelKeyPayload payload = NULL;
2569 SilcChannelID *id = NULL;
2570 unsigned char *tmp, hash[32];
2571 unsigned int tmp_len;
2574 /* Decode channel key payload */
2575 payload = silc_channel_key_payload_parse(key_payload);
2577 SILC_LOG_ERROR(("Bad channel key payload, dropped"));
2582 /* Get the channel entry */
2585 /* Get channel ID */
2586 tmp = silc_channel_key_get_id(payload, &tmp_len);
2587 id = silc_id_str2id(tmp, tmp_len, SILC_ID_CHANNEL);
2593 channel = silc_idlist_find_channel_by_id(server->local_list, id, NULL);
2595 channel = silc_idlist_find_channel_by_id(server->global_list, id, NULL);
2597 SILC_LOG_ERROR(("Received key for non-existent channel"));
2603 tmp = silc_channel_key_get_key(payload, &tmp_len);
2609 cipher = silc_channel_key_get_cipher(payload, NULL);
2615 /* Remove old key if exists */
2617 memset(channel->key, 0, channel->key_len / 8);
2618 silc_free(channel->key);
2619 silc_cipher_free(channel->channel_key);
2622 /* Create new cipher */
2623 if (!silc_cipher_alloc(cipher, &channel->channel_key)) {
2629 channel->key_len = tmp_len * 8;
2630 channel->key = silc_calloc(tmp_len, sizeof(unsigned char));
2631 memcpy(channel->key, tmp, tmp_len);
2632 silc_cipher_set_key(channel->channel_key, tmp, channel->key_len);
2634 /* Generate HMAC key from the channel key data and set it */
2636 silc_hmac_alloc("hmac-sha1-96", NULL, &channel->hmac);
2637 silc_hash_make(channel->hmac->hash, tmp, tmp_len, hash);
2638 silc_hmac_set_key(channel->hmac, hash, silc_hash_len(channel->hmac->hash));
2640 memset(hash, 0, sizeof(hash));
2641 memset(tmp, 0, tmp_len);
2647 silc_channel_key_payload_free(payload);
2652 /* Heartbeat callback. This function is set as argument for the
2653 silc_socket_set_heartbeat function. The library will call this function
2654 at the set time interval. */
2656 void silc_server_perform_heartbeat(SilcSocketConnection sock,
2659 SilcServerHBContext hb = (SilcServerHBContext)hb_context;
2661 SILC_LOG_DEBUG(("Sending heartbeat to %s (%s)", sock->hostname,
2664 /* Send the heartbeat */
2665 silc_server_send_heartbeat(hb->server, sock);
2668 /* Returns assembled of all servers in the given ID list. The packet's
2669 form is dictated by the New ID payload. */
2671 static void silc_server_announce_get_servers(SilcServer server,
2673 SilcBuffer *servers)
2675 SilcIDCacheList list;
2676 SilcIDCacheEntry id_cache;
2677 SilcServerEntry entry;
2680 /* Go through all clients in the list */
2681 if (silc_idcache_find_by_id(id_list->clients, SILC_ID_CACHE_ANY,
2682 SILC_ID_SERVER, &list)) {
2683 if (silc_idcache_list_first(list, &id_cache)) {
2685 entry = (SilcServerEntry)id_cache->context;
2687 idp = silc_id_payload_encode(entry->id, SILC_ID_SERVER);
2689 *servers = silc_buffer_realloc(*servers,
2691 (*servers)->truelen + idp->len :
2693 silc_buffer_pull_tail(*servers, ((*servers)->end - (*servers)->data));
2694 silc_buffer_put(*servers, idp->data, idp->len);
2695 silc_buffer_pull(*servers, idp->len);
2696 silc_buffer_free(idp);
2698 if (!silc_idcache_list_next(list, &id_cache))
2703 silc_idcache_list_free(list);
2707 /* This function is used by router to announce existing servers to our
2708 primary router when we've connected to it. */
2710 void silc_server_announce_servers(SilcServer server)
2712 SilcBuffer servers = NULL;
2714 SILC_LOG_DEBUG(("Announcing servers"));
2716 /* Get servers in local list */
2717 silc_server_announce_get_servers(server, server->local_list, &servers);
2719 /* Get servers in global list */
2720 silc_server_announce_get_servers(server, server->global_list, &servers);
2723 silc_buffer_push(servers, servers->data - servers->head);
2724 SILC_LOG_HEXDUMP(("servers"), servers->data, servers->len);
2726 /* Send the packet */
2727 silc_server_packet_send(server, server->router->connection,
2728 SILC_PACKET_NEW_ID, SILC_PACKET_FLAG_LIST,
2729 servers->data, servers->len, TRUE);
2731 silc_buffer_free(servers);
2735 /* Returns assembled packet of all clients in the given ID list. The
2736 packet's form is dictated by the New ID Payload. */
2738 static void silc_server_announce_get_clients(SilcServer server,
2740 SilcBuffer *clients)
2742 SilcIDCacheList list;
2743 SilcIDCacheEntry id_cache;
2744 SilcClientEntry client;
2747 /* Go through all clients in the list */
2748 if (silc_idcache_find_by_id(id_list->clients, SILC_ID_CACHE_ANY,
2749 SILC_ID_CLIENT, &list)) {
2750 if (silc_idcache_list_first(list, &id_cache)) {
2752 client = (SilcClientEntry)id_cache->context;
2754 idp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
2756 *clients = silc_buffer_realloc(*clients,
2758 (*clients)->truelen + idp->len :
2760 silc_buffer_pull_tail(*clients, ((*clients)->end - (*clients)->data));
2761 silc_buffer_put(*clients, idp->data, idp->len);
2762 silc_buffer_pull(*clients, idp->len);
2763 silc_buffer_free(idp);
2765 if (!silc_idcache_list_next(list, &id_cache))
2770 silc_idcache_list_free(list);
2774 /* This function is used to announce our existing clients to our router
2775 when we've connected to it. */
2777 void silc_server_announce_clients(SilcServer server)
2779 SilcBuffer clients = NULL;
2781 SILC_LOG_DEBUG(("Announcing clients"));
2783 /* Get clients in local list */
2784 silc_server_announce_get_clients(server, server->local_list,
2787 /* As router we announce our global list as well */
2788 if (server->server_type == SILC_ROUTER)
2789 silc_server_announce_get_clients(server, server->global_list,
2793 silc_buffer_push(clients, clients->data - clients->head);
2794 SILC_LOG_HEXDUMP(("clients"), clients->data, clients->len);
2796 /* Send the packet */
2797 silc_server_packet_send(server, server->router->connection,
2798 SILC_PACKET_NEW_ID, SILC_PACKET_FLAG_LIST,
2799 clients->data, clients->len, TRUE);
2801 silc_buffer_free(clients);
2806 silc_server_announce_encode_join(unsigned int argc, ...)
2811 return silc_notify_payload_encode(SILC_NOTIFY_TYPE_JOIN, argc, ap);
2814 /* Returns assembled packets for all channels and users on those channels
2815 from the given ID List. The packets are in the form dictated by the
2816 New Channel and New Channel User payloads. */
2818 static void silc_server_announce_get_channels(SilcServer server,
2820 SilcBuffer *channels,
2821 SilcBuffer *channel_users)
2823 SilcIDCacheList list;
2824 SilcIDCacheEntry id_cache;
2825 SilcChannelEntry channel;
2826 SilcChannelClientEntry chl;
2829 unsigned short name_len;
2832 /* Go through all channels in the list */
2833 if (silc_idcache_find_by_id(id_list->channels, SILC_ID_CACHE_ANY,
2834 SILC_ID_CHANNEL, &list)) {
2835 if (silc_idcache_list_first(list, &id_cache)) {
2837 channel = (SilcChannelEntry)id_cache->context;
2839 cid = silc_id_id2str(channel->id, SILC_ID_CHANNEL);
2840 name_len = strlen(channel->channel_name);
2842 len = 4 + name_len + SILC_ID_CHANNEL_LEN;
2844 silc_buffer_realloc(*channels,
2845 (*channels ? (*channels)->truelen + len : len));
2846 silc_buffer_pull_tail(*channels,
2847 ((*channels)->end - (*channels)->data));
2848 silc_buffer_format(*channels,
2849 SILC_STR_UI_SHORT(name_len),
2850 SILC_STR_UI_XNSTRING(channel->channel_name,
2852 SILC_STR_UI_SHORT(SILC_ID_CHANNEL_LEN),
2853 SILC_STR_UI_XNSTRING(cid, SILC_ID_CHANNEL_LEN),
2855 silc_buffer_pull(*channels, len);
2857 /* Now find all users on the channel */
2858 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
2859 silc_list_start(channel->user_list);
2860 while ((chl = silc_list_get(channel->user_list)) != SILC_LIST_END) {
2864 clidp = silc_id_payload_encode(chl->client->id, SILC_ID_CLIENT);
2866 tmp = silc_server_announce_encode_join(2, clidp->data, clidp->len,
2867 chidp->data, chidp->len);
2870 silc_buffer_realloc(*channel_users,
2872 (*channel_users)->truelen + len : len));
2873 silc_buffer_pull_tail(*channel_users,
2874 ((*channel_users)->end -
2875 (*channel_users)->data));
2877 silc_buffer_put(*channel_users, tmp->data, tmp->len);
2878 silc_buffer_pull(*channel_users, len);
2879 silc_buffer_free(clidp);
2880 silc_buffer_free(tmp);
2882 silc_buffer_free(chidp);
2886 if (!silc_idcache_list_next(list, &id_cache))
2891 silc_idcache_list_free(list);
2895 /* This function is used to announce our existing channels to our router
2896 when we've connected to it. This also announces the users on the
2897 channels to the router. */
2899 void silc_server_announce_channels(SilcServer server)
2901 SilcBuffer channels = NULL, channel_users = NULL;
2903 SILC_LOG_DEBUG(("Announcing channels and channel users"));
2905 /* Get channels and channel users in local list */
2906 silc_server_announce_get_channels(server, server->local_list,
2907 &channels, &channel_users);
2909 /* Get channels and channel users in global list */
2910 silc_server_announce_get_channels(server, server->global_list,
2911 &channels, &channel_users);
2914 silc_buffer_push(channels, channels->data - channels->head);
2915 SILC_LOG_HEXDUMP(("channels"), channels->data, channels->len);
2917 /* Send the packet */
2918 silc_server_packet_send(server, server->router->connection,
2919 SILC_PACKET_NEW_CHANNEL, SILC_PACKET_FLAG_LIST,
2920 channels->data, channels->len,
2923 silc_buffer_free(channels);
2926 if (channel_users) {
2927 silc_buffer_push(channel_users, channel_users->data - channel_users->head);
2928 SILC_LOG_HEXDUMP(("channel users"), channel_users->data,
2929 channel_users->len);
2931 /* Send the packet */
2932 silc_server_packet_send(server, server->router->connection,
2933 SILC_PACKET_NOTIFY, SILC_PACKET_FLAG_LIST,
2934 channel_users->data, channel_users->len,
2937 silc_buffer_free(channel_users);
2941 /* Failure timeout callback. If this is called then we will immediately
2942 process the received failure. We always process the failure with timeout
2943 since we do not want to blindly trust to received failure packets.
2944 This won't be called (the timeout is cancelled) if the failure was
2945 bogus (it is bogus if remote does not close the connection after sending
2948 SILC_TASK_CALLBACK(silc_server_failure_callback)
2950 SilcServerFailureContext f = (SilcServerFailureContext)context;
2952 if (f->sock->protocol) {
2953 f->sock->protocol->state = SILC_PROTOCOL_STATE_FAILURE;
2954 f->sock->protocol->execute(f->server->timeout_queue, 0,
2955 f->sock->protocol, f->sock->sock, 0, 0);
2961 /* Assembles user list and users mode list from the `channel'. */
2963 void silc_server_get_users_on_channel(SilcServer server,
2964 SilcChannelEntry channel,
2965 SilcBuffer *user_list,
2966 SilcBuffer *mode_list,
2967 unsigned int *user_count)
2969 SilcChannelClientEntry chl;
2970 SilcBuffer client_id_list;
2971 SilcBuffer client_mode_list;
2973 unsigned int list_count = 0;
2975 client_id_list = silc_buffer_alloc((SILC_ID_CLIENT_LEN + 4) *
2976 silc_list_count(channel->user_list));
2977 client_mode_list = silc_buffer_alloc(4 *
2978 silc_list_count(channel->user_list));
2979 silc_buffer_pull_tail(client_id_list, SILC_BUFFER_END(client_id_list));
2980 silc_buffer_pull_tail(client_mode_list, SILC_BUFFER_END(client_mode_list));
2981 silc_list_start(channel->user_list);
2982 while ((chl = silc_list_get(channel->user_list)) != SILC_LIST_END) {
2984 idp = silc_id_payload_encode(chl->client->id, SILC_ID_CLIENT);
2985 silc_buffer_put(client_id_list, idp->data, idp->len);
2986 silc_buffer_pull(client_id_list, idp->len);
2987 silc_buffer_free(idp);
2989 /* Client's mode on channel */
2990 SILC_PUT32_MSB(chl->mode, client_mode_list->data);
2991 silc_buffer_pull(client_mode_list, 4);
2995 silc_buffer_push(client_id_list,
2996 client_id_list->data - client_id_list->head);
2997 silc_buffer_push(client_mode_list,
2998 client_mode_list->data - client_mode_list->head);
3000 *user_list = client_id_list;
3001 *mode_list = client_mode_list;
3002 *user_count = list_count;
3005 /* Saves users and their modes to the `channel'. */
3007 void silc_server_save_users_on_channel(SilcServer server,
3008 SilcSocketConnection sock,
3009 SilcChannelEntry channel,
3010 SilcClientID *noadd,
3011 SilcBuffer user_list,
3012 SilcBuffer mode_list,
3013 unsigned int user_count)
3017 /* Cache the received Client ID's and modes. This cache expires
3018 whenever server sends notify message to channel. It means two things;
3019 some user has joined or leaved the channel. XXX TODO! */
3020 for (i = 0; i < user_count; i++) {
3021 unsigned short idp_len;
3023 SilcClientID *client_id;
3024 SilcClientEntry client;
3027 SILC_GET16_MSB(idp_len, user_list->data + 2);
3029 client_id = silc_id_payload_parse_id(user_list->data, idp_len);
3030 silc_buffer_pull(user_list, idp_len);
3035 SILC_GET32_MSB(mode, mode_list->data);
3036 silc_buffer_pull(mode_list, 4);
3038 if (noadd && !SILC_ID_CLIENT_COMPARE(client_id, noadd)) {
3039 silc_free(client_id);
3043 /* Check if we have this client cached already. */
3044 client = silc_idlist_find_client_by_id(server->local_list, client_id,
3047 client = silc_idlist_find_client_by_id(server->global_list,
3050 /* If router did not find such Client ID in its lists then this must
3051 be bogus client or some router in the net is buggy. */
3052 if (server->server_type == SILC_ROUTER) {
3053 silc_free(client_id);
3057 /* We don't have that client anywhere, add it. The client is added
3058 to global list since server didn't have it in the lists so it must be
3060 client = silc_idlist_add_client(server->global_list, NULL, NULL, NULL,
3061 silc_id_dup(client_id, SILC_ID_CLIENT),
3062 sock->user_data, NULL);
3064 silc_free(client_id);
3069 silc_free(client_id);
3071 if (!silc_server_client_on_channel(client, channel)) {
3072 /* Client was not on the channel, add it. */
3073 SilcChannelClientEntry chl = silc_calloc(1, sizeof(*chl));
3074 chl->client = client;
3076 chl->channel = channel;
3077 silc_list_add(channel->user_list, chl);
3078 silc_list_add(client->channels, chl);