File:
[LON-CAPA] /
loncom /
LondConnection.pm
Revision
1.44:
download - view:
text,
annotated -
select for diffs
Wed Mar 28 20:28:29 2007 UTC (17 years, 6 months ago) by
albertel
Branches:
MAIN
CVS tags:
HEAD
- eliminate any reading of hosts.tab from loncnew
- launch of lonc connection requires passing the lonid through the common
launch socket
- dealyed messages getting sent again (requires loncnew using lonnet....)
1: # This module defines and implements a class that represents
2: # a connection to a lond daemon.
3: #
4: # $Id: LondConnection.pm,v 1.44 2007/03/28 20:28:29 albertel Exp $
5: #
6: # Copyright Michigan State University Board of Trustees
7: #
8: # This file is part of the LearningOnline Network with CAPA (LON-CAPA).
9: #
10: # LON-CAPA is free software; you can redistribute it and/or modify
11: # it under the terms of the GNU General Public License as published by
12: # the Free Software Foundation; either version 2 of the License, or
13: # (at your option) any later version.
14: #
15: # LON-CAPA is distributed in the hope that it will be useful,
16: # but WITHOUT ANY WARRANTY; without even the implied warranty of
17: # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18: # GNU General Public License for more details.
19: #
20: # You should have received a copy of the GNU General Public License
21: # along with LON-CAPA; if not, write to the Free Software
22: # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
23: #
24: # /home/httpd/html/adm/gpl.txt
25: #
26: # http://www.lon-capa.org/
27: #
28:
29: package LondConnection;
30:
31: use strict;
32: use IO::Socket;
33: use IO::Socket::INET;
34: use IO::Handle;
35: use IO::File;
36: use Fcntl;
37: use POSIX;
38: use Crypt::IDEA;
39: use LONCAPA::lonlocal;
40: use LONCAPA::lonssl;
41:
42:
43:
44:
45: my $DebugLevel=0;
46: my %perlvar;
47: my $InsecureOk;
48:
49: #
50: # Set debugging level
51: #
52: sub SetDebug {
53: $DebugLevel = shift;
54: }
55:
56: #
57: # The config read is done in this way to support the read of
58: # the non-default configuration file in the
59: # event we are being used outside of loncapa.
60: #
61:
62: my $ConfigRead = 0;
63:
64: # Read the configuration file for apache to get the perl
65: # variables set.
66:
67: sub ReadConfig {
68: Debug(8, "ReadConfig called");
69:
70: my $perlvarref = read_conf('loncapa.conf');
71: %perlvar = %{$perlvarref};
72: $ConfigRead = 1;
73:
74: $InsecureOk = $perlvar{loncAllowInsecure};
75: }
76:
77: sub Debug {
78:
79: my ($level, $message) = @_;
80:
81: if ($level < $DebugLevel) {
82: print STDERR ($message."\n");
83: }
84: }
85:
86: =pod
87:
88: =head2 Dump
89:
90: Dump the internal state of the object: For debugging purposes, to stderr.
91:
92: =cut
93:
94: sub Dump {
95: my $self = shift;
96: my $level = shift;
97: my $now = time;
98: my $local = localtime($now);
99:
100: if ($level >= $DebugLevel) {
101: return;
102: }
103:
104:
105: my $key;
106: my $value;
107: print STDERR "[ $local ] Dumping LondConnectionObject:\n";
108: print STDERR join(':',caller(1))."\n";
109: while(($key, $value) = each %$self) {
110: print STDERR "$key -> $value\n";
111: }
112: print STDERR "-------------------------------\n";
113: }
114:
115: =pod
116:
117: Local function to do a state transition. If the state transition
118: callback is defined it is called with two parameters: the self and the
119: old state.
120:
121: =cut
122:
123: sub Transition {
124:
125: my ($self, $newstate) = @_;
126:
127: my $oldstate = $self->{State};
128: $self->{State} = $newstate;
129: $self->{TimeoutRemaining} = $self->{TimeoutValue};
130: if($self->{TransitionCallback}) {
131: ($self->{TransitionCallback})->($self, $oldstate);
132: }
133: }
134:
135:
136:
137: =pod
138:
139: =head2 new
140:
141: Construct a new lond connection.
142:
143: Parameters (besides the class name) include:
144:
145: =item hostname
146:
147: host the remote lond is on. This host is a host in the hosts.tab file
148:
149: =item port
150:
151: port number the remote lond is listening on.
152:
153: =cut
154:
155: sub new {
156: my ($class, $DnsName, $Port, $lonid) = @_;
157:
158: if (!$ConfigRead) {
159: ReadConfig();
160: $ConfigRead = 1;
161: }
162: &Debug(4,$class."::new( ".$DnsName.",".$Port.")\n");
163:
164: # The host must map to an entry in the hosts table:
165: # We connect to the dns host that corresponds to that
166: # system and use the hostname for the encryption key
167: # negotion. In the objec these become the Host and
168: # LoncapaHim fields of the object respectively.
169: #
170: # if it is me use loopback for connection
171: if ($DnsName eq &main::my_hostname()) { $DnsName="127.0.0.1"; }
172: Debug(9, "Connecting to $DnsName");
173: # Now create the object...
174: my $self = { Host => $DnsName,
175: LoncapaHim => $lonid,
176: Port => $Port,
177: State => "Initialized",
178: AuthenticationMode => "",
179: TransactionRequest => "",
180: TransactionReply => "",
181: NextRequest => "",
182: InformReadable => 0,
183: InformWritable => 0,
184: TimeoutCallback => undef,
185: TransitionCallback => undef,
186: Timeoutable => 0,
187: TimeoutValue => 3,
188: TimeoutRemaining => 0,
189: LocalKeyFile => "",
190: CipherKey => "",
191: LondVersion => "Unknown",
192: Cipher => undef};
193: bless($self, $class);
194: unless ($self->{Socket} = IO::Socket::INET->new(PeerHost => $self->{Host},
195: PeerPort => $self->{Port},
196: Type => SOCK_STREAM,
197: Proto => "tcp",
198: Timeout => 3)) {
199: Debug(8, "Error? \n$@ \n$!");
200: return undef; # Inidicates the socket could not be made.
201: }
202: my $socket = $self->{Socket}; # For local use only.
203: # If we are local, we'll first try local auth mode, otherwise, we'll try
204: # the ssl auth mode:
205:
206: my $key;
207: my $keyfile;
208: if ($DnsName eq '127.0.0.1') {
209: $self->{AuthenticationMode} = "local";
210: ($key, $keyfile) = lonlocal::CreateKeyFile();
211: Debug(8, "Local key: $key, stored in $keyfile");
212:
213: # If I can't make the key file fall back to insecure if
214: # allowed...else give up right away.
215:
216: if(!(defined $key) || !(defined $keyfile)) {
217: if($InsecureOk) {
218: $self->{AuthenticationMode} = "insecure";
219: $self->{TransactionRequest} = "init\n";
220: }
221: else {
222: $socket->close;
223: return undef;
224: }
225: }
226: $self->{TransactionRequest} = "init:local:$keyfile\n";
227: Debug(9, "Init string is init:local:$keyfile");
228: if(!$self->CreateCipher($key)) { # Nothing's going our way...
229: $socket->close;
230: return undef;
231: }
232:
233: } else {
234: # Remote peer: I'd like to do ssl, but if my host key or certificates
235: # are not all installed, my only choice is insecure, if that's
236: # allowed:
237:
238: my ($ca, $cert) = lonssl::CertificateFile;
239: my $sslkeyfile = lonssl::KeyFile;
240:
241: if((defined $ca) && (defined $cert) && (defined $sslkeyfile)) {
242:
243: $self->{AuthenticationMode} = "ssl";
244: $self->{TransactionRequest} = "init:ssl\n";
245: } else {
246: if($InsecureOk) { # Allowed to do insecure:
247: $self->{AuthenticationMode} = "insecure";
248: $self->{TransactionRequest} = "init\n";
249: }
250: else { # Not allowed to do insecure...
251: $socket->close;
252: return undef;
253: }
254: }
255: }
256:
257: #
258: # We're connected. Set the state, and the events we'll accept:
259: #
260: $self->Transition("Connected");
261: $self->{InformWritable} = 1; # When socket is writable we send init
262: $self->{Timeoutable} = 1; # Timeout allowed during startup negotiation.
263:
264:
265: #
266: # Set socket to nonblocking I/O.
267: #
268: my $flags = fcntl($socket, F_GETFL,0);
269: if(!$flags) {
270: $socket->close;
271: return undef;
272: }
273: if(!fcntl($socket, F_SETFL, $flags | O_NONBLOCK)) {
274: $socket->close;
275: return undef;
276: }
277:
278: # return the object :
279:
280: Debug(9, "Initial object state: ");
281: $self->Dump(9);
282:
283: return $self;
284: }
285:
286: =pod
287:
288: =head2 Readable
289:
290: This member should be called when the Socket becomes readable. Until
291: the read completes, action is state independet. Data are accepted into
292: the TransactionReply until a newline character is received. At that
293: time actionis state dependent:
294:
295: =item Connected
296:
297: in this case we received challenge, the state changes to
298: ChallengeReceived, and we initiate a send with the challenge response.
299:
300: =item ReceivingReply
301:
302: In this case a reply has been received for a transaction, the state
303: goes to Idle and we disable write and read notification.
304:
305: =item ChallengeReeived
306:
307: we just got what should be an ok\n and the connection can now handle
308: transactions.
309:
310: =cut
311:
312: sub Readable {
313: my $self = shift;
314: my $socket = $self->{Socket};
315: my $data = '';
316: my $rv;
317: my $ConnectionMode = $self->{AuthenticationMode};
318:
319: if ($socket) {
320: eval {
321: $rv = $socket->recv($data, POSIX::BUFSIZ, 0);
322: }
323: } else {
324: $self->Transition("Disconnected");
325: return -1;
326: }
327: my $errno = $! + 0; # Force numeric context.
328:
329: unless (defined($rv) && length $data) {# Read failed,
330: if(($errno == POSIX::EWOULDBLOCK) ||
331: ($errno == POSIX::EAGAIN) ||
332: ($errno == POSIX::EINTR)) {
333: return 0;
334: }
335:
336: # Connection likely lost.
337: &Debug(4, "Connection lost");
338: $self->{TransactionRequest} = '';
339: $socket->close();
340: $self->Transition("Disconnected");
341: return -1;
342: }
343: # Append the data to the buffer. And figure out if the read is done:
344:
345: &Debug(9,"Received from host: ".$data);
346: $self->{TransactionReply} .= $data;
347: if($self->{TransactionReply} =~ m/\n$/) {
348: &Debug(8,"Readable End of line detected");
349:
350:
351: if ($self->{State} eq "Initialized") { # We received the challenge:
352: # Our init was replied to. What happens next depends both on
353: # the actual init we sent (AuthenticationMode member data)
354: # and the response:
355: # AuthenticationMode == local:
356: # Response ok: The key has been exchanged and
357: # the key file destroyed. We can jump
358: # into setting the host and requesting the
359: # Later we'll also bypass key exchange.
360: # Response digits:
361: # Old style lond. Delete the keyfile.
362: # If allowed fall back to insecure mode.
363: # else close connection and fail.
364: # Response other:
365: # Failed local auth
366: # Close connection and fail.
367: #
368: # AuthenticationMode == ssl:
369: # Response ok:ssl
370: # Response digits:
371: # Response other:
372: # Authentication mode == insecure
373: # Response digits
374: # Response other:
375:
376: my $Response = $self->{TransactionReply};
377: if($ConnectionMode eq "local") {
378: if($Response =~ /^ok:local/) { # Good local auth.
379: $self->ToVersionRequest();
380: return 0;
381: }
382: elsif ($Response =~/^[0-9]+/) { # Old style lond.
383: return $self->CompleteInsecure();
384:
385: }
386: else { # Complete flop
387: &Debug(3, "init:local : unrecognized reply");
388: $self->Transition("Disconnected");
389: $socket->close;
390: return -1;
391: }
392: }
393: elsif ($ConnectionMode eq "ssl") {
394: if($Response =~ /^ok:ssl/) { # Good ssl...
395: if($self->ExchangeKeysViaSSL()) { # Success skip to vsn stuff
396: # Need to reset to non blocking:
397:
398: my $flags = fcntl($socket, F_GETFL, 0);
399: fcntl($socket, F_SETFL, $flags | O_NONBLOCK);
400: $self->ToVersionRequest();
401: return 0;
402: }
403: else { # Failed in ssl exchange.
404: &Debug(3,"init:ssl failed key negotiation!");
405: $self->Transition("Disconnected");
406: $socket->close;
407: return -1;
408: }
409: }
410: elsif ($Response =~ /^[0-9]+/) { # Old style lond.
411: return $self->CompleteInsecure();
412: }
413: else { # Complete flop
414: }
415: }
416: elsif ($ConnectionMode eq "insecure") {
417: if($self->{TransactionReply} eq "refused\n") { # Remote doesn't have
418:
419: $self->Transition("Disconnected"); # in host tables.
420: $socket->close();
421: return -1;
422:
423: }
424: return $self->CompleteInsecure();
425: }
426: else {
427: &Debug(1,"Authentication mode incorrect");
428: die "BUG!!! LondConnection::Readable invalid authmode";
429: }
430:
431:
432: } elsif ($self->{State} eq "ChallengeReplied") {
433: if($self->{TransactionReply} ne "ok\n") {
434: $self->Transition("Disconnected");
435: $socket->close();
436: return -1;
437: }
438: $self->ToVersionRequest();
439: return 0;
440:
441: } elsif ($self->{State} eq "ReadingVersionString") {
442: chomp($self->{TransactionReply});
443: $self->{LondVersion} = $self->{TransactionReply};
444: $self->Transition("SetHost");
445: $self->{InformReadable} = 0;
446: $self->{InformWritable} = 1;
447: my $peer = $self->{LoncapaHim};
448: $self->{TransactionRequest}= "sethost:$peer\n";
449: return 0;
450: } elsif ($self->{State} eq "HostSet") { # should be ok.
451: if($self->{TransactionReply} ne "ok\n") {
452: $self->Transition("Disconnected");
453: $socket->close();
454: return -1;
455: }
456: # If the auth mode is insecure we must still
457: # exchange session keys. Otherwise,
458: # we can just transition to idle.
459:
460: if($ConnectionMode eq "insecure") {
461: $self->Transition("RequestingKey");
462: $self->{InformReadable} = 0;
463: $self->{InformWritable} = 1;
464: $self->{TransactionRequest} = "ekey\n";
465: return 0;
466: }
467: else {
468: $self->ToIdle();
469: return 0;
470: }
471: } elsif ($self->{State} eq "ReceivingKey") {
472: my $buildkey = $self->{TransactionReply};
473: my $key = $self->{LoncapaHim}.$perlvar{'lonHostID'};
474: $key=~tr/a-z/A-Z/;
475: $key=~tr/G-P/0-9/;
476: $key=~tr/Q-Z/0-9/;
477: $key =$key.$buildkey.$key.$buildkey.$key.$buildkey;
478: $key = substr($key,0,32);
479: if(!$self->CreateCipher($key)) {
480: $self->Transition("Disconnected");
481: $socket->close();
482: return -1;
483: } else {
484: $self->ToIdle();
485: return 0;
486: }
487: } elsif ($self->{State} eq "ReceivingReply") {
488:
489: # If the data are encrypted, decrypt first.
490:
491: my $answer = $self->{TransactionReply};
492: if($answer =~ /^enc\:/) {
493: $answer = $self->Decrypt($answer);
494: $self->{TransactionReply} = "$answer\n";
495: }
496: # if we have a NextRequest do it immeadiately
497: if ($self->{NextRequest}) {
498: $self->{TransactionRequest} = $self->{NextRequest};
499: undef( $self->{NextRequest} );
500: $self->{TransactionReply} = "";
501: $self->{InformWritable} = 1;
502: $self->{InformReadable} = 0;
503: $self->{Timeoutable} = 1;
504: $self->{TimeoutRemaining} = $self->{TimeoutValue};
505: $self->Transition("SendingRequest");
506: return 0;
507: } else {
508: # finish the transaction
509:
510: $self->ToIdle();
511: return 0;
512: }
513: } elsif ($self->{State} eq "Disconnected") { # No connection.
514: return -1;
515: } else { # Internal error: Invalid state.
516: $self->Transition("Disconnected");
517: $socket->close();
518: return -1;
519: }
520: }
521:
522: return 0;
523:
524: }
525:
526:
527: =pod
528:
529: This member should be called when the Socket becomes writable.
530:
531: The action is state independent. An attempt is made to drain the
532: contents of the TransactionRequest member. Once this is drained, we
533: mark the object as waiting for readability.
534:
535: Returns 0 if successful, or -1 if not.
536:
537: =cut
538: sub Writable {
539: my $self = shift; # Get reference to the object.
540: my $socket = $self->{Socket};
541: my $nwritten;
542: if ($socket) {
543: eval {
544: $nwritten = $socket->send($self->{TransactionRequest}, 0);
545: }
546: } else {
547: # For whatever reason, there's no longer a socket left.
548:
549:
550: $self->Transition("Disconnected");
551: return -1;
552: }
553: my $errno = $! + 0;
554: unless (defined $nwritten) {
555: if($errno != POSIX::EINTR) {
556: $self->Transition("Disconnected");
557: return -1;
558: }
559:
560: }
561: if (($nwritten >= 0) ||
562: ($errno == POSIX::EWOULDBLOCK) ||
563: ($errno == POSIX::EAGAIN) ||
564: ($errno == POSIX::EINTR) ||
565: ($errno == 0)) {
566: substr($self->{TransactionRequest}, 0, $nwritten) = ""; # rmv written part
567: if(length $self->{TransactionRequest} == 0) {
568: $self->{InformWritable} = 0;
569: $self->{InformReadable} = 1;
570: $self->{TransactionReply} = '';
571: #
572: # Figure out the next state:
573: #
574: if($self->{State} eq "Connected") {
575: $self->Transition("Initialized");
576: } elsif($self->{State} eq "ChallengeReceived") {
577: $self->Transition("ChallengeReplied");
578: } elsif($self->{State} eq "RequestingVersion") {
579: $self->Transition("ReadingVersionString");
580: } elsif ($self->{State} eq "SetHost") {
581: $self->Transition("HostSet");
582: } elsif($self->{State} eq "RequestingKey") {
583: $self->Transition("ReceivingKey");
584: # $self->{InformWritable} = 0;
585: # $self->{InformReadable} = 1;
586: # $self->{TransactionReply} = '';
587: } elsif ($self->{State} eq "SendingRequest") {
588: $self->Transition("ReceivingReply");
589: $self->{TimeoutRemaining} = $self->{TimeoutValue};
590: } elsif ($self->{State} eq "Disconnected") {
591: return -1;
592: }
593: return 0;
594: }
595: } else { # The write failed (e.g. partner disconnected).
596: $self->Transition("Disconnected");
597: $socket->close();
598: return -1;
599: }
600:
601: }
602: =pod
603:
604: =head2 Tick
605:
606: Tick is called every time unit by the event framework. It
607:
608: =item 1 decrements the remaining timeout.
609:
610: =item 2 If the timeout is zero, calls TimedOut indicating that the current operation timed out.
611:
612: =cut
613:
614: sub Tick {
615: my $self = shift;
616: $self->{TimeoutRemaining}--;
617: if ($self->{TimeoutRemaining} < 0) {
618: $self->TimedOut();
619: }
620: }
621:
622: =pod
623:
624: =head2 TimedOut
625:
626: called on a timeout. If the timeout callback is defined, it is called
627: with $self as its parameters.
628:
629: =cut
630:
631: sub TimedOut {
632:
633: my $self = shift;
634: if($self->{TimeoutCallback}) {
635: my $callback = $self->{TimeoutCallback};
636: my @args = ( $self);
637: &$callback(@args);
638: }
639: }
640:
641: =pod
642:
643: =head2 InitiateTransaction
644:
645: Called to initiate a transaction. A transaction can only be initiated
646: when the object is idle... otherwise an error is returned. A
647: transaction consists of a request to the server that will have a
648: reply. This member sets the request data in the TransactionRequest
649: member, makes the state SendingRequest and sets the data to allow a
650: timout, and to request writability notification.
651:
652: =cut
653:
654: sub InitiateTransaction {
655:
656: my ($self, $data) = @_;
657:
658: Debug(1, "initiating transaction: ".$data);
659: if($self->{State} ne "Idle") {
660: Debug(0," .. but not idle here\n");
661: return -1; # Error indicator.
662: }
663: # if the transaction is to be encrypted encrypt the data:
664: (my $sethost, my $server,$data)=split(/:/,$data,3);
665:
666: if($data =~ /^encrypt\:/) {
667: $data = $self->Encrypt($data);
668: }
669:
670: # Setup the trasaction
671: # currently no version of lond supports inlining the sethost
672: if ($self->PeerVersion() <= 321) {
673: if ($server ne $self->{LoncapaHim}) {
674: $self->{NextRequest} = $data;
675: $self->{TransactionRequest} = "$sethost:$server\n";
676: $self->{LoncapaHim} = $server;
677: } else {
678: $self->{TransactionRequest} = $data;
679: }
680: } else {
681: $self->{LoncapaHim} = $server;
682: $self->{TransactionRequest} = "$sethost:$server:$data";
683: }
684: $self->{TransactionReply} = "";
685: $self->{InformWritable} = 1;
686: $self->{InformReadable} = 0;
687: $self->{Timeoutable} = 1;
688: $self->{TimeoutRemaining} = $self->{TimeoutValue};
689: $self->Transition("SendingRequest");
690: }
691:
692:
693: =pod
694:
695: =head2 SetStateTransitionCallback
696:
697: Sets a callback for state transitions. Returns a reference to any
698: prior established callback, or undef if there was none:
699:
700: =cut
701:
702: sub SetStateTransitionCallback {
703: my $self = shift;
704: my $oldCallback = $self->{TransitionCallback};
705: $self->{TransitionCallback} = shift;
706: return $oldCallback;
707: }
708:
709: =pod
710:
711: =head2 SetTimeoutCallback
712:
713: Sets the timeout callback. Returns a reference to any prior
714: established callback or undef if there was none.
715:
716: =cut
717:
718: sub SetTimeoutCallback {
719:
720: my ($self, $callback) = @_;
721:
722: my $oldCallback = $self->{TimeoutCallback};
723: $self->{TimeoutCallback} = $callback;
724: return $oldCallback;
725: }
726:
727: =pod
728:
729: =head2 Shutdown:
730:
731: Shuts down the socket.
732:
733: =cut
734:
735: sub Shutdown {
736: my $self = shift;
737: my $socket = $self->GetSocket();
738: Debug(5,"socket is -$socket-");
739: if ($socket) {
740: # Ask lond to exit too. Non blocking so
741: # there is no cost for failure.
742: eval {
743: $socket->send("exit\n", 0);
744: $socket->shutdown(2);
745: }
746: }
747: }
748:
749: =pod
750:
751: =head2 GetState
752:
753: selector for the object state.
754:
755: =cut
756:
757: sub GetState {
758: my $self = shift;
759: return $self->{State};
760: }
761:
762: =pod
763:
764: =head2 GetSocket
765:
766: selector for the object socket.
767:
768: =cut
769:
770: sub GetSocket {
771: my $self = shift;
772: return $self->{Socket};
773: }
774:
775:
776: =pod
777:
778: =head2 WantReadable
779:
780: Return the state of the flag that indicates the object wants to be
781: called when readable.
782:
783: =cut
784:
785: sub WantReadable {
786: my $self = shift;
787:
788: return $self->{InformReadable};
789: }
790:
791: =pod
792:
793: =head2 WantWritable
794:
795: Return the state of the flag that indicates the object wants write
796: notification.
797:
798: =cut
799:
800: sub WantWritable {
801: my $self = shift;
802: return $self->{InformWritable};
803: }
804:
805: =pod
806:
807: =head2 WantTimeout
808:
809: return the state of the flag that indicates the object wants to be
810: informed of timeouts.
811:
812: =cut
813:
814: sub WantTimeout {
815: my $self = shift;
816: return $self->{Timeoutable};
817: }
818:
819: =pod
820:
821: =head2 GetReply
822:
823: Returns the reply from the last transaction.
824:
825: =cut
826:
827: sub GetReply {
828: my $self = shift;
829: return $self->{TransactionReply};
830: }
831:
832: =pod
833:
834: =head2 Encrypt
835:
836: Returns the encrypted version of the command string.
837:
838: The command input string is of the form:
839:
840: encrypt:command
841:
842: The output string can be directly sent to lond as it is of the form:
843:
844: enc:length:<encodedrequest>
845:
846: =cut
847:
848: sub Encrypt {
849:
850: my ($self, $request) = @_;
851:
852:
853: # Split the encrypt: off the request and figure out it's length.
854: # the cipher works in blocks of 8 bytes.
855:
856: my $cmd = $request;
857: $cmd =~ s/^encrypt\://; # strip off encrypt:
858: chomp($cmd); # strip off trailing \n
859: my $length=length($cmd); # Get the string length.
860: $cmd .= " "; # Pad with blanks so we can fill out a block.
861:
862: # encrypt the request in 8 byte chunks to create the encrypted
863: # output request.
864:
865: my $Encoded = '';
866: for(my $index = 0; $index <= $length; $index += 8) {
867: $Encoded .=
868: unpack("H16",
869: $self->{Cipher}->encrypt(substr($cmd,
870: $index, 8)));
871: }
872:
873: # Build up the answer as enc:length:$encrequest.
874:
875: $request = "enc:$length:$Encoded\n";
876: return $request;
877:
878:
879: }
880:
881: =pod
882:
883: =head2 Decrypt
884:
885: Decrypt a response from the server. The response is in the form:
886:
887: enc:<length>:<encrypted data>
888:
889: =cut
890:
891: sub Decrypt {
892:
893: my ($self, $encrypted) = @_;
894:
895: # Bust up the response into length, and encryptedstring:
896:
897: my ($enc, $length, $EncryptedString) = split(/:/,$encrypted);
898: chomp($EncryptedString);
899:
900: # Decode the data in 8 byte blocks. The string is encoded
901: # as hex digits so there are two characters per byte:
902:
903: my $decrypted = "";
904: for(my $index = 0; $index < length($EncryptedString);
905: $index += 16) {
906: $decrypted .= $self->{Cipher}->decrypt(
907: pack("H16",
908: substr($EncryptedString,
909: $index,
910: 16)));
911: }
912: # the answer may have trailing pads to fill out a block.
913: # $length tells us the actual length of the decrypted string:
914:
915: $decrypted = substr($decrypted, 0, $length);
916: Debug(9, "Decrypted $EncryptedString to $decrypted");
917:
918: return $decrypted;
919:
920: }
921: # ToIdle
922: # Called to transition to idle... done enough it's worth subbing
923: # off to ensure it's always done right!!
924: #
925: sub ToIdle {
926: my $self = shift;
927:
928: $self->Transition("Idle");
929: $self->{InformWritiable} = 0;
930: $self->{InformReadable} = 0;
931: $self->{Timeoutable} = 0;
932: }
933:
934: # ToVersionRequest
935: # Called to transition to "RequestVersion" also done a few times
936: # so worth subbing out.
937: #
938: sub ToVersionRequest {
939: my $self = shift;
940:
941: $self->Transition("RequestingVersion");
942: $self->{InformReadable} = 0;
943: $self->{InformWritable} = 1;
944: $self->{TransactionRequest} = "version\n";
945:
946: }
947: #
948: # CreateCipher
949: # Given a cipher key stores the key in the object context,
950: # creates the cipher object, (stores that in object context),
951: # This is done a couple of places, so it's worth factoring it out.
952: #
953: # Parameters:
954: # (self)
955: # key - The Cipher key.
956: #
957: # Returns:
958: # 0 - Failure to create IDEA cipher.
959: # 1 - Success.
960: #
961: sub CreateCipher {
962: my ($self, $key) = @_; # According to coding std.
963:
964: $self->{CipherKey} = $key; # Save the text key...
965: my $packedkey = pack ("H32", $key);
966: my $cipher = new IDEA $packedkey;
967: if($cipher) {
968: $self->{Cipher} = $cipher;
969: Debug("Cipher created dumping socket: ");
970: $self->Dump(9);
971: return 1;
972: }
973: else {
974: return 0;
975: }
976: }
977: # ExchangeKeysViaSSL
978: # Called to do cipher key exchange via SSL.
979: # The socket is promoted to an SSL socket. If that's successful,
980: # we read out cipher key through the socket and create an IDEA
981: # cipher object.
982: # Parameters:
983: # (self)
984: # Returns:
985: # true - Success.
986: # false - Failure.
987: #
988: # Assumptions:
989: # 1. The ssl session setup has timeout logic built in so we don't
990: # have to worry about DOS attacks at that stage.
991: # 2. If the ssl session gets set up we are talking to a legitimate
992: # lond so again we don't have to worry about DOS attacks.
993: # All this allows us just to call
994: sub ExchangeKeysViaSSL {
995: my $self = shift;
996: my $socket = $self->{Socket};
997:
998: # Get our signed certificate, the certificate authority's
999: # certificate and our private key file. All of these
1000: # are needed to create the ssl connection.
1001:
1002: my ($SSLCACertificate,
1003: $SSLCertificate) = lonssl::CertificateFile();
1004: my $SSLKey = lonssl::KeyFile();
1005:
1006: # Promote our connection to ssl and read the key from lond.
1007:
1008: my $SSLSocket = lonssl::PromoteClientSocket($socket,
1009: $SSLCACertificate,
1010: $SSLCertificate,
1011: $SSLKey);
1012: if(defined $SSLSocket) {
1013: my $key = <$SSLSocket>;
1014: lonssl::Close($SSLSocket);
1015: if($key) {
1016: chomp($key); # \n is not part of the key.
1017: return $self->CreateCipher($key);
1018: }
1019: else {
1020: Debug(3, "Failed to read ssl key");
1021: return 0;
1022: }
1023: }
1024: else {
1025: # Failed!!
1026: Debug(3, "Failed to negotiate SSL connection!");
1027: return 0;
1028: }
1029: # should not get here
1030: return 0;
1031:
1032: }
1033:
1034:
1035:
1036: #
1037: # CompleteInsecure:
1038: # This function is called to initiate the completion of
1039: # insecure challenge response negotiation.
1040: # To do this, we copy the challenge string to the transaction
1041: # request, flip to writability and state transition to
1042: # ChallengeReceived..
1043: # All this is only possible if InsecureOk is true.
1044: # Parameters:
1045: # (self) - This object's context hash.
1046: # Return:
1047: # 0 - Ok to transition.
1048: # -1 - Not ok to transition (InsecureOk not ok).
1049: #
1050: sub CompleteInsecure {
1051: my $self = shift;
1052: if($InsecureOk) {
1053: $self->{AuthenticationMode} = "insecure";
1054: &Debug(8," Transition out of Initialized:insecure");
1055: $self->{TransactionRequest} = $self->{TransactionReply};
1056: $self->{InformWritable} = 1;
1057: $self->{InformReadable} = 0;
1058: $self->Transition("ChallengeReceived");
1059: $self->{TimeoutRemaining} = $self->{TimeoutValue};
1060: return 0;
1061:
1062:
1063: }
1064: else {
1065: &Debug(3, "Insecure key negotiation disabled!");
1066: my $socket = $self->{Socket};
1067: $socket->close;
1068: return -1;
1069: }
1070: }
1071:
1072: ###########################################################
1073: #
1074: # The following is an unashamed kludge that is here to
1075: # allow LondConnection to be used outside of the
1076: # loncapa environment (e.g. by lonManage).
1077: #
1078: # This is a textual inclusion of pieces of the
1079: # Configuration.pm module.
1080: #
1081:
1082:
1083: my @confdirs=('/etc/httpd/conf/','/etc/apache2/');
1084:
1085: # ------------------- Subroutine read_conf: read LON-CAPA server configuration.
1086: # This subroutine reads PerlSetVar values out of specified web server
1087: # configuration files.
1088: sub read_conf
1089: {
1090: my (@conf_files)=@_;
1091: my (%perlvar,%configdirs);
1092: foreach my $filename (@conf_files,'loncapa_apache.conf') {
1093: my $configdir = '';
1094: $configdirs{$filename} = [@confdirs];
1095: while ($configdir eq '' && @{$configdirs{$filename}} > 0) {
1096: my $testdir = shift(@{$configdirs{$filename}});
1097: if (-e $testdir.$filename) {
1098: $configdir = $testdir;
1099: }
1100: }
1101: if ($configdir eq '') {
1102: die("Couldn't find a directory containing $filename");
1103: }
1104: if($DebugLevel > 3) {
1105: print STDERR ("Going to read $configdir.$filename\n");
1106: }
1107: open(CONFIG,'<'.$configdir.$filename) or
1108: die("Can't read $configdir$filename");
1109: while (my $configline=<CONFIG>) {
1110: if ($configline =~ /^[^\#]*PerlSetVar/) {
1111: my ($unused,$varname,$varvalue)=split(/\s+/,$configline);
1112: chomp($varvalue);
1113: $perlvar{$varname}=$varvalue;
1114: }
1115: }
1116: close(CONFIG);
1117: }
1118: if($DebugLevel > 3) {
1119: print STDERR "Dumping perlvar:\n";
1120: foreach my $var (keys %perlvar) {
1121: print STDERR "$var = $perlvar{$var}\n";
1122: }
1123: }
1124: my $perlvarref=\%perlvar;
1125: return $perlvarref;
1126: }
1127:
1128: #
1129: # Get the version of our peer. Note that this is only well
1130: # defined if the state machine has hit the idle state at least
1131: # once (well actually if it has transitioned out of
1132: # ReadingVersionString The member data LondVersion is returned.
1133: #
1134: sub PeerVersion {
1135: my $self = shift;
1136: my ($version) = ($self->{LondVersion} =~ /Revision: 1\.(\d+)/);
1137: return $version;
1138: }
1139:
1140: 1;
1141:
1142: =pod
1143:
1144: =head1 Theory
1145:
1146: The lond object is a state machine. It lives through the following states:
1147:
1148: =item Connected:
1149:
1150: a TCP connection has been formed, but the passkey has not yet been
1151: negotiated.
1152:
1153: =item Initialized:
1154:
1155: "init" sent.
1156:
1157: =item ChallengeReceived:
1158:
1159: lond sent its challenge to us.
1160:
1161: =item ChallengeReplied:
1162:
1163: We replied to lond's challenge waiting for lond's ok.
1164:
1165: =item RequestingKey:
1166:
1167: We are requesting an encryption key.
1168:
1169: =item ReceivingKey:
1170:
1171: We are receiving an encryption key.
1172:
1173: =item Idle:
1174:
1175: Connection was negotiated but no requests are active.
1176:
1177: =item SendingRequest:
1178:
1179: A request is being sent to the peer.
1180:
1181: =item ReceivingReply:
1182:
1183: Waiting for an entire reply from the peer.
1184:
1185: =item Disconnected:
1186:
1187: For whatever reason, the connection was dropped.
1188:
1189: When we need to be writing data, we have a writable event. When we
1190: need to be reading data, a readable event established. Events
1191: dispatch through the class functions Readable and Writable, and the
1192: watcher contains a reference to the associated object to allow object
1193: context to be reached.
1194:
1195: =head2 Member data.
1196:
1197: =item Host
1198:
1199: Host socket is connected to.
1200:
1201: =item Port
1202:
1203: The port the remote lond is listening on.
1204:
1205: =item Socket
1206:
1207: Socket open on the connection.
1208:
1209: =item State
1210:
1211: The current state.
1212:
1213: =item AuthenticationMode
1214:
1215: How authentication is being done. This can be any of:
1216:
1217: o local - Authenticate via a key exchanged in a file.
1218: o ssl - Authenticate via a key exchaned through a temporary ssl tunnel.
1219: o insecure - Exchange keys in an insecure manner.
1220:
1221: insecure is only allowed if the configuration parameter loncAllowInsecure
1222: is nonzero.
1223:
1224: =item TransactionRequest
1225:
1226: The request being transmitted.
1227:
1228: =item TransactionReply
1229:
1230: The reply being received from the transaction.
1231:
1232: =item InformReadable
1233:
1234: True if we want to be called when socket is readable.
1235:
1236: =item InformWritable
1237:
1238: True if we want to be informed if the socket is writable.
1239:
1240: =item Timeoutable
1241:
1242: True if the current operation is allowed to timeout.
1243:
1244: =item TimeoutValue
1245:
1246: Number of seconds in the timeout.
1247:
1248: =item TimeoutRemaining
1249:
1250: Number of seconds left in the timeout.
1251:
1252: =item CipherKey
1253:
1254: The key that was negotiated with the peer.
1255:
1256: =item Cipher
1257:
1258: The cipher obtained via the key.
1259:
1260:
1261: =head2 The following are callback like members:
1262:
1263: =item Tick:
1264:
1265: Called in response to a timer tick. Used to managed timeouts etc.
1266:
1267: =item Readable:
1268:
1269: Called when the socket becomes readable.
1270:
1271: =item Writable:
1272:
1273: Called when the socket becomes writable.
1274:
1275: =item TimedOut:
1276:
1277: Called when a timed operation timed out.
1278:
1279:
1280: =head2 The following are operational member functions.
1281:
1282: =item InitiateTransaction:
1283:
1284: Called to initiate a new transaction
1285:
1286: =item SetStateTransitionCallback:
1287:
1288: Called to establish a function that is called whenever the object goes
1289: through a state transition. This is used by The client to manage the
1290: work flow for the object.
1291:
1292: =item SetTimeoutCallback:
1293:
1294: Set a function to be called when a transaction times out. The
1295: function will be called with the object as its sole parameter.
1296:
1297: =item Encrypt:
1298:
1299: Encrypts a block of text according to the cipher negotiated with the
1300: peer (assumes the text is a command).
1301:
1302: =item Decrypt:
1303:
1304: Decrypts a block of text according to the cipher negotiated with the
1305: peer (assumes the block was a reply.
1306:
1307: =item Shutdown:
1308:
1309: Shuts off the socket.
1310:
1311: =head2 The following are selector member functions:
1312:
1313: =item GetState:
1314:
1315: Returns the current state
1316:
1317: =item GetSocket:
1318:
1319: Gets the socekt open on the connection to lond.
1320:
1321: =item WantReadable:
1322:
1323: true if the current state requires a readable event.
1324:
1325: =item WantWritable:
1326:
1327: true if the current state requires a writable event.
1328:
1329: =item WantTimeout:
1330:
1331: true if the current state requires timeout support.
1332:
1333: =cut
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>