2012-09-20 07:51:34 +04:00
|
|
|
|
/**
|
|
|
|
|
* xrdp: A Remote Desktop Protocol server.
|
|
|
|
|
*
|
2014-07-10 16:40:16 +04:00
|
|
|
|
* Copyright (C) Jay Sorg 2004-2014
|
|
|
|
|
* Copyright (C) Idan Freiberg 2013-2014
|
2012-09-20 07:51:34 +04:00
|
|
|
|
*
|
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
|
*
|
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
*
|
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
|
* limitations under the License.
|
|
|
|
|
*
|
|
|
|
|
* iso layer
|
2021-02-04 13:11:54 +03:00
|
|
|
|
*
|
|
|
|
|
* Note: [ITU-T X.224] and [ISO/IEC 8073] are essentially two specifications
|
|
|
|
|
* of the same protocol (see [ITU-T X.224] Appendix I – Differences between
|
|
|
|
|
* ITU-T Rec. X.224 (1993) and ISO/IEC 8073:1992). The RDP protocol
|
|
|
|
|
* specification [MS-RDPBCGR] makes reference to the [ITU-T X.224] specificaiton.
|
2012-09-20 07:51:34 +04:00
|
|
|
|
*/
|
2005-06-28 07:11:35 +04:00
|
|
|
|
|
2017-03-03 07:33:23 +03:00
|
|
|
|
#if defined(HAVE_CONFIG_H)
|
|
|
|
|
#include <config_ac.h>
|
|
|
|
|
#endif
|
|
|
|
|
|
2005-06-28 07:11:35 +04:00
|
|
|
|
#include "libxrdp.h"
|
2019-12-19 12:55:38 +03:00
|
|
|
|
#include "ms-rdpbcgr.h"
|
2021-08-26 17:31:38 +03:00
|
|
|
|
#include "string_calls.h"
|
2016-11-28 11:04:54 +03:00
|
|
|
|
#include "log.h"
|
2005-06-28 07:11:35 +04:00
|
|
|
|
|
2020-08-02 07:04:12 +03:00
|
|
|
|
|
2021-08-26 17:31:38 +03:00
|
|
|
|
/*****************************************************************************/
|
|
|
|
|
/**
|
|
|
|
|
* Converts a protocol mask ([MS-RDPBCGR] 2.2.1.1.1 to a string)
|
|
|
|
|
*
|
|
|
|
|
* @param protocol Protocol mask
|
|
|
|
|
* @param buff Output buffer
|
|
|
|
|
* @param bufflen total length of buff
|
|
|
|
|
* @return As for snprintf()
|
|
|
|
|
*
|
|
|
|
|
* The string "RDP" is always added to the output, even if other bits
|
|
|
|
|
* are set
|
|
|
|
|
*/
|
|
|
|
|
static int
|
|
|
|
|
protocol_mask_to_str(int protocol, char *buff, int bufflen)
|
|
|
|
|
{
|
|
|
|
|
char delim = '|';
|
2015-06-04 16:48:41 +03:00
|
|
|
|
|
2021-08-26 17:31:38 +03:00
|
|
|
|
static const struct bitmask_string bits[] =
|
|
|
|
|
{
|
|
|
|
|
{ PROTOCOL_SSL, "SSL" },
|
|
|
|
|
{ PROTOCOL_HYBRID, "HYBRID" },
|
|
|
|
|
{ PROTOCOL_RDSTLS, "RDSTLS" },
|
|
|
|
|
{ PROTOCOL_HYBRID_EX, "HYBRID_EX"},
|
|
|
|
|
BITMASK_STRING_END_OF_LIST
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
int rlen = g_bitmask_to_str(protocol, bits, delim, buff, bufflen);
|
|
|
|
|
|
|
|
|
|
/* Append "RDP" */
|
|
|
|
|
if (rlen == 0)
|
|
|
|
|
{
|
|
|
|
|
/* String is empty */
|
|
|
|
|
rlen = g_snprintf(buff, bufflen, "RDP");
|
|
|
|
|
}
|
|
|
|
|
else if (rlen < bufflen)
|
|
|
|
|
{
|
|
|
|
|
rlen += g_snprintf(buff + rlen, bufflen - rlen, "%cRDP", delim);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return rlen;
|
|
|
|
|
}
|
2015-06-04 16:48:41 +03:00
|
|
|
|
|
2005-06-28 07:11:35 +04:00
|
|
|
|
/*****************************************************************************/
|
2014-07-10 16:40:16 +04:00
|
|
|
|
struct xrdp_iso *
|
2012-09-20 07:51:34 +04:00
|
|
|
|
xrdp_iso_create(struct xrdp_mcs *owner, struct trans *trans)
|
2005-06-28 07:11:35 +04:00
|
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
|
struct xrdp_iso *self;
|
|
|
|
|
|
2014-07-10 16:40:16 +04:00
|
|
|
|
self = (struct xrdp_iso *) g_malloc(sizeof(struct xrdp_iso), 1);
|
2012-09-20 07:51:34 +04:00
|
|
|
|
self->mcs_layer = owner;
|
2014-02-26 08:47:34 +04:00
|
|
|
|
self->trans = trans;
|
2012-09-20 07:51:34 +04:00
|
|
|
|
return self;
|
2005-06-28 07:11:35 +04:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*****************************************************************************/
|
2017-03-12 19:35:00 +03:00
|
|
|
|
void
|
2012-09-20 07:51:34 +04:00
|
|
|
|
xrdp_iso_delete(struct xrdp_iso *self)
|
2005-06-28 07:11:35 +04:00
|
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
|
if (self == 0)
|
|
|
|
|
{
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
g_free(self);
|
2005-06-28 07:11:35 +04:00
|
|
|
|
}
|
|
|
|
|
|
2014-12-13 17:24:07 +03:00
|
|
|
|
/*****************************************************************************/
|
2014-12-13 17:36:23 +03:00
|
|
|
|
/* returns error */
|
2017-03-12 19:35:00 +03:00
|
|
|
|
static int
|
2014-12-16 23:20:57 +03:00
|
|
|
|
xrdp_iso_negotiate_security(struct xrdp_iso *self)
|
|
|
|
|
{
|
2021-08-26 17:31:38 +03:00
|
|
|
|
char requested_str[64];
|
|
|
|
|
const char *selected_str = "";
|
|
|
|
|
const char *configured_str = "";
|
|
|
|
|
|
2014-12-16 23:20:57 +03:00
|
|
|
|
int rv = 0;
|
2015-06-04 16:48:41 +03:00
|
|
|
|
struct xrdp_client_info *client_info = &(self->mcs_layer->sec_layer->rdp_layer->client_info);
|
2014-12-13 17:24:07 +03:00
|
|
|
|
|
2021-08-26 17:31:38 +03:00
|
|
|
|
/* Can we do TLS/SSL? (basic check) */
|
|
|
|
|
int ssl_capable = g_file_readable(client_info->certificate) &&
|
|
|
|
|
g_file_readable(client_info->key_file);
|
2014-12-13 17:24:07 +03:00
|
|
|
|
|
2021-08-26 17:31:38 +03:00
|
|
|
|
/* Work out what's actually configured in xrdp.ini. The
|
|
|
|
|
* selection happens later, but we can do some error checking here */
|
2015-06-04 16:48:41 +03:00
|
|
|
|
switch (client_info->security_layer)
|
2014-12-16 23:20:57 +03:00
|
|
|
|
{
|
|
|
|
|
case PROTOCOL_RDP:
|
2021-08-26 17:31:38 +03:00
|
|
|
|
configured_str = "RDP";
|
2014-12-16 23:20:57 +03:00
|
|
|
|
break;
|
2021-08-26 17:31:38 +03:00
|
|
|
|
|
2014-12-16 23:20:57 +03:00
|
|
|
|
case PROTOCOL_SSL:
|
2021-08-26 17:31:38 +03:00
|
|
|
|
/* We *must* use TLS. Check we can offer it, and it's requested */
|
|
|
|
|
if (ssl_capable)
|
2014-12-16 23:20:57 +03:00
|
|
|
|
{
|
2021-08-26 17:31:38 +03:00
|
|
|
|
configured_str = "SSL";
|
|
|
|
|
if ((self->requestedProtocol & PROTOCOL_SSL) == 0)
|
2015-06-04 16:48:41 +03:00
|
|
|
|
{
|
2021-08-26 17:31:38 +03:00
|
|
|
|
LOG(LOG_LEVEL_ERROR, "Server requires TLS for security, "
|
|
|
|
|
"but the client did not request TLS.");
|
|
|
|
|
self->failureCode = SSL_REQUIRED_BY_SERVER;
|
2015-06-04 16:48:41 +03:00
|
|
|
|
rv = 1; /* error */
|
|
|
|
|
}
|
2014-12-16 23:20:57 +03:00
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
2021-08-26 17:31:38 +03:00
|
|
|
|
configured_str = "";
|
|
|
|
|
LOG(LOG_LEVEL_ERROR, "Cannot accept TLS connections because "
|
|
|
|
|
"certificate or private key file is not readable. "
|
|
|
|
|
"certificate file: [%s], private key file: [%s]",
|
|
|
|
|
client_info->certificate, client_info->key_file);
|
|
|
|
|
self->failureCode = SSL_CERT_NOT_ON_SERVER;
|
2014-12-16 23:20:57 +03:00
|
|
|
|
rv = 1; /* error */
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case PROTOCOL_HYBRID:
|
|
|
|
|
case PROTOCOL_HYBRID_EX:
|
|
|
|
|
default:
|
2021-08-26 17:31:38 +03:00
|
|
|
|
/* We don't yet support CredSSP */
|
|
|
|
|
if (ssl_capable)
|
2014-12-16 23:20:57 +03:00
|
|
|
|
{
|
2021-08-26 17:31:38 +03:00
|
|
|
|
configured_str = "SSL|RDP";
|
2014-12-16 23:20:57 +03:00
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
2021-08-26 17:31:38 +03:00
|
|
|
|
/*
|
|
|
|
|
* Tell the user we can't offer TLS, but this isn't fatal */
|
|
|
|
|
configured_str = "RDP";
|
|
|
|
|
LOG(LOG_LEVEL_WARNING, "Cannot accept TLS connections because "
|
|
|
|
|
"certificate or private key file is not readable. "
|
|
|
|
|
"certificate file: [%s], private key file: [%s]",
|
|
|
|
|
client_info->certificate, client_info->key_file);
|
2014-12-16 23:20:57 +03:00
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
}
|
2014-12-13 17:24:07 +03:00
|
|
|
|
|
2021-08-26 17:31:38 +03:00
|
|
|
|
/* Currently the choice comes down to RDP or SSL */
|
|
|
|
|
if (rv != 0)
|
|
|
|
|
{
|
|
|
|
|
self->selectedProtocol = PROTOCOL_RDP;
|
|
|
|
|
selected_str = "";
|
|
|
|
|
}
|
|
|
|
|
else if (ssl_capable && (self->requestedProtocol &
|
|
|
|
|
client_info->security_layer &
|
|
|
|
|
PROTOCOL_SSL) != 0)
|
|
|
|
|
{
|
|
|
|
|
self->selectedProtocol = PROTOCOL_SSL;
|
|
|
|
|
selected_str = "SSL";
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
self->selectedProtocol = PROTOCOL_RDP;
|
|
|
|
|
selected_str = "RDP";
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
protocol_mask_to_str(self->requestedProtocol,
|
|
|
|
|
requested_str, sizeof(requested_str));
|
|
|
|
|
|
|
|
|
|
LOG(LOG_LEVEL_INFO, "Security protocol: configured [%s], requested [%s],"
|
|
|
|
|
" selected [%s]",
|
|
|
|
|
configured_str, requested_str, selected_str);
|
|
|
|
|
|
2014-12-16 23:20:57 +03:00
|
|
|
|
return rv;
|
2014-12-13 17:24:07 +03:00
|
|
|
|
}
|
|
|
|
|
|
2005-06-28 07:11:35 +04:00
|
|
|
|
/*****************************************************************************/
|
2021-02-04 13:11:54 +03:00
|
|
|
|
/* Process a [MS-RDPBCGR] RDP_NEG_REQ message.
|
|
|
|
|
* returns error
|
|
|
|
|
*/
|
2017-03-12 19:35:00 +03:00
|
|
|
|
static int
|
2014-12-13 17:24:07 +03:00
|
|
|
|
xrdp_iso_process_rdp_neg_req(struct xrdp_iso *self, struct stream *s)
|
2005-06-28 07:11:35 +04:00
|
|
|
|
{
|
2013-09-25 17:54:45 +04:00
|
|
|
|
int flags;
|
2012-09-20 07:51:34 +04:00
|
|
|
|
int len;
|
|
|
|
|
|
2021-02-04 13:11:54 +03:00
|
|
|
|
if (!s_check_rem_and_log(s, 7, "Parsing [MS-RDPBCGR] RDP_NEG_REQ"))
|
2020-04-14 13:01:52 +03:00
|
|
|
|
{
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2021-02-04 13:11:54 +03:00
|
|
|
|
/* The type field has already been read to determine that this function
|
|
|
|
|
should be called */
|
|
|
|
|
in_uint8(s, flags); /* flags */
|
2014-07-02 01:57:38 +04:00
|
|
|
|
if (flags != 0x0 && flags != 0x8 && flags != 0x1)
|
2013-09-25 17:54:45 +04:00
|
|
|
|
{
|
2021-02-04 13:11:54 +03:00
|
|
|
|
LOG(LOG_LEVEL_ERROR,
|
|
|
|
|
"Unsupported [MS-RDPBCGR] RDP_NEG_REQ flags: 0x%2.2x", flags);
|
2013-09-25 17:54:45 +04:00
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2021-02-04 13:11:54 +03:00
|
|
|
|
in_uint16_le(s, len); /* length */
|
2014-07-10 16:40:16 +04:00
|
|
|
|
if (len != 8)
|
2013-09-25 17:54:45 +04:00
|
|
|
|
{
|
2021-02-04 13:11:54 +03:00
|
|
|
|
LOG(LOG_LEVEL_ERROR,
|
|
|
|
|
"Protocol error: [MS-RDPBCGR] RDP_NEG_REQ length must be 8, "
|
|
|
|
|
"received %d", len);
|
2013-09-25 17:54:45 +04:00
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2021-02-04 13:11:54 +03:00
|
|
|
|
in_uint32_le(s, self->requestedProtocol); /* requestedProtocols */
|
|
|
|
|
|
|
|
|
|
/* TODO: why is requestedProtocols flag value bigger than 0xb invalid? */
|
2014-07-10 16:40:16 +04:00
|
|
|
|
if (self->requestedProtocol > 0xb)
|
|
|
|
|
{
|
2021-02-04 13:11:54 +03:00
|
|
|
|
LOG(LOG_LEVEL_ERROR,
|
|
|
|
|
"Unknown requested protocol flag [MS-RDPBCGR] RDP_NEG_REQ, "
|
|
|
|
|
"requestedProtocol 0x%8.8x", self->requestedProtocol);
|
2014-07-10 16:40:16 +04:00
|
|
|
|
return 1;
|
|
|
|
|
}
|
2021-02-04 13:11:54 +03:00
|
|
|
|
LOG_DEVEL(LOG_LEVEL_TRACE, "Received struct [MS-RDPBCGR] RDP_NEG_REQ "
|
|
|
|
|
"flags 0x%2.2x, length 8, requestedProtocol 0x%8.8x",
|
|
|
|
|
flags, self->requestedProtocol);
|
2013-09-25 19:07:20 +04:00
|
|
|
|
|
2013-09-25 17:54:45 +04:00
|
|
|
|
return 0;
|
|
|
|
|
}
|
2020-04-14 13:01:52 +03:00
|
|
|
|
/*****************************************************************************
|
|
|
|
|
* Reads an X.224 PDU (X.224 section 13) preceded by a T.123 TPKT
|
|
|
|
|
* header (T.123 section 8)
|
|
|
|
|
*
|
|
|
|
|
* On entry, the TPKT header length field will have been inspected and used to
|
|
|
|
|
* set up the input stream.
|
|
|
|
|
*
|
|
|
|
|
* On exit, the TPKT header and the fixed part of the PDU header will have been
|
|
|
|
|
* removed from the stream.
|
|
|
|
|
*
|
2021-02-04 13:11:54 +03:00
|
|
|
|
* @param self
|
|
|
|
|
* @param s [in]
|
|
|
|
|
* @param code [out]
|
|
|
|
|
* @param len [out]
|
2020-04-14 13:01:52 +03:00
|
|
|
|
* Returns error
|
|
|
|
|
*****************************************************************************/
|
2017-03-12 19:35:00 +03:00
|
|
|
|
static int
|
2013-10-09 23:41:24 +04:00
|
|
|
|
xrdp_iso_recv_msg(struct xrdp_iso *self, struct stream *s, int *code, int *len)
|
2005-06-28 07:11:35 +04:00
|
|
|
|
{
|
2014-12-13 17:24:07 +03:00
|
|
|
|
int ver;
|
2012-09-20 07:51:34 +04:00
|
|
|
|
|
2014-12-13 17:24:07 +03:00
|
|
|
|
*code = 0;
|
|
|
|
|
*len = 0;
|
2012-09-20 07:51:34 +04:00
|
|
|
|
|
2014-03-05 06:11:55 +04:00
|
|
|
|
if (s != self->trans->in_s)
|
2012-09-20 07:51:34 +04:00
|
|
|
|
{
|
2021-02-04 13:11:54 +03:00
|
|
|
|
LOG(LOG_LEVEL_WARNING,
|
|
|
|
|
"Bug: the input stream is not the same stream as the "
|
|
|
|
|
"transport input stream");
|
2012-09-20 07:51:34 +04:00
|
|
|
|
}
|
|
|
|
|
|
2021-02-04 13:11:54 +03:00
|
|
|
|
/* [ITU-T T.123] TPKT header is 4 bytes, then first 2 bytes of the X.224 CR-TPDU */
|
|
|
|
|
if (!s_check_rem_and_log(s, 6,
|
|
|
|
|
"Parsing [ITU-T T.123] TPKT header and [ITU-T X.224] TPDU header"))
|
2012-09-20 07:51:34 +04:00
|
|
|
|
{
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2021-02-04 13:11:54 +03:00
|
|
|
|
/* [ITU-T T.123] TPKT header */
|
|
|
|
|
in_uint8(s, ver); /* version */
|
|
|
|
|
in_uint8s(s, 3); /* Skip reserved field (1 byte), plus length (2 bytes) */
|
|
|
|
|
LOG_DEVEL(LOG_LEVEL_TRACE, "Received header [ITU-T T.123] TPKT "
|
|
|
|
|
"version %d, length (ignored)", ver);
|
|
|
|
|
|
|
|
|
|
/* [ITU-T X.224] TPDU header */
|
|
|
|
|
in_uint8(s, *len); /* LI (length indicator) */
|
|
|
|
|
in_uint8(s, *code); /* TPDU code */
|
|
|
|
|
LOG_DEVEL(LOG_LEVEL_TRACE, "Received header [ITU-T X.224] TPDU "
|
|
|
|
|
"length indicator %d, TDPU code 0x%2.2x", *len, *code);
|
2012-09-20 07:51:34 +04:00
|
|
|
|
|
2020-04-14 13:01:52 +03:00
|
|
|
|
if (ver != 3)
|
2013-09-11 03:00:30 +04:00
|
|
|
|
{
|
2021-02-04 13:11:54 +03:00
|
|
|
|
LOG(LOG_LEVEL_ERROR,
|
|
|
|
|
"Unsupported [ITU-T T.123] TPKT header version: %d", ver);
|
|
|
|
|
LOG_DEVEL_HEXDUMP(LOG_LEVEL_ERROR, "[ITU-T T.123] TPKT header", s->data, 4);
|
2013-09-11 03:00:30 +04:00
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2020-04-14 13:01:52 +03:00
|
|
|
|
if (*len == 255)
|
2013-09-11 03:00:30 +04:00
|
|
|
|
{
|
2020-04-14 13:01:52 +03:00
|
|
|
|
/* X.224 13.2.1 - reserved value */
|
2021-02-04 13:11:54 +03:00
|
|
|
|
LOG(LOG_LEVEL_ERROR,
|
|
|
|
|
"[ITU-T X.224] TPDU header: unsupported use of reserved length value");
|
|
|
|
|
LOG_DEVEL_HEXDUMP(LOG_LEVEL_ERROR, "[ITU-T X.224] TPDU header", s->data + 4, 4);
|
2013-09-11 03:00:30 +04:00
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2012-09-20 07:51:34 +04:00
|
|
|
|
if (*code == ISO_PDU_DT)
|
|
|
|
|
{
|
2021-02-04 13:11:54 +03:00
|
|
|
|
/* Data PDU : X.224 13.7 class 0 */
|
|
|
|
|
if (!s_check_rem_and_log(s, 1, "Parsing [ITU-T X.224] DT-TPDU (Data) header"))
|
2013-09-11 03:00:30 +04:00
|
|
|
|
{
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
2021-02-04 13:11:54 +03:00
|
|
|
|
in_uint8s(s, 1); /* EOT (End of TSDU Mark) (upper 1 bit) and
|
|
|
|
|
TPDU-NR (Data TPDU Number) (lower 7 bits) */
|
2012-09-20 07:51:34 +04:00
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
2021-02-04 13:11:54 +03:00
|
|
|
|
/* Other supported X.224 class 0 PDUs all have 5 bytes remaining
|
|
|
|
|
in the fixed header :
|
|
|
|
|
CR Connection request (13.3)
|
|
|
|
|
CC Connection confirm (13.4)
|
|
|
|
|
DR Disconnect request (13.5) */
|
|
|
|
|
if (!s_check_rem_and_log(s, 5, "Parsing [ITU-T X.224] Other PDU header"))
|
2013-09-11 03:00:30 +04:00
|
|
|
|
{
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
2021-02-04 13:11:54 +03:00
|
|
|
|
in_uint8s(s, 5); /* DST-REF (2 bytes)
|
|
|
|
|
SRC-REF (2 bytes)
|
|
|
|
|
[CR, CC] CLASS OPTION (1 byte) or [DR] REASON (1 byte) */
|
2012-09-20 07:51:34 +04:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 0;
|
2005-06-28 07:11:35 +04:00
|
|
|
|
}
|
2014-02-26 08:47:34 +04:00
|
|
|
|
|
2005-06-28 07:11:35 +04:00
|
|
|
|
/*****************************************************************************/
|
2021-02-04 13:11:54 +03:00
|
|
|
|
/* Process the header of a [ITU-T X.224] DT-TPDU (Data) message.
|
|
|
|
|
*
|
|
|
|
|
* returns error
|
|
|
|
|
*/
|
2017-03-12 19:35:00 +03:00
|
|
|
|
int
|
2012-09-20 07:51:34 +04:00
|
|
|
|
xrdp_iso_recv(struct xrdp_iso *self, struct stream *s)
|
2005-06-28 07:11:35 +04:00
|
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
|
int code;
|
2013-10-09 23:41:24 +04:00
|
|
|
|
int len;
|
2012-09-20 07:51:34 +04:00
|
|
|
|
|
2013-10-09 23:41:24 +04:00
|
|
|
|
if (xrdp_iso_recv_msg(self, s, &code, &len) != 0)
|
2012-09-20 07:51:34 +04:00
|
|
|
|
{
|
2021-02-04 13:11:54 +03:00
|
|
|
|
LOG(LOG_LEVEL_ERROR, "xrdp_iso_recv: xrdp_iso_recv_msg failed");
|
2012-09-20 07:51:34 +04:00
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2013-10-09 23:41:24 +04:00
|
|
|
|
if (code != ISO_PDU_DT || len != 2)
|
2012-09-20 07:51:34 +04:00
|
|
|
|
{
|
2021-02-04 13:11:54 +03:00
|
|
|
|
LOG(LOG_LEVEL_ERROR, "xrdp_iso_recv only supports processing "
|
|
|
|
|
"[ITU-T X.224] DT-TPDU (Data) headers. Received TPDU header: "
|
|
|
|
|
"length indicator %d, TDPU code 0x%2.2x", len, code);
|
2012-09-20 07:51:34 +04:00
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 0;
|
2005-06-28 07:11:35 +04:00
|
|
|
|
}
|
|
|
|
|
/*****************************************************************************/
|
2021-02-04 13:11:54 +03:00
|
|
|
|
/*
|
|
|
|
|
* Send a [ITU-T X.224] CC-TPDU (Connection Confirm) message with
|
|
|
|
|
* [ITU-T T.123] TPKT header.
|
|
|
|
|
*
|
|
|
|
|
* returns error
|
|
|
|
|
*/
|
2017-03-12 19:35:00 +03:00
|
|
|
|
static int
|
2014-07-10 16:40:16 +04:00
|
|
|
|
xrdp_iso_send_cc(struct xrdp_iso *self)
|
2005-06-28 07:11:35 +04:00
|
|
|
|
{
|
2014-07-10 16:40:16 +04:00
|
|
|
|
struct stream *s;
|
|
|
|
|
char *holdp;
|
|
|
|
|
char *len_ptr;
|
|
|
|
|
char *len_indicator_ptr;
|
|
|
|
|
int len;
|
|
|
|
|
int len_indicator;
|
2012-09-20 07:51:34 +04:00
|
|
|
|
|
2014-07-10 16:40:16 +04:00
|
|
|
|
make_stream(s);
|
|
|
|
|
init_stream(s, 8192);
|
|
|
|
|
|
|
|
|
|
holdp = s->p;
|
2021-02-04 13:11:54 +03:00
|
|
|
|
/* [ITU-T T.123] TPKT header */
|
2014-07-10 16:40:16 +04:00
|
|
|
|
out_uint8(s, 3); /* version */
|
2021-02-04 13:11:54 +03:00
|
|
|
|
out_uint8(s, 0); /* reserved (padding) */
|
2014-07-10 16:40:16 +04:00
|
|
|
|
len_ptr = s->p;
|
|
|
|
|
out_uint16_be(s, 0); /* length, set later */
|
2021-02-04 13:11:54 +03:00
|
|
|
|
|
|
|
|
|
/* [ITU-T X.224] CC-TPDU */
|
2014-07-10 16:40:16 +04:00
|
|
|
|
len_indicator_ptr = s->p;
|
2021-02-04 13:11:54 +03:00
|
|
|
|
out_uint8(s, 0); /* length indicator, set later */
|
2014-07-10 16:40:16 +04:00
|
|
|
|
out_uint8(s, ISO_PDU_CC); /* Connection Confirm PDU */
|
2021-02-04 13:11:54 +03:00
|
|
|
|
out_uint16_be(s, 0); /* DST-REF */
|
|
|
|
|
out_uint16_be(s, 0x1234); /* SRC-REF */
|
|
|
|
|
out_uint8(s, 0); /* CLASS OPTION */
|
|
|
|
|
|
|
|
|
|
/* [MS-RDPBCGR] 2.2.1.2 rdpNegData */
|
2014-07-10 16:40:16 +04:00
|
|
|
|
if (self->rdpNegData)
|
2013-10-10 03:33:13 +04:00
|
|
|
|
{
|
2014-07-10 16:40:16 +04:00
|
|
|
|
if (self->failureCode)
|
|
|
|
|
{
|
2021-02-04 13:11:54 +03:00
|
|
|
|
/* [MS-RDPBCGR] RDP_NEG_FAILURE */
|
|
|
|
|
out_uint8(s, RDP_NEG_FAILURE); /* type*/
|
|
|
|
|
out_uint8(s, 0); /* flags (none) */
|
|
|
|
|
out_uint16_le(s, 8); /* length (must be 8) */
|
|
|
|
|
out_uint32_le(s, self->failureCode); /* failureCode */
|
|
|
|
|
LOG_DEVEL(LOG_LEVEL_TRACE, "Adding structure [MS-RDPBCGR] RDP_NEG_FAILURE "
|
|
|
|
|
"flags 0, length 8, failureCode 0x%8.8x", self->failureCode);
|
2014-07-10 16:40:16 +04:00
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
2021-02-04 13:11:54 +03:00
|
|
|
|
/* [MS-RDPBCGR] RDP_NEG_RSP */
|
|
|
|
|
out_uint8(s, RDP_NEG_RSP); /* type*/
|
2014-07-10 16:40:16 +04:00
|
|
|
|
//TODO: hardcoded flags
|
|
|
|
|
out_uint8(s, EXTENDED_CLIENT_DATA_SUPPORTED); /* flags */
|
2021-02-04 13:11:54 +03:00
|
|
|
|
out_uint16_le(s, 8); /* length (must be 8) */
|
|
|
|
|
out_uint32_le(s, self->selectedProtocol); /* selectedProtocol */
|
|
|
|
|
LOG_DEVEL(LOG_LEVEL_TRACE, "Adding structure [MS-RDPBCGR] RDP_NEG_RSP "
|
2022-02-15 06:03:22 +03:00
|
|
|
|
"flags 0x%02x, length 8, selectedProtocol 0x%8.8x",
|
|
|
|
|
EXTENDED_CLIENT_DATA_SUPPORTED,
|
2021-02-04 13:11:54 +03:00
|
|
|
|
self->selectedProtocol);
|
2014-07-10 16:40:16 +04:00
|
|
|
|
}
|
2013-10-09 23:41:24 +04:00
|
|
|
|
}
|
2013-10-10 03:33:13 +04:00
|
|
|
|
s_mark_end(s);
|
2013-09-25 17:54:45 +04:00
|
|
|
|
|
2014-07-10 16:40:16 +04:00
|
|
|
|
len = (int) (s->end - holdp);
|
2014-07-12 03:07:33 +04:00
|
|
|
|
len_indicator = (int) (s->end - len_indicator_ptr) - 1;
|
2014-07-12 08:19:02 +04:00
|
|
|
|
len_ptr[0] = len >> 8;
|
2014-07-10 16:40:16 +04:00
|
|
|
|
len_ptr[1] = len;
|
|
|
|
|
len_indicator_ptr[0] = len_indicator;
|
2012-09-20 07:51:34 +04:00
|
|
|
|
|
2021-02-04 13:11:54 +03:00
|
|
|
|
LOG_DEVEL(LOG_LEVEL_TRACE, "Adding header [ITU-T T.123] TPKT "
|
|
|
|
|
"version 3, length %d", len);
|
|
|
|
|
LOG_DEVEL(LOG_LEVEL_TRACE, "Sending [ITU-T X.224] CC-TPDU (Connection Confirm) "
|
|
|
|
|
"length indicator %d, DST-REF 0, SRC-REF 0, CLASS OPTION 0",
|
|
|
|
|
len_indicator);
|
|
|
|
|
|
2015-07-06 09:14:46 +03:00
|
|
|
|
if (trans_write_copy_s(self->trans, s) != 0)
|
2012-09-20 07:51:34 +04:00
|
|
|
|
{
|
2021-02-04 13:11:54 +03:00
|
|
|
|
LOG(LOG_LEVEL_ERROR, "Sending [ITU-T X.224] CC-TPDU (Connection Confirm) failed");
|
2014-07-19 22:56:00 +04:00
|
|
|
|
free_stream(s);
|
2012-09-20 07:51:34 +04:00
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2013-10-10 03:33:13 +04:00
|
|
|
|
free_stream(s);
|
2013-09-25 17:54:45 +04:00
|
|
|
|
return 0;
|
|
|
|
|
}
|
2020-04-14 13:01:52 +03:00
|
|
|
|
/*****************************************************************************
|
|
|
|
|
* Process an X.224 connection request PDU
|
|
|
|
|
*
|
2021-02-04 13:11:54 +03:00
|
|
|
|
* See MS-RDPBCGR v20190923 sections 2.2.1.1 and 3.3.5.3.1.
|
2020-04-14 13:01:52 +03:00
|
|
|
|
*
|
|
|
|
|
* From the latter, in particular:-
|
|
|
|
|
* - The length embedded in the TPKT header MUST be examined for
|
|
|
|
|
* consistency with the received data. If there is a discrepancy, the
|
|
|
|
|
* connection SHOULD be dropped
|
|
|
|
|
* - If the optional routingToken field exists it MUST be ignored.
|
|
|
|
|
* - If the optional cookie field is present it MUST be ignored.
|
|
|
|
|
* - If both the routingToken and cookie fields are present, the server
|
|
|
|
|
* SHOULD continue with the connection.
|
|
|
|
|
*****************************************************************************/
|
2005-06-28 07:11:35 +04:00
|
|
|
|
/* returns error */
|
2017-03-12 19:35:00 +03:00
|
|
|
|
int
|
2012-09-20 07:51:34 +04:00
|
|
|
|
xrdp_iso_incoming(struct xrdp_iso *self)
|
2005-06-28 07:11:35 +04:00
|
|
|
|
{
|
2014-12-13 17:36:23 +03:00
|
|
|
|
int rv = 0;
|
2012-09-20 07:51:34 +04:00
|
|
|
|
int code;
|
2013-10-09 23:41:24 +04:00
|
|
|
|
int len;
|
2013-10-10 03:33:13 +04:00
|
|
|
|
int cc_type;
|
2012-09-20 07:51:34 +04:00
|
|
|
|
struct stream *s;
|
2020-04-14 13:01:52 +03:00
|
|
|
|
int expected_pdu_len;
|
2013-10-10 03:33:13 +04:00
|
|
|
|
|
2021-02-04 13:11:54 +03:00
|
|
|
|
LOG_DEVEL(LOG_LEVEL_DEBUG, "[ITU-T X.224] Connection Sequence: receive connection request");
|
2014-03-05 06:11:55 +04:00
|
|
|
|
s = libxrdp_force_read(self->trans);
|
2020-04-14 13:01:52 +03:00
|
|
|
|
if (s == NULL)
|
2014-03-05 06:11:55 +04:00
|
|
|
|
{
|
2021-02-04 13:11:54 +03:00
|
|
|
|
LOG(LOG_LEVEL_ERROR, "[ITU-T X.224] Connection Sequence: CR-TPDU (Connection Request) failed");
|
2014-03-05 06:11:55 +04:00
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2013-10-09 23:41:24 +04:00
|
|
|
|
if (xrdp_iso_recv_msg(self, s, &code, &len) != 0)
|
2012-09-20 07:51:34 +04:00
|
|
|
|
{
|
2021-02-04 13:11:54 +03:00
|
|
|
|
LOG(LOG_LEVEL_ERROR, "[ITU-T X.224] Connection Sequence: CR-TPDU (Connection Request) failed");
|
2012-09-20 07:51:34 +04:00
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2020-04-14 13:01:52 +03:00
|
|
|
|
if (code != ISO_PDU_CR)
|
2012-09-20 07:51:34 +04:00
|
|
|
|
{
|
2021-02-04 13:11:54 +03:00
|
|
|
|
LOG(LOG_LEVEL_ERROR, "xrdp_iso_incoming only supports processing "
|
|
|
|
|
"[ITU-T X.224] CR-TPDU (Connection Request) headers. "
|
|
|
|
|
"Received TPDU header: length indicator %d, TDPU code 0x%2.2x",
|
|
|
|
|
len, code);
|
2012-09-20 07:51:34 +04:00
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2020-04-14 13:01:52 +03:00
|
|
|
|
/*
|
|
|
|
|
* Make sure the length indicator field extracted from the X.224
|
|
|
|
|
* connection request TPDU corresponds to the length in the TPKT header.
|
|
|
|
|
*
|
|
|
|
|
* We do this by seeing how the indicator field minus the counted
|
|
|
|
|
* octets in the TPDU header (6) compares with the space left in
|
|
|
|
|
* the stream.
|
|
|
|
|
*/
|
|
|
|
|
expected_pdu_len = (s->end - s->p) + 6;
|
|
|
|
|
if (len != expected_pdu_len)
|
|
|
|
|
{
|
2021-02-04 13:11:54 +03:00
|
|
|
|
LOG(LOG_LEVEL_ERROR,
|
|
|
|
|
"Invalid length indicator in [ITU-T X.224] CR-TPDU (Connection Request). "
|
|
|
|
|
"expected %d, received %d",
|
2020-12-05 21:28:34 +03:00
|
|
|
|
expected_pdu_len, len);
|
2020-04-14 13:01:52 +03:00
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2021-02-04 13:11:54 +03:00
|
|
|
|
/* process connection request [MS-RDPBCGR] 2.2.1.1 */
|
2020-04-14 13:01:52 +03:00
|
|
|
|
while (s_check_rem(s, 1))
|
2013-10-10 03:33:13 +04:00
|
|
|
|
{
|
2021-02-04 13:11:54 +03:00
|
|
|
|
in_uint8(s, cc_type); /* type or 'C' */
|
2013-10-10 03:33:13 +04:00
|
|
|
|
switch (cc_type)
|
2013-10-09 23:41:24 +04:00
|
|
|
|
{
|
2013-10-10 05:23:21 +04:00
|
|
|
|
default:
|
2021-02-04 13:11:54 +03:00
|
|
|
|
LOG_DEVEL(LOG_LEVEL_WARNING,
|
|
|
|
|
"Ignoring unknown structure type in [ITU-T X.224] CR-TPDU (Connection Request). "
|
|
|
|
|
"type 0x%2.2x", cc_type);
|
2013-10-10 03:33:13 +04:00
|
|
|
|
break;
|
2013-10-10 05:23:21 +04:00
|
|
|
|
case RDP_NEG_REQ: /* rdpNegReq 1 */
|
2014-07-10 16:40:16 +04:00
|
|
|
|
self->rdpNegData = 1;
|
2014-12-13 17:24:07 +03:00
|
|
|
|
if (xrdp_iso_process_rdp_neg_req(self, s) != 0)
|
2013-10-10 03:33:13 +04:00
|
|
|
|
{
|
2021-02-04 13:11:54 +03:00
|
|
|
|
LOG(LOG_LEVEL_ERROR,
|
|
|
|
|
"[ITU-T X.224] Connection Sequence: failed");
|
2013-10-10 03:33:13 +04:00
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
break;
|
2013-10-10 05:23:21 +04:00
|
|
|
|
case RDP_CORRELATION_INFO: /* rdpCorrelationInfo 6 */
|
|
|
|
|
// TODO
|
2021-02-04 13:11:54 +03:00
|
|
|
|
if (!s_check_rem_and_log(s, 1 + 2 + 16 + 16,
|
|
|
|
|
"Parsing [MS-RDPBCGR] RDP_NEG_CORRELATION_INFO"))
|
2020-04-14 13:01:52 +03:00
|
|
|
|
{
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2013-10-10 03:33:13 +04:00
|
|
|
|
in_uint8s(s, 1 + 2 + 16 + 16);
|
2021-02-04 13:11:54 +03:00
|
|
|
|
LOG_DEVEL(LOG_LEVEL_TRACE,
|
|
|
|
|
"Received struct [MS-RDPBCGR] RDP_NEG_CORRELATION_INFO "
|
|
|
|
|
"(all fields ignored)");
|
2013-10-10 03:33:13 +04:00
|
|
|
|
break;
|
2021-02-04 13:11:54 +03:00
|
|
|
|
case 'C': /* Cookie or routingToken */
|
2020-11-30 06:29:57 +03:00
|
|
|
|
/* The routingToken and cookie fields are both ASCII
|
|
|
|
|
* strings starting with the word 'Cookie: ' and
|
|
|
|
|
* ending with CR+LF. We ignore both, so we do
|
|
|
|
|
* not need to distinguish them */
|
2020-04-14 13:01:52 +03:00
|
|
|
|
while (s_check_rem(s, 1))
|
2013-10-10 03:33:13 +04:00
|
|
|
|
{
|
2020-04-14 13:01:52 +03:00
|
|
|
|
in_uint8(s, cc_type);
|
|
|
|
|
if (cc_type == 0x0D && s_check_rem(s, 1))
|
2013-10-10 03:33:13 +04:00
|
|
|
|
{
|
2020-04-14 13:01:52 +03:00
|
|
|
|
in_uint8(s, cc_type);
|
|
|
|
|
if (cc_type == 0x0A)
|
2016-04-10 08:10:12 +03:00
|
|
|
|
{
|
2020-04-14 13:01:52 +03:00
|
|
|
|
break;
|
2016-04-10 08:10:12 +03:00
|
|
|
|
}
|
2013-10-10 03:33:13 +04:00
|
|
|
|
}
|
|
|
|
|
}
|
2021-02-04 13:11:54 +03:00
|
|
|
|
LOG_DEVEL(LOG_LEVEL_TRACE,
|
|
|
|
|
"Received struct [MS-RDPBCGR] routingToken or cookie "
|
|
|
|
|
"(ignored)");
|
2013-10-10 03:33:13 +04:00
|
|
|
|
break;
|
2013-10-09 23:41:24 +04:00
|
|
|
|
}
|
2013-10-10 03:33:13 +04:00
|
|
|
|
}
|
|
|
|
|
|
2014-12-13 17:24:07 +03:00
|
|
|
|
/* negotiate client-server security layer */
|
2014-12-13 17:36:23 +03:00
|
|
|
|
rv = xrdp_iso_negotiate_security(self);
|
2014-07-12 08:19:02 +04:00
|
|
|
|
|
2014-07-10 16:40:16 +04:00
|
|
|
|
/* send connection confirm back to client */
|
2021-02-04 13:11:54 +03:00
|
|
|
|
LOG_DEVEL(LOG_LEVEL_DEBUG, "[ITU-T X.224] Connection Sequence: send connection confirmation");
|
2014-07-10 16:40:16 +04:00
|
|
|
|
if (xrdp_iso_send_cc(self) != 0)
|
2013-10-10 03:33:13 +04:00
|
|
|
|
{
|
2021-02-04 13:11:54 +03:00
|
|
|
|
LOG(LOG_LEVEL_ERROR, "[ITU-T X.224] Connection Sequence: send connection confirmation failed");
|
2013-10-10 05:23:21 +04:00
|
|
|
|
return 1;
|
2012-09-20 07:51:34 +04:00
|
|
|
|
}
|
|
|
|
|
|
2021-02-04 13:11:54 +03:00
|
|
|
|
LOG_DEVEL(LOG_LEVEL_DEBUG, "[ITU-T X.224] Connection Sequence: completed");
|
2014-12-13 17:36:23 +03:00
|
|
|
|
return rv;
|
2005-06-28 07:11:35 +04:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*****************************************************************************/
|
|
|
|
|
/* returns error */
|
2017-03-12 19:35:00 +03:00
|
|
|
|
int
|
2012-09-20 07:51:34 +04:00
|
|
|
|
xrdp_iso_init(struct xrdp_iso *self, struct stream *s)
|
2005-06-28 07:11:35 +04:00
|
|
|
|
{
|
2014-02-26 08:47:34 +04:00
|
|
|
|
init_stream(s, 8192 * 4); /* 32 KB */
|
2012-09-20 07:51:34 +04:00
|
|
|
|
s_push_layer(s, iso_hdr, 7);
|
|
|
|
|
return 0;
|
2005-06-28 07:11:35 +04:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*****************************************************************************/
|
2021-02-04 13:11:54 +03:00
|
|
|
|
/* Sends a message with the [ITU-T T.123] TPKT header (T.123 section 8) and
|
|
|
|
|
* [ITU-T X.224] DT-TPDU (Data) header (X.224 section 13)
|
|
|
|
|
* returns error
|
|
|
|
|
*/
|
2017-03-12 19:35:00 +03:00
|
|
|
|
int
|
2012-09-20 07:51:34 +04:00
|
|
|
|
xrdp_iso_send(struct xrdp_iso *self, struct stream *s)
|
2005-06-28 07:11:35 +04:00
|
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
|
int len;
|
|
|
|
|
|
|
|
|
|
s_pop_layer(s, iso_hdr);
|
2014-07-10 16:40:16 +04:00
|
|
|
|
len = (int) (s->end - s->p);
|
2021-02-04 13:11:54 +03:00
|
|
|
|
/* [ITU-T T.123] TPKT header */
|
|
|
|
|
out_uint8(s, 3); /* version */
|
|
|
|
|
out_uint8(s, 0); /* reserved (padding) */
|
|
|
|
|
out_uint16_be(s, len); /* length */
|
|
|
|
|
|
|
|
|
|
/* [ITU-T X.224] DT-TPDU (Data) header */
|
|
|
|
|
out_uint8(s, 2); /* LI (length indicator) */
|
|
|
|
|
out_uint8(s, ISO_PDU_DT); /* TPDU code */
|
|
|
|
|
out_uint8(s, 0x80); /* EOT (End of TSDU Mark) (upper 1 bit) and
|
|
|
|
|
TPDU-NR (Data TPDU Number) (lower 7 bits) */
|
|
|
|
|
|
|
|
|
|
LOG_DEVEL(LOG_LEVEL_TRACE, "Adding header [ITU-T T.123] TPKT "
|
|
|
|
|
"version 3, length %d", len);
|
|
|
|
|
LOG_DEVEL(LOG_LEVEL_TRACE, "Adding header [ITU-T X.224] DT-TPDU (Data) "
|
|
|
|
|
"length indicator 2, TPDU code 0x%2.2x, EOT 1, TPDU-NR 0x00",
|
|
|
|
|
ISO_PDU_DT);
|
2012-09-20 07:51:34 +04:00
|
|
|
|
|
2015-07-06 09:14:46 +03:00
|
|
|
|
if (trans_write_copy_s(self->trans, s) != 0)
|
2012-09-20 07:51:34 +04:00
|
|
|
|
{
|
2021-02-04 13:11:54 +03:00
|
|
|
|
LOG(LOG_LEVEL_ERROR, "xrdp_iso_send: trans_write_copy_s failed");
|
2012-09-20 07:51:34 +04:00
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 0;
|
2005-06-28 07:11:35 +04:00
|
|
|
|
}
|