jcs's openbsd hax
openbsd
at jcs 409 lines 16 kB view raw
1/* $OpenBSD: channels.h,v 1.162 2025/10/07 08:02:32 djm Exp $ */ 2 3/* 4 * Author: Tatu Ylonen <ylo@cs.hut.fi> 5 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 6 * All rights reserved 7 * 8 * As far as I am concerned, the code I have written for this software 9 * can be used freely for any purpose. Any derived versions of this 10 * software must be clearly marked as such, and if the derived work is 11 * incompatible with the protocol description in the RFC file, it must be 12 * called by a name other than "ssh" or "Secure Shell". 13 */ 14/* 15 * Copyright (c) 1999, 2000, 2001, 2002 Markus Friedl. All rights reserved. 16 * 17 * Redistribution and use in source and binary forms, with or without 18 * modification, are permitted provided that the following conditions 19 * are met: 20 * 1. Redistributions of source code must retain the above copyright 21 * notice, this list of conditions and the following disclaimer. 22 * 2. Redistributions in binary form must reproduce the above copyright 23 * notice, this list of conditions and the following disclaimer in the 24 * documentation and/or other materials provided with the distribution. 25 * 26 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 27 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 28 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 29 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 30 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 31 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 32 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 33 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 34 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 35 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 36 */ 37 38#ifndef CHANNEL_H 39#define CHANNEL_H 40 41/* Definitions for channel types. */ 42#define SSH_CHANNEL_X11_LISTENER 1 /* Listening for inet X11 conn. */ 43#define SSH_CHANNEL_PORT_LISTENER 2 /* Listening on a port. */ 44#define SSH_CHANNEL_OPENING 3 /* waiting for confirmation */ 45#define SSH_CHANNEL_OPEN 4 /* normal open two-way channel */ 46#define SSH_CHANNEL_CLOSED 5 /* waiting for close confirmation */ 47#define SSH_CHANNEL_AUTH_SOCKET 6 /* authentication socket */ 48#define SSH_CHANNEL_X11_OPEN 7 /* reading first X11 packet */ 49#define SSH_CHANNEL_LARVAL 10 /* larval session */ 50#define SSH_CHANNEL_RPORT_LISTENER 11 /* Listening to a R-style port */ 51#define SSH_CHANNEL_CONNECTING 12 52#define SSH_CHANNEL_DYNAMIC 13 53#define SSH_CHANNEL_ZOMBIE 14 /* Almost dead. */ 54#define SSH_CHANNEL_MUX_LISTENER 15 /* Listener for mux conn. */ 55#define SSH_CHANNEL_MUX_CLIENT 16 /* Conn. to mux client */ 56#define SSH_CHANNEL_ABANDONED 17 /* Abandoned session, eg mux */ 57#define SSH_CHANNEL_UNIX_LISTENER 18 /* Listening on a domain socket. */ 58#define SSH_CHANNEL_RUNIX_LISTENER 19 /* Listening to a R-style domain socket. */ 59#define SSH_CHANNEL_MUX_PROXY 20 /* proxy channel for mux-client */ 60#define SSH_CHANNEL_RDYNAMIC_OPEN 21 /* reverse SOCKS, parsing request */ 61#define SSH_CHANNEL_RDYNAMIC_FINISH 22 /* reverse SOCKS, finishing connect */ 62#define SSH_CHANNEL_MAX_TYPE 23 63 64#define CHANNEL_CANCEL_PORT_STATIC -1 65 66/* nonblocking flags for channel_new */ 67#define CHANNEL_NONBLOCK_LEAVE 0 /* don't modify non-blocking state */ 68#define CHANNEL_NONBLOCK_SET 1 /* set non-blocking state */ 69#define CHANNEL_NONBLOCK_STDIO 2 /* set non-blocking and restore on close */ 70 71/* c->restore_block mask flags */ 72#define CHANNEL_RESTORE_RFD 0x01 73#define CHANNEL_RESTORE_WFD 0x02 74#define CHANNEL_RESTORE_EFD 0x04 75 76/* TCP forwarding */ 77#define FORWARD_DENY 0 78#define FORWARD_REMOTE (1) 79#define FORWARD_LOCAL (1<<1) 80#define FORWARD_ALLOW (FORWARD_REMOTE|FORWARD_LOCAL) 81 82#define FORWARD_ADM 0x100 83#define FORWARD_USER 0x101 84 85/* default pattern-lists used to classify channel types as bulk */ 86#define CHANNEL_BULK_TTY "" 87#define CHANNEL_BULK_NOTTY "direct-*,forwarded-*,tun-*,x11-*,session*" 88 89struct ssh; 90struct Channel; 91typedef struct Channel Channel; 92 93typedef void channel_open_fn(struct ssh *, int, int, void *); 94typedef void channel_callback_fn(struct ssh *, int, int, void *); 95typedef int channel_infilter_fn(struct ssh *, struct Channel *, char *, int); 96typedef void channel_filter_cleanup_fn(struct ssh *, int, void *); 97typedef u_char *channel_outfilter_fn(struct ssh *, struct Channel *, 98 u_char **, size_t *); 99 100/* Channel success/failure callbacks */ 101typedef void channel_confirm_cb(struct ssh *, int, struct Channel *, void *); 102typedef void channel_confirm_abandon_cb(struct ssh *, struct Channel *, void *); 103struct channel_confirm { 104 TAILQ_ENTRY(channel_confirm) entry; 105 channel_confirm_cb *cb; 106 channel_confirm_abandon_cb *abandon_cb; 107 void *ctx; 108}; 109TAILQ_HEAD(channel_confirms, channel_confirm); 110 111/* Context for non-blocking connects */ 112struct channel_connect { 113 char *host; 114 int port; 115 struct addrinfo *ai, *aitop; 116}; 117 118/* Callbacks for mux channels back into client-specific code */ 119typedef int mux_callback_fn(struct ssh *, struct Channel *); 120 121/* 122 * NB. channel IDs on the wire and in c->remote_id are uint32, but local 123 * channel IDs (e.g. c->self) only ever use the int32 subset of this range, 124 * because we use local channel ID -1 for housekeeping. Remote channels have 125 * a dedicated "have_remote_id" flag to indicate their validity. 126 */ 127 128struct Channel { 129 int type; /* channel type/state */ 130 131 int self; /* my own channel identifier */ 132 uint32_t remote_id; /* channel identifier for remote peer */ 133 int have_remote_id; /* non-zero if remote_id is valid */ 134 135 u_int istate; /* input from channel (state of receive half) */ 136 u_int ostate; /* output to channel (state of transmit half) */ 137 int flags; /* close sent/rcvd */ 138 int rfd; /* read fd */ 139 int wfd; /* write fd */ 140 int efd; /* extended fd */ 141 int sock; /* sock fd */ 142 u_int io_want; /* bitmask of SSH_CHAN_IO_* */ 143 u_int io_ready; /* bitmask of SSH_CHAN_IO_* */ 144 int pfds[4]; /* pollfd entries for rfd/wfd/efd/sock */ 145 int ctl_chan; /* control channel (multiplexed connections) */ 146 uint32_t ctl_child_id; /* child session for mux controllers */ 147 int have_ctl_child_id;/* non-zero if ctl_child_id is valid */ 148 int remote_has_tty; /* remote side has a tty */ 149 int isatty; /* rfd is a tty */ 150 int client_tty; /* (client) TTY has been requested */ 151 int force_drain; /* force close on iEOF */ 152 time_t notbefore; /* Pause IO until deadline (time_t) */ 153 int delayed; /* post-IO handlers for newly created 154 * channels are delayed until the first call 155 * to a matching pre-IO handler. 156 * this way post-IO handlers are not 157 * accidentally called if a FD gets reused */ 158 int restore_block; /* fd mask to restore blocking status */ 159 int restore_flags[3];/* flags to restore */ 160 struct sshbuf *input; /* data read from socket, to be sent over 161 * encrypted connection */ 162 struct sshbuf *output; /* data received over encrypted connection for 163 * send on socket */ 164 struct sshbuf *extended; 165 166 char *path; 167 /* path for unix domain sockets, or host name for forwards */ 168 int listening_port; /* port being listened for forwards */ 169 char *listening_addr; /* addr being listened for forwards */ 170 int host_port; /* remote port to connect for forwards */ 171 char *remote_name; /* remote hostname */ 172 173 u_int remote_window; 174 u_int remote_maxpacket; 175 u_int local_window; 176 u_int local_window_exceeded; 177 u_int local_window_max; 178 u_int local_consumed; 179 u_int local_maxpacket; 180 int extended_usage; 181 int single_connection; 182 183 char *ctype; /* const type - NB. not freed on channel_free */ 184 char *xctype; /* extended type */ 185 int bulk; /* channel is non-interactive */ 186 187 /* callback */ 188 channel_open_fn *open_confirm; 189 void *open_confirm_ctx; 190 channel_callback_fn *detach_user; 191 int detach_close; 192 struct channel_confirms status_confirms; 193 194 /* filter */ 195 channel_infilter_fn *input_filter; 196 channel_outfilter_fn *output_filter; 197 void *filter_ctx; 198 channel_filter_cleanup_fn *filter_cleanup; 199 200 /* keep boundaries */ 201 int datagram; 202 203 /* non-blocking connect */ 204 /* XXX make this a pointer so the structure can be opaque */ 205 struct channel_connect connect_ctx; 206 207 /* multiplexing protocol hook, called for each packet received */ 208 mux_callback_fn *mux_rcb; 209 void *mux_ctx; 210 int mux_pause; 211 int mux_downstream_id; 212 213 /* Inactivity timeouts */ 214 215 /* Last traffic seen for OPEN channels */ 216 time_t lastused; 217 /* Inactivity timeout deadline in seconds (0 = no timeout) */ 218 int inactive_deadline; 219}; 220 221#define CHAN_EXTENDED_IGNORE 0 222#define CHAN_EXTENDED_READ 1 223#define CHAN_EXTENDED_WRITE 2 224 225/* default window/packet sizes for tcp/x11-fwd-channel */ 226#define CHAN_SES_PACKET_DEFAULT (32*1024) 227#define CHAN_SES_WINDOW_DEFAULT (64*CHAN_SES_PACKET_DEFAULT) 228#define CHAN_TCP_PACKET_DEFAULT (32*1024) 229#define CHAN_TCP_WINDOW_DEFAULT (64*CHAN_TCP_PACKET_DEFAULT) 230#define CHAN_X11_PACKET_DEFAULT (16*1024) 231#define CHAN_X11_WINDOW_DEFAULT (4*CHAN_X11_PACKET_DEFAULT) 232 233/* possible input states */ 234#define CHAN_INPUT_OPEN 0 235#define CHAN_INPUT_WAIT_DRAIN 1 236#define CHAN_INPUT_WAIT_OCLOSE 2 237#define CHAN_INPUT_CLOSED 3 238 239/* possible output states */ 240#define CHAN_OUTPUT_OPEN 0 241#define CHAN_OUTPUT_WAIT_DRAIN 1 242#define CHAN_OUTPUT_WAIT_IEOF 2 243#define CHAN_OUTPUT_CLOSED 3 244 245#define CHAN_CLOSE_SENT 0x01 246#define CHAN_CLOSE_RCVD 0x02 247#define CHAN_EOF_SENT 0x04 248#define CHAN_EOF_RCVD 0x08 249#define CHAN_LOCAL 0x10 250 251/* file descriptor events */ 252#define SSH_CHAN_IO_RFD 0x01 253#define SSH_CHAN_IO_WFD 0x02 254#define SSH_CHAN_IO_EFD_R 0x04 255#define SSH_CHAN_IO_EFD_W 0x08 256#define SSH_CHAN_IO_EFD (SSH_CHAN_IO_EFD_R|SSH_CHAN_IO_EFD_W) 257#define SSH_CHAN_IO_SOCK_R 0x10 258#define SSH_CHAN_IO_SOCK_W 0x20 259#define SSH_CHAN_IO_SOCK (SSH_CHAN_IO_SOCK_R|SSH_CHAN_IO_SOCK_W) 260 261/* Read buffer size */ 262#define CHAN_RBUF (16*1024) 263 264/* Maximum size for direct reads to buffers */ 265#define CHANNEL_MAX_READ CHAN_SES_PACKET_DEFAULT 266 267/* Maximum channel input buffer size */ 268#define CHAN_INPUT_MAX (16*1024*1024) 269 270/* Hard limit on number of channels */ 271#define CHANNELS_MAX_CHANNELS (16*1024) 272 273/* check whether 'efd' is still in use */ 274#define CHANNEL_EFD_INPUT_ACTIVE(c) \ 275 (c->extended_usage == CHAN_EXTENDED_READ && \ 276 (c->efd != -1 || \ 277 sshbuf_len(c->extended) > 0)) 278#define CHANNEL_EFD_OUTPUT_ACTIVE(c) \ 279 (c->extended_usage == CHAN_EXTENDED_WRITE && \ 280 c->efd != -1 && (!(c->flags & (CHAN_EOF_RCVD|CHAN_CLOSE_RCVD)) || \ 281 sshbuf_len(c->extended) > 0)) 282 283/* Add/remove channel management structures to/from SSH transport instance */ 284void channel_init_channels(struct ssh *ssh); 285void channel_free_channels(struct ssh *ssh); 286 287/* channel management */ 288 289Channel *channel_by_id(struct ssh *, int); 290Channel *channel_by_remote_id(struct ssh *, u_int); 291Channel *channel_lookup(struct ssh *, int); 292Channel *channel_new(struct ssh *, char *, int, int, int, int, 293 u_int, u_int, int, const char *, int); 294void channel_set_fds(struct ssh *, int, int, int, int, int, 295 int, int, u_int); 296void channel_set_tty(struct ssh *, Channel *); 297void channel_free(struct ssh *, Channel *); 298void channel_free_all(struct ssh *); 299void channel_stop_listening(struct ssh *); 300void channel_force_close(struct ssh *, Channel *, int); 301void channel_set_xtype(struct ssh *, int, const char *); 302 303void channel_send_open(struct ssh *, int); 304void channel_request_start(struct ssh *, int, char *, int); 305void channel_register_cleanup(struct ssh *, int, 306 channel_callback_fn *, int); 307void channel_register_open_confirm(struct ssh *, int, 308 channel_open_fn *, void *); 309void channel_register_filter(struct ssh *, int, channel_infilter_fn *, 310 channel_outfilter_fn *, channel_filter_cleanup_fn *, void *); 311void channel_register_status_confirm(struct ssh *, int, 312 channel_confirm_cb *, channel_confirm_abandon_cb *, void *); 313void channel_cancel_cleanup(struct ssh *, int); 314int channel_close_fd(struct ssh *, Channel *, int *); 315void channel_send_window_changes(struct ssh *); 316int channel_has_bulk(struct ssh *); 317 318/* channel inactivity timeouts */ 319void channel_add_timeout(struct ssh *, const char *, int); 320void channel_clear_timeouts(struct ssh *); 321 322/* mux proxy support */ 323 324int channel_proxy_downstream(struct ssh *, Channel *mc); 325int channel_proxy_upstream(Channel *, int, u_int32_t, struct ssh *); 326 327/* protocol handler */ 328 329int channel_input_data(int, u_int32_t, struct ssh *); 330int channel_input_extended_data(int, u_int32_t, struct ssh *); 331int channel_input_ieof(int, u_int32_t, struct ssh *); 332int channel_input_oclose(int, u_int32_t, struct ssh *); 333int channel_input_open_confirmation(int, u_int32_t, struct ssh *); 334int channel_input_open_failure(int, u_int32_t, struct ssh *); 335int channel_input_window_adjust(int, u_int32_t, struct ssh *); 336int channel_input_status_confirm(int, u_int32_t, struct ssh *); 337 338/* file descriptor handling (read/write) */ 339struct pollfd; 340struct timespec; 341 342void channel_prepare_poll(struct ssh *, struct pollfd **, 343 u_int *, u_int *, u_int, struct timespec *); 344void channel_after_poll(struct ssh *, struct pollfd *, u_int); 345int channel_output_poll(struct ssh *); 346 347int channel_not_very_much_buffered_data(struct ssh *); 348void channel_close_all(struct ssh *); 349int channel_still_open(struct ssh *); 350int channel_tty_open(struct ssh *); 351const char *channel_format_extended_usage(const Channel *); 352char *channel_open_message(struct ssh *); 353void channel_report_open(struct ssh *, int); 354int channel_find_open(struct ssh *); 355 356/* tcp forwarding */ 357struct Forward; 358struct ForwardOptions; 359void channel_set_af(struct ssh *, int af); 360void channel_permit_all(struct ssh *, int); 361void channel_add_permission(struct ssh *, int, int, char *, int); 362void channel_clear_permission(struct ssh *, int, int); 363void channel_disable_admin(struct ssh *, int); 364void channel_update_permission(struct ssh *, int, int); 365Channel *channel_connect_to_port(struct ssh *, const char *, u_short, 366 char *, char *, int *, const char **); 367Channel *channel_connect_to_path(struct ssh *, const char *, char *, char *); 368Channel *channel_connect_stdio_fwd(struct ssh *, const char*, 369 int, int, int, int); 370Channel *channel_connect_by_listen_address(struct ssh *, const char *, 371 u_short, char *, char *); 372Channel *channel_connect_by_listen_path(struct ssh *, const char *, 373 char *, char *); 374int channel_request_remote_forwarding(struct ssh *, struct Forward *); 375int channel_setup_local_fwd_listener(struct ssh *, struct Forward *, 376 struct ForwardOptions *); 377int channel_request_rforward_cancel(struct ssh *, struct Forward *); 378int channel_setup_remote_fwd_listener(struct ssh *, struct Forward *, 379 int *, struct ForwardOptions *); 380int channel_cancel_rport_listener(struct ssh *, struct Forward *); 381int channel_cancel_lport_listener(struct ssh *, struct Forward *, 382 int, struct ForwardOptions *); 383int permitopen_port(const char *); 384 385/* x11 forwarding */ 386 387void channel_set_x11_refuse_time(struct ssh *, time_t); 388int x11_connect_display(struct ssh *); 389int x11_create_display_inet(struct ssh *, int, int, int, u_int *, int **); 390void x11_request_forwarding_with_spoofing(struct ssh *, int, 391 const char *, const char *, const char *, int); 392int x11_channel_used_recently(struct ssh *ssh); 393 394/* channel close */ 395 396int chan_is_dead(struct ssh *, Channel *, int); 397void chan_mark_dead(struct ssh *, Channel *); 398 399/* channel events */ 400 401void chan_rcvd_oclose(struct ssh *, Channel *); 402void chan_rcvd_eow(struct ssh *, Channel *); 403void chan_read_failed(struct ssh *, Channel *); 404void chan_ibuf_empty(struct ssh *, Channel *); 405void chan_rcvd_ieof(struct ssh *, Channel *); 406void chan_write_failed(struct ssh *, Channel *); 407void chan_obuf_empty(struct ssh *, Channel *); 408 409#endif