TLS illegal extension (gnutls) - ssl
I am using the code for anonymous TLS connection as provided in gnutls.org.
The server is implemented on an ubuntu machine, the client is an ARM Cortex A8 embedded device. Server and Client are in the same LAN.
Each time the client starts a connection the error (-58) is generated during the handshake which means GNUTLS_E_RECEIVED_ILLEGAL_EXTENSION i.e. "An illegal TLS extension was received.".
From the server side i get the error:
*** Handshake has failed (Error in the pull function.)
However, when I run both server and client on the ubuntu machine (I use the loopback address as destination in the client), everything is fine.
In the same way, if I run both server and client on the embedded board (always with the loopback address as destination in the client), everything is fine.
The embedded board uses gnutls ver 3.6.4. In the ubuntu host there is the gnutls 3.6.13.
Is there a way to find the "illegal" tls extension?
This is a wireshark capture of the wrong transaction:
"No.","Time","Source","Destination","Protocol","Length","Info"
"148","22.907515133","192.168.0.47","192.168.0.184","TCP","74","53378 > 2525 [SYN] Seq=0 Win=29200 Len=0 MSS=1460 SACK_PERM=1 TSval=2912635975 TSecr=0 WS=32"
"149","22.907546972","192.168.0.184","192.168.0.47","TCP","74","2525 > 53378 [SYN, ACK] Seq=0 Ack=1 Win=65160 Len=0 MSS=1460 SACK_PERM=1 TSval=2543059266 TSecr=2912635975 WS=128"
"150","22.908244578","192.168.0.47","192.168.0.184","TCP","66","53378 > 2525 [ACK] Seq=1 Ack=1 Win=29216 Len=0 TSval=2912635976 TSecr=2543059266"
"151","22.909329144","192.168.0.47","192.168.0.184","TLSv1.2","232","Client Hello"
"152","22.909344645","192.168.0.184","192.168.0.47","TCP","66","2525 > 53378 [ACK] Seq=1 Ack=167 Win=65024 Len=0 TSval=2543059267 TSecr=2912635977"
"153","22.909772038","192.168.0.184","192.168.0.47","TLSv1.2","259","Server Hello, Server Key Exchange, Server Hello Done"
"154","22.910430333","192.168.0.47","192.168.0.184","TCP","66","53378 > 2525 [ACK] Seq=167 Ack=194 Win=30272 Len=0 TSval=2912635978 TSecr=2543059268"
"155","22.911259314","192.168.0.47","192.168.0.184","TCP","66","53378 > 2525 [RST, ACK] Seq=167 Ack=194 Win=30272 Len=0 TSval=2912635979 TSecr=2543059268"
The Wireshark capture of the loopback sucessful transaction:
"No.","Time","Source","Destination","Protocol","Length","Info"
"1","0.000000000","127.0.0.1","127.0.0.1","TCP","74","48226 > 2525 [SYN] Seq=0 Win=65495 Len=0 MSS=65495 SACK_PERM=1 TSval=4110066202 TSecr=0 WS=128"
"2","0.000015551","127.0.0.1","127.0.0.1","TCP","74","2525 > 48226 [SYN, ACK] Seq=0 Ack=1 Win=65483 Len=0 MSS=65495 SACK_PERM=1 TSval=4110066202 TSecr=4110066202 WS=128"
"3","0.000029625","127.0.0.1","127.0.0.1","TCP","66","48226 > 2525 [ACK] Seq=1 Ack=1 Win=65536 Len=0 TSval=4110066202 TSecr=4110066202"
"4","0.000149840","127.0.0.1","127.0.0.1","TLSv1.2","236","Client Hello"
"5","0.000156259","127.0.0.1","127.0.0.1","TCP","66","2525 > 48226 [ACK] Seq=1 Ack=171 Win=65408 Len=0 TSval=4110066202 TSecr=4110066202"
"6","0.000390203","127.0.0.1","127.0.0.1","TLSv1.2","259","Server Hello, Server Key Exchange, Server Hello Done"
"7","0.000434564","127.0.0.1","127.0.0.1","TCP","66","48226 > 2525 [ACK] Seq=171 Ack=194 Win=65408 Len=0 TSval=4110066202 TSecr=4110066202"
"8","0.001128440","127.0.0.1","127.0.0.1","TLSv1.2","220","Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message"
"9","0.001174055","127.0.0.1","127.0.0.1","TCP","66","2525 > 48226 [ACK] Seq=194 Ack=325 Win=65408 Len=0 TSval=4110066203 TSecr=4110066203"
"10","0.001695368","127.0.0.1","127.0.0.1","TLSv1.2","145","Change Cipher Spec, Encrypted Handshake Message"
"11","0.001739096","127.0.0.1","127.0.0.1","TCP","66","48226 > 2525 [ACK] Seq=325 Ack=273 Win=65536 Len=0 TSval=4110066204 TSecr=4110066204"
"12","0.001880330","127.0.0.1","127.0.0.1","TLSv1.2","139","Application Data"
"13","0.001885804","127.0.0.1","127.0.0.1","TCP","66","2525 > 48226 [ACK] Seq=273 Ack=398 Win=65536 Len=0 TSval=4110066204 TSecr=4110066204"
"14","0.001942348","127.0.0.1","127.0.0.1","TLSv1.2","139","Application Data"
"15","0.001947752","127.0.0.1","127.0.0.1","TCP","66","48226 > 2525 [ACK] Seq=398 Ack=346 Win=65536 Len=0 TSval=4110066204 TSecr=4110066204"
"16","0.002100239","127.0.0.1","127.0.0.1","TLSv1.2","123","Encrypted Alert"
"17","0.002105316","127.0.0.1","127.0.0.1","TCP","66","2525 > 48226 [ACK] Seq=346 Ack=455 Win=65536 Len=0 TSval=4110066204 TSecr=4110066204"
"18","0.002188593","127.0.0.1","127.0.0.1","TLSv1.2","123","Encrypted Alert"
"19","0.002193722","127.0.0.1","127.0.0.1","TCP","66","48226 > 2525 [ACK] Seq=455 Ack=403 Win=65536 Len=0 TSval=4110066204 TSecr=4110066204"
"20","0.002243619","127.0.0.1","127.0.0.1","TCP","66","2525 > 48226 [FIN, ACK] Seq=403 Ack=455 Win=65536 Len=0 TSval=4110066204 TSecr=4110066204"
"21","0.002278856","127.0.0.1","127.0.0.1","TCP","66","48226 > 2525 [FIN, ACK] Seq=455 Ack=404 Win=65536 Len=0 TSval=4110066204 TSecr=4110066204"
"22","0.002287692","127.0.0.1","127.0.0.1","TCP","66","2525 > 48226 [ACK] Seq=404 Ack=456 Win=65536 Len=0 TSval=4110066204 TSecr=4110066204"
Here the code for the client:
int tlsSendPacket_anonymous(void)
{
int ret, sd, ii;
gnutls_certificate_type_t gnu_certificate_type;
gnutls_anon_client_credentials_t anoncred;
/* Need to enable anonymous KX specifically. */
//moved before thread start
//gnutls_global_init();
ret = gnutls_anon_allocate_client_credentials(&anoncred);
if (GNUTLS_E_SUCCESS != ret)
{
SEND_MESSAGE(DBG_ERROR,"TLS ALLOCATION ERROR\n");
return ret;
}
/* Initialize TLS session
*/
ret = gnutls_init(&session, GNUTLS_CLIENT);
if (GNUTLS_E_SUCCESS != ret)
{
SEND_MESSAGE(DBG_ERROR,"TLS INIT ERROR\n");
return ret;
}
/* Use default priorities */
ret = gnutls_priority_set_direct(session,
"PERFORMANCE:+ANON-ECDH:+ANON-DH",
NULL);
if (GNUTLS_E_SUCCESS != ret)
{
SEND_MESSAGE(DBG_ERROR,"TLS PRIORITY SET ERROR\n");
return ret;
}
/* put the anonymous credentials to the current session
*/
ret = gnutls_credentials_set(session, GNUTLS_CRD_ANON, anoncred);
if (GNUTLS_E_SUCCESS != ret)
{
SEND_MESSAGE(DBG_ERROR,"TLS CREDENTIAL SET ERROR\n");
return ret;
}
/* connect to the peer
*/
sd = tcp_connect();
if (sd <= 0)
{
SEND_MESSAGE(DBG_ERROR,"TLS TCP CONNECTION ERROR\n");
return sd;
}
gnutls_transport_set_int(session, sd);
gnutls_handshake_set_timeout(session, GNUTLS_DEFAULT_HANDSHAKE_TIMEOUT);
/* Perform the TLS handshake
*/
do {
ret = gnutls_handshake(session);
}
while (ret < 0 && gnutls_error_is_fatal(ret) == 0);
if (ret < 0) {
fprintf(stderr, "*** Handshake failed\n");
gnutls_perror(ret);
goto end;
} else {
char *desc;
desc = gnutls_session_get_desc(session);
printf("- Session info: %s\n", desc);
gnutls_free(desc);
}
LOOP_CHECK(ret, gnutls_record_send(session, MSG, strlen(MSG)));
LOOP_CHECK(ret, gnutls_record_recv(session, buffer, MAX_BUF));
if (ret == 0) {
printf("- Peer has closed the TLS connection\n");
goto end;
} else if (ret < 0 && gnutls_error_is_fatal(ret) == 0) {
fprintf(stderr, "*** Warning: %s\n", gnutls_strerror(ret));
} else if (ret < 0) {
fprintf(stderr, "*** Error: %s\n", gnutls_strerror(ret));
goto end;
}
if (ret > 0) {
printf("- Received %d bytes: ", ret);
for (ii = 0; ii < ret; ii++) {
fputc(buffer[ii], stdout);
}
fputs("\n", stdout);
}
LOOP_CHECK(ret, gnutls_bye(session, GNUTLS_SHUT_RDWR));
end:
tcp_close(sd);
gnutls_deinit(session);
gnutls_anon_free_client_credentials(anoncred);
//Moved at thread end
//gnutls_global_deinit();
return 0;
}
And the server:
/* This example code is placed in the public domain. */
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif
#include <stdio.h>
#include <stdlib.h>
#include <errno.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <arpa/inet.h>
#include <netinet/in.h>
#include <string.h>
#include <unistd.h>
#include <gnutls/gnutls.h>
/* This is a sample TLS 1.0 echo server, for anonymous authentication only.
*/
#define SOCKET_ERR(err,s) if(err==-1) {perror(s);return(1);}
#define MAX_BUF 1024
#define PORT 2525 //5556 /* listen to 5556 port */
int main(void)
{
int err, listen_sd;
int sd, ret;
struct sockaddr_in sa_serv;
struct sockaddr_in sa_cli;
socklen_t client_len;
char topbuf[512];
gnutls_session_t session;
gnutls_anon_server_credentials_t anoncred;
char buffer[MAX_BUF + 1];
int optval = 1;
if (gnutls_check_version("3.1.4") == NULL) {
fprintf(stderr, "GnuTLS 3.1.4 or later is required for this example\n");
exit(1);
}
/* for backwards compatibility with gnutls < 3.3.0 */
gnutls_global_init();
gnutls_anon_allocate_server_credentials(&anoncred);
gnutls_anon_set_server_known_dh_params(anoncred, GNUTLS_SEC_PARAM_MEDIUM);
/* Socket operations
*/
listen_sd = socket(AF_INET, SOCK_STREAM, 0);
SOCKET_ERR(listen_sd, "socket");
memset(&sa_serv, '\0', sizeof(sa_serv));
sa_serv.sin_family = AF_INET;
sa_serv.sin_addr.s_addr = INADDR_ANY;
sa_serv.sin_port = htons(PORT); /* Server Port number */
setsockopt(listen_sd, SOL_SOCKET, SO_REUSEADDR, (void *) &optval,
sizeof(int));
err =
bind(listen_sd, (struct sockaddr *) &sa_serv, sizeof(sa_serv));
SOCKET_ERR(err, "bind");
err = listen(listen_sd, 1024);
SOCKET_ERR(err, "listen");
printf("Server ready. Listening to port '%d'.\n\n", PORT);
client_len = sizeof(sa_cli);
for (;;) {
gnutls_init(&session, GNUTLS_SERVER);
gnutls_priority_set_direct(session,
"NORMAL:+ANON-ECDH:+ANON-DH",
NULL);
gnutls_credentials_set(session, GNUTLS_CRD_ANON, anoncred);
sd = accept(listen_sd, (struct sockaddr *) &sa_cli,
&client_len);
printf("- connection from %s, port %d\n",
inet_ntop(AF_INET, &sa_cli.sin_addr, topbuf,
sizeof(topbuf)), ntohs(sa_cli.sin_port));
gnutls_transport_set_int(session, sd);
do {
ret = gnutls_handshake(session);
}
while (ret < 0 && gnutls_error_is_fatal(ret) == 0);
if (ret < 0) {
close(sd);
gnutls_deinit(session);
fprintf(stderr,
"*** Handshake has failed (%s)\n\n",
gnutls_strerror(ret));
continue;
}
printf("- Handshake was completed\n");
/* see the Getting peer's information example */
/* print_info(session); */
for (;;) {
ret = gnutls_record_recv(session, buffer, MAX_BUF);
if (ret == 0) {
printf
("\n- Peer has closed the GnuTLS connection\n");
break;
} else if (ret < 0
&& gnutls_error_is_fatal(ret) == 0) {
fprintf(stderr, "*** Warning: %s\n",
gnutls_strerror(ret));
} else if (ret < 0) {
fprintf(stderr, "\n*** Received corrupted "
"data(%d). Closing the connection.\n\n",
ret);
break;
} else if (ret > 0) {
/* echo data back to the client
*/
gnutls_record_send(session, buffer, ret);
}
}
printf("\n");
/* do not wait for the peer to close the connection.
*/
gnutls_bye(session, GNUTLS_SHUT_WR);
close(sd);
gnutls_deinit(session);
}
close(listen_sd);
gnutls_anon_free_server_credentials(anoncred);
gnutls_global_deinit();
return 0;
}
Related
UDP directed broadcast (WinSock2) failure
Let me start by saying this is my first foray into the world of C after 20+ years of assembly programming for PLCs and MicroControllers. I'm trying to send a UDP datagram to the network broadcast address, in this particular case, 192.168.1.255. The error I'm getting is a bind failure with error code 10049 (from WSAGetLastError()). As you can see from the attached code, I've created the socket, populated sockaddr_in, and setsockopt() to SO_BROADCAST. For the life of me I can't figure out what I'm doing wrong and any pointers would be gratefully received. iResult = WSAStartup(MAKEWORD(2, 2), &wsaTxData); if (iResult != NO_ERROR) { WSAErrorString("WSAStartup for TX failed"); return(-1); } XPLMDebugString("UDP Server: WSAStartup TX complete.\n"); if ((BeaconSocket = socket(AF_INET, SOCK_DGRAM, 0)) == INVALID_SOCKET) { WSAErrorString("UDP Server: Could not create BECN socket"); return(-1); } // setup the sockaddr_in structure // si_beacon.sin_family = AF_INET; si_beacon.sin_addr.s_addr = inet_addr("192.168.1.255"); si_beacon.sin_port = htons(_UDP_TX_PORT); // setup to broadcast // char so_broadcast_enabled = '1'; if (setsockopt(BeaconSocket, SOL_SOCKET, SO_BROADCAST, &so_broadcast_enabled, sizeof(so_broadcast_enabled)) == SOCKET_ERROR) { WSAErrorString("Error in setting Broadcast option"); closesocket(BeaconSocket); return(-1); } // bind our socket // if (bind(BeaconSocket, (struct sockaddr *)&si_beacon, sizeof(si_beacon)) == SOCKET_ERROR) { char buf[256]; WSAErrorString("Bind to socket for UDP beacon failed"); sprintf(buf, "Port %u, address %s\n", ntohs(si_beacon.sin_port), inet_ntoa(si_beacon.sin_addr)); XPLMDebugString(buf); return(-1); } // start the UDP beacon // udp_becn_thread_id = CreateThread(NULL, 0, BeaconThread, NULL, 0, NULL); if (!udp_becn_thread_id) { WSAErrorString("UDP Server: Error starting UDP Beacon"); return (-1); } XPLMDebugString("UDP Server: bind complete. beacon ACTIVE.\n"); return(0);
The issue is the IP address itself. I copied the code to my computer (changed it a bit to get it to compile) and I got the error: UDP Server: WSAStartup TX complete. Bind to socket for UDP beacon failed Port 47977, address 192.168.1.255 I then changed the line: si_beacon.sin_addr.s_addr = inet_addr("192.168.1.255"); To si_beacon.sin_addr.s_addr = inet_addr("192.168.0.127"); And when I ran it again, everything worked: UDP Server: WSAStartup TX complete. Done successfully The issue is that the "bind" address needs to be your computers address on the local network. Not the remote client. Another alternative is to use the address: si_beacon.sin_addr.s_addr = inet_addr("0.0.0.0"); which binds to all network interfaces on the computer at once. For reference, here's the version of the code that I used: #define _WINSOCK_DEPRECATED_NO_WARNINGS #include <stdio.h> #include <string.h> #include <WinSock2.h> #include <WS2tcpip.h> // For inet_pton #pragma comment(lib, "ws2_32.lib") int main() { { WSADATA wsaTxData; memset(&wsaTxData, 0, sizeof(WSADATA)); const int iResult = WSAStartup(MAKEWORD(2, 2), &wsaTxData); if (iResult != NO_ERROR) { printf("%s", "WSAStartup for TX failed.\n"); return -1; } printf("%s", "UDP Server: WSAStartup TX complete.\n"); } SOCKET BeaconSocket; memset(&BeaconSocket, 0, sizeof(SOCKET)); if ((BeaconSocket = socket(AF_INET, SOCK_DGRAM, 0)) == INVALID_SOCKET) { printf("%s", "UDP Server: Could not create BECN socket\n"); return -1; } // setup the sockaddr_in structure // sockaddr_in si_beacon; memset(&si_beacon, 0, sizeof(sockaddr_in)); si_beacon.sin_family = AF_INET; si_beacon.sin_addr.s_addr = inet_addr("0.0.0.0"); const unsigned short port_num = 0xbb69; si_beacon.sin_port = htons(port_num); // setup to broadcast // char so_broadcast_enabled = '1'; if (setsockopt(BeaconSocket, SOL_SOCKET, SO_BROADCAST, &so_broadcast_enabled, sizeof(so_broadcast_enabled)) == SOCKET_ERROR) { printf("%s", "Error in setting Broadcast option\n"); closesocket(BeaconSocket); return(-1); } // bind our socket // if (bind(BeaconSocket, (struct sockaddr*)&si_beacon, sizeof(si_beacon)) == SOCKET_ERROR) { char buf[256]; printf("%s", "Bind to socket for UDP beacon failed\n"); sprintf_s(buf, "Port %u, address %s\n", ntohs(si_beacon.sin_port), inet_ntoa(si_beacon.sin_addr)); printf("%s", buf); return(-1); } printf("%s", "Done successfully"); return 0; }
C program to extract TLS record layer
I am trying to parse a pcap to get the packet bytes of only the TLS Record Layer in the payload. In my following code I have managed to get only the tcp protocol bytes from the payload which contains the TLS Record Layer. I want to further extract only the TLS Record Layer bytes from this. Could you tell me how I can modify my code to extract only that part of the payload? void got_packet(u_char *args, const struct pcap_pkthdr *header, const u_char *packet){ static int count = 1; /* packet counter */ /* declare pointers to packet headers */ const struct ether_header *ethernet; /* The ethernet header [1] */ const struct ip *ip; /* The IP header */ const struct tcphdr *tcp; /* The TCP header */ const struct sniff_udp *udp; /* The UDP header */ const char *payload; /* Packet payload */ int size_ip; int size_tcp; int size_udp; int size_payload; printf("\nPacket number %d:\n", count); count++; /* define ethernet header */ ethernet = (struct ether_header*)(packet); /* define/compute ip header offset */ ip = (struct ip*)(packet + sizeof(struct ether_header)); size_ip = sizeof(struct ip); if (size_ip < 20) { //printf(" * Invalid IP header length: %u bytes\n", size_ip); return; } /* print source and destination IP addresses */ printf(" From: %s\n", inet_ntoa(ip->ip_src)); printf(" To: %s\n", inet_ntoa(ip->ip_dst)); /* determine protocol */ switch(ip->ip_p) { case IPPROTO_TCP: printf(" Protocol: TCP\n"); break; case IPPROTO_UDP: printf(" Protocol: UDP\n"); break; case IPPROTO_ICMP: printf(" Protocol: ICMP\n"); return; case IPPROTO_IP: printf(" Protocol: IP\n"); return; default: printf(" Protocol: unknown\n"); return; } /* * OK, this packet is TCP. */ /* define/compute tcp header offset */ if(ip->ip_p == IPPROTO_TCP) { tcp = (struct tcphdr *)(packet + sizeof(struct ether_header) + sizeof(struct ip)); size_tcp = sizeof(struct tcphdr); printf(" Src port: %d\n", ntohs(tcp->th_sport)); printf(" Dst port: %d\n", ntohs(tcp->th_dport)); int sport = ntohs(tcp->th_sport); int dport = ntohs(tcp->th_dport); /* define/compute tcp payload (segment) offset */ payload = (u_char *)(packet + sizeof(struct ether_header) + sizeof(struct ip) + sizeof(struct tcphdr)); /* compute tcp payload (segment) size */ size_payload = header->len - (sizeof(struct ether_header) + sizeof(struct ip) + sizeof(struct tcphdr)); /* * Print payload data; it might be binary, so don't just * treat it as a string. */ if (size_payload > 0) { printf(" Payload (%d bytes):\n", size_payload); print_payload(payload, size_payload); //if ((sport == 80) || (dport == 80)) //{ // printf(" HTTP prase:\n"); // prase_http(payload, size_payload); //} if(sport == 443 || dport == 443) { // printf(" SSL/TLS prase:\n"); //prase_ssl_tls(payload, size_payload); //printf("%u",payload); // print_payload(payload, size_payload); parser(payload,size_payload); } } } /* UDP */ else if(ip->ip_p == IPPROTO_UDP) { udp = (struct sniff_udp*)(packet + SIZE_ETHERNET + size_ip); size_udp = 8; printf(" Src port: %d\n", ntohs(udp->uh_sport)); printf(" Dst port: %d\n", ntohs(udp->uh_dport)); int sport = ntohs(udp->uh_sport); int dport = ntohs(udp->uh_dport); payload = (u_char *)(packet + SIZE_ETHERNET + size_ip + size_udp); size_payload = ntohs(ip->ip_len) - (size_ip + size_udp); if (size_payload > 0) { //printf(" Payload (%d bytes:)\n", size_payload); if(sport == 53 || dport == 53) { // printf(" DNS prase:\n"); // prase_dns(payload, size_payload); } } } return; } This is the got_packet function passed as argument to pcap_loop which is part of <pcap.h> .All reference structures are used from <arpa/inet.h>,<net/ethernet.h>,<netinet/ip.h>,<netinet/tcp.h> I am looking to extract this part of the packet(image link attached): Screenshot from wireshark as to what I wish to parse Could someone help me with this?
wolfSSL_read() returns 0
I am using Microsoft Visual Studio 2010 and wolfSSL 3.7.0. I create server context with these functions: WOLFSSL_CTX *sslContext = wolfSSL_CTX_new(wolfTLSv1_2_server_method()); if(!sslContext) { closesocket(socketListen); return FALSE; } wolfSSL_CTX_use_certificate_buffer(sslContext, (unsigned char*)szServerCert, strlen(szServerCert), SSL_FILETYPE_PEM); wolfSSL_CTX_use_PrivateKey_buffer(sslContext, (unsigned char*)szServerKey, strlen(szServerKey), SSL_FILETYPE_PEM); It is OK. Then, I accept the connection, create WOLFSSL* context and associate it with my socket descriptor: WOLFSSL *ssl = wolfSSL_new(sslContext); wolfSSL_set_fd(ssl, Socket); CHAR Buffer[1024]; int retVal = wolfSSL_read(ssl, Buffer, 1024); But when I try to connect to 127.0.0.1:443 via browser, wolfSSL_read() returns 0. wolfSSL_get_error() returns -397 (SOCKET_PEER_CLOSED_E). Browser shows me that page is still loading. What is the reason?
wolfSSL provides a good reference example here: https://github.com/wolfSSL/wolfssl-examples/blob/master/tls/server-tls.c Please find referenced code below: /* server-tls.c * * Copyright (C) 2006-2015 wolfSSL Inc. * * This file is part of wolfSSL. (formerly known as CyaSSL) * * wolfSSL is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * wolfSSL is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA *============================================================================= * * This is a super basic example of what a TCP Server secured with TLS 1.2 * might look like. This server can also resume the session if a client * inadvertantly disconnects. */ #include <stdio.h> #include <unistd.h> #include <sys/types.h> #include <sys/socket.h> #include <string.h> #include <netinet/in.h> #include <stdlib.h> #include <errno.h> /* include the wolfSSL library for our TLS 1.2 security */ #include <wolfssl/ssl.h> #define DEFAULT_PORT 11111 int AcceptAndRead(WOLFSSL_CTX* ctx, socklen_t sockfd, struct sockaddr_in clientAddr); int AcceptAndRead(WOLFSSL_CTX* ctx, socklen_t sockfd, struct sockaddr_in clientAddr) { /* Create our reply message */ const char reply[] = "I hear ya fa shizzle!\n"; socklen_t size = sizeof(clientAddr); /* Wait until a client connects */ socklen_t connd = accept(sockfd, (struct sockaddr *)&clientAddr, &size); /* If fails to connect,int loop back up and wait for a new connection */ if (connd == -1) { printf("failed to accept the connection..\n"); } /* If it connects, read in and reply to the client */ else { printf("Client connected successfully\n"); WOLFSSL* ssl; if ( (ssl = wolfSSL_new(ctx)) == NULL) { fprintf(stderr, "wolfSSL_new error.\n"); exit(EXIT_FAILURE); } /* direct our ssl to our clients connection */ wolfSSL_set_fd(ssl, connd); printf("Using Non-Blocking I/O: %d\n", wolfSSL_get_using_nonblock( ssl)); for ( ; ; ) { char buff[256]; int ret = 0; /* Clear the buffer memory for anything possibly left over */ memset(&buff, 0, sizeof(buff)); /* Read the client data into our buff array */ if ((ret = wolfSSL_read(ssl, buff, sizeof(buff)-1)) > 0) { /* Print any data the client sends to the console */ printf("Client: %s\n", buff); /* Reply back to the client */ if ((ret = wolfSSL_write(ssl, reply, sizeof(reply)-1)) < 0) { printf("wolfSSL_write error = %d\n", wolfSSL_get_error(ssl, ret)); } } /* if the client disconnects break the loop */ else { if (ret < 0) printf("wolfSSL_read error = %d\n", wolfSSL_get_error(ssl ,ret)); else if (ret == 0) printf("The client has closed the connection.\n"); break; } } wolfSSL_free(ssl); /* Free the WOLFSSL object */ } close(connd); /* close the connected socket */ return 0; } int main() { /* Create a ctx pointer for our ssl */ WOLFSSL_CTX* ctx; /* * Creates a socket that uses an internet IP address, * Sets the type to be Stream based (TCP), * 0 means choose the default protocol. */ socklen_t sockfd = socket(AF_INET, SOCK_STREAM, 0); int loopExit = 0; /* 0 = False, 1 = True */ int ret = 0; /* Return value */ /* Server and client socket address structures */ struct sockaddr_in serverAddr = {0}, clientAddr = {0}; /* Initialize wolfSSL */ wolfSSL_Init(); /* If positive value, the socket is valid */ if (sockfd == -1) { printf("ERROR: failed to create the socket\n"); return EXIT_FAILURE; /* Kill the server with exit status 1 */ } /* create and initialize WOLFSSL_CTX structure */ if ((ctx = wolfSSL_CTX_new(wolfTLSv1_2_server_method())) == NULL) { fprintf(stderr, "wolfSSL_CTX_new error.\n"); return EXIT_FAILURE; } /* Load server certificate into WOLFSSL_CTX */ if (wolfSSL_CTX_use_certificate_file(ctx, "../certs/server-cert.pem", SSL_FILETYPE_PEM) != SSL_SUCCESS) { fprintf(stderr, "Error loading certs/server-cert.pem, please check" "the file.\n"); return EXIT_FAILURE; } /* Load server key into WOLFSSL_CTX */ if (wolfSSL_CTX_use_PrivateKey_file(ctx, "../certs/server-key.pem", SSL_FILETYPE_PEM) != SSL_SUCCESS) { fprintf(stderr, "Error loading certs/server-key.pem, please check" "the file.\n"); return EXIT_FAILURE; } /* load DH params */ ret = wolfSSL_CTX_SetTmpDH_file(ctx, "../certs/dh2048.pem" , SSL_FILETYPE_PEM); if (ret != SSL_SUCCESS) { fprintf(stderr, "Error setting DH parameters.\n"); return EXIT_FAILURE; } /* Initialize the server address struct to zero */ memset((char *)&serverAddr, 0, sizeof(serverAddr)); /* Fill the server's address family */ serverAddr.sin_family = AF_INET; serverAddr.sin_addr.s_addr = INADDR_ANY; serverAddr.sin_port = htons(DEFAULT_PORT); /* Attach the server socket to our port */ if (bind(sockfd, (struct sockaddr *)&serverAddr, sizeof(serverAddr)) < 0) { printf("ERROR: failed to bind\n"); return EXIT_FAILURE; } printf("Waiting for a connection...\n"); /* Continuously accept connects while not currently in an active connection or told to quit */ while (loopExit == 0) { /* listen for a new connection, allow 5 pending connections */ ret = listen(sockfd, 5); if (ret == 0) { /* Accept client connections and read from them */ loopExit = AcceptAndRead(ctx, sockfd, clientAddr); } } wolfSSL_CTX_free(ctx); /* Free WOLFSSL_CTX */ wolfSSL_Cleanup(); /* Free wolfSSL */ return EXIT_SUCCESS; }
can t connect my ssh client to the remote machine
I've downloaded and compiled libssh 0.6.1 from libSSH and linked the ssh.lib,ssh.dll to a visual c++ project . The code below compiles and run fine , but when calling ssh_connect() , it return -1 : Failed to connect : No error. Also, I used putty to connect to my remote machine and it works fine. here is my code: // sshClient.cpp : Defines the entry point for the console application. // #include "stdafx.h" #include <stdlib.h> #include <libssh/libssh.h> int _tmain(int argc, _TCHAR* argv[]) { ssh_session my_ssh_session; int verbosity = SSH_LOG_PROTOCOL; int port = 22; char* host="127.0.0.1"; ssh_channel channel; int rc; //I create a session my_ssh_session = ssh_new(); if (my_ssh_session == NULL) exit(-1); ssh_options_set(my_ssh_session, SSH_OPTIONS_HOST, host); ssh_options_set(my_ssh_session, SSH_OPTIONS_LOG_VERBOSITY, &verbosity); ssh_options_set(my_ssh_session, SSH_OPTIONS_PORT, &port); ssh_options_set(my_ssh_session, SSH_OPTIONS_USER,"true"); rc = ssh_connect(my_ssh_session); if (rc != SSH_OK) { fprintf(stderr, "Error connecting to 192.168.78.131 : %s\n", ssh_get_error(my_ssh_session)); exit(-1); } ssh_disconnect(my_ssh_session); ssh_free(my_ssh_session); //Here I create a channel channel = ssh_channel_new(my_ssh_session); if (channel == NULL) return SSH_ERROR; if (SSH_OK != ssh_channel_open_session(channel)) { printf("ssh_channel_open_session"); ssh_channel_free(channel); return rc; } //My remote command ls -l under true Folder rc = ssh_channel_request_exec(channel, "ls -l"); if (rc != SSH_OK){ ssh_channel_close(channel); ssh_channel_free(channel); return rc; } char buffer[256]; unsigned int nbytes; nbytes = ssh_channel_read(channel, buffer, sizeof(buffer), 0); while (nbytes > 0){ if (fwrite(buffer, 1, nbytes, stdout) != nbytes) { ssh_channel_close(channel); ssh_channel_free(channel); return SSH_ERROR; } nbytes = ssh_channel_read(channel, buffer, sizeof(buffer), 0); } if (nbytes < 0){ ssh_channel_close(channel); ssh_channel_free(channel); return SSH_ERROR; } ssh_channel_send_eof(channel); ssh_channel_close(channel); ssh_channel_free(channel); ssh_free(my_ssh_session); system("pause"); return 0; }
Check your host IP address. I guess you forgot to change the IP address in the example source file.
udp winsock programming
I'm the beginner in socket programming. I want to receive udp packets continuously from the port. For that I created socket and using bind and recv calls I have done with my program. In a buffer I'm storing the udp packets. How to receive packet by packet. How to put condition for particular time interval? Thanks in advance. static int recvData = 1; sockID = socket(AF_INET, SOCK_DGRAM, 0); if(sockID < 0) { printf("Socket creation error\n"); WSACleanup(); } else { printf("Socket Created\n"); } fepAddr.sin_family = AF_INET; fepAddr.sin_port = htons(inputData.portNo); fepAddr.sin_addr.s_addr = inet_addr(inputData.destIPAddr); if (bind(sockID, (struct sockaddr *)&fepAddr, sizeof(fepAddr)) == SOCKET_ERROR) { printf("bind() failed: %ld.\n", WSAGetLastError()); closesocket(sockID); return 0; } else { printf("bind() is OK!\n"); } memset(udpBuf,sizeof(udpBuf),0); while (recvData) { printf("receiving data\n"); recvResult = recvfrom( sockID, udpBuf, sizeof(udpBuf), 0,(struct sockaddr *)&fepAddr, &sock_len); fprintf(udp, "%s", udpBuf); //fwrite(udpBuf, sizeof(udpBuf), 1, udp); recvData-- ; } exit: if(udp) { fclose(udp); udp = 0; } //shutdown socket closesocket(sockID); fclose(udp);
recvfrom() receives UDP data packet-by-packet. If a given packet is too large, recvfrom() will return an error. As for timing, you can use select() to know when the socket is readable. Try something like this: sockID = socket(AF_INET, SOCK_DGRAM, 0); if (sockID == INVALID_SOCKET) { printf("Socket creation error\n"); goto exit; } printf("Socket Created\n"); memset(&fepAddr, 0, sizeof(fepAddr)); fepAddr.sin_family = AF_INET; fepAddr.sin_port = htons(inputData.portNo); fepAddr.sin_addr.s_addr = inet_addr(inputData.destIPAddr); if (bind(sockID, (struct sockaddr *)&fepAddr, sizeof(fepAddr)) == SOCKET_ERROR) { printf("bind() failed: %ld.\n", WSAGetLastError()); goto exit; } printf("bind() is OK!\n"); memset(udpBuf, 0, sizeof(udpBuf)); printf("receiving data\n"); while (...) { printf("."); recvResult = recvfrom(sockID, udpBuf, sizeof(udpBuf), 0, (struct sockaddr *)&fepAddr, &addr_len); if (recvResult == SOCKET_ERROR) { if (WSAGetLastError() != WSAEWOULDBLOCK) { printf("\nrecvfrom() failed: %ld.\n", WSAGetLastError()); goto exit; } fd_set fd; FD_ZERO(&fd); FD_SET(sockID, &fd); timeval t; t.tv_sec = ...; // seconds t.tv_usec = ...; // microseconds selectResult = select(0, &fd, NULL, NULL, &t); if (selectResult == SOCKET_ERROR) { printf("\nselect() failed: %ld.\n", WSAGetLastError()); goto exit; } if (selectResult == 0) { printf("\nsocket timed out.\n"); goto exit; } continue; } if (recvResult > 0) fwrite(udpBuf, recvResult, 1, udp); } exit: if (udp != 0) { fclose(udp); udp = 0; } if (sockID != INVALID_SOCKET) { closesocket(sockID); sockID = INVALID_SOCKET; }