【问题标题】:Proper use of the HsOpenSSL API to implement a TLS Server正确使用 HsOpenSSL API 来实现 TLS 服务器
【发布时间】:2012-01-04 17:21:35
【问题描述】:

我正在尝试弄清楚如何在并发上下文中正确使用 OpenSSL.Session API

例如假设我想实现一个stunnel-style ssl-wrapper,我希望有以下基本骨架结构,它实现了一个幼稚的full-duplex tcp-port-forwarder:

runProxy :: PortID -> AddrInfo -> IO ()
runProxy localPort@(PortNumber lpn) serverAddrInfo = do
  listener <- listenOn localPort

  forever $ do
    (sClient, clientAddr) <- accept listener

    let finalize sServer = do
            sClose sServer
            sClose sClient

    forkIO $ do
        tidToServer <- myThreadId
        bracket (connectToServer serverAddrInfo) finalize $ \sServer -> do
            -- execute one 'copySocket' thread for each data direction
            -- and make sure that if one direction dies, the other gets
            -- pulled down as well
            bracket (forkIO (copySocket sServer sClient
                             `finally` killThread tidToServer))
                    (killThread) $ \_ -> do
                copySocket sClient sServer -- "controlling" thread

 where
  -- |Copy data from source to dest until EOF occurs on source
  -- Copying may also be aborted due to exceptions
  copySocket :: Socket -> Socket -> IO ()
  copySocket src dst = go
   where
    go = do
        buf <- B.recv src 4096
        unless (B.null buf) $ do
            B.sendAll dst buf
            go

  -- |Create connection to given AddrInfo target and return socket
  connectToServer saddr = do
    sServer <- socket (addrFamily saddr) Stream defaultProtocol
    connect sServer (addrAddress saddr)
    return sServer

如何将上述骨架转换为full-duplex ssl-wrapping tcp-forwarding proxy? HsOpenSSL API 提供的函数调用的并发/并行执行(在上述用例的上下文中)的危险在哪里?

PS:我仍在努力完全理解如何使代码变得健壮 w.r.t。异常和资源泄漏。所以,虽然不是这个问题的主要焦点,如果你发现上面的代码有什么不好的地方,请发表评论。

【问题讨论】:

  • 我认为这对 SO 来说可能是一个过于宽泛的问题。
  • 我会尽快回复你 :-)
  • 文档的链接已损坏,这是正在工作的人:hackage.haskell.org/packages/archive/HsOpenSSL/0.10.2/doc/html/…
  • 我做了类似的东西(full-duplex ssl-rewrapping tcp-forwarding),但它使用了Network.TLS(包tls)。它很丑陋。如果有兴趣,你可以找到它here

标签: haskell openssl ssl


【解决方案1】:

为此,您需要将copySocket 替换为两个不同的函数,一个用于处理从普通套接字到 SSL 的数据,另一个从 SSL 到普通套接字:

  copyIn :: SSL.SSL -> Socket -> IO ()
  copyIn src dst = go
   where
    go = do
        buf <- SSL.read src 4096
        unless (B.null buf) $ do
            SB.sendAll dst buf
            go

  copyOut :: Socket -> SSL.SSL -> IO ()
  copyOut src dst = go
   where
    go = do
        buf <- SB.recv src 4096
        unless (B.null buf) $ do
            SSL.write dst buf
            go

那你需要修改connectToServer,让它建立SSL连接

  -- |Create connection to given AddrInfo target and return socket
  connectToServer saddr = do
    sServer <- socket (addrFamily saddr) Stream defaultProtocol
    putStrLn "connecting"
    connect sServer (addrAddress saddr)
    putStrLn "establishing ssl context"
    ctx <- SSL.context
    putStrLn "setting ciphers"
    SSL.contextSetCiphers ctx "DEFAULT"
    putStrLn "setting verfication mode"
    SSL.contextSetVerificationMode ctx SSL.VerifyNone
    putStrLn "making ssl connection"
    sslServer <- SSL.connection ctx sServer
    putStrLn "doing handshake"
    SSL.connect sslServer
    putStrLn "connected"
    return sslServer

并更改 finalize 以关闭 SSL 会话

let finalize sServer = do
        putStrLn "shutting down ssl"
        SSL.shutdown sServer SSL.Unidirectional
        putStrLn "closing server socket"
        maybe (return ()) sClose (SSL.sslSocket sServer)
        putStrLn "closing client socket"
        sClose sClient

最后,别忘了在withOpenSSL 中运行你的主要内容,就像在

main = withOpenSSL $ do
    let hints = defaultHints { addrSocketType = Stream, addrFamily = AF_INET }
    addrs <- getAddrInfo (Just hints) (Just "localhost") (Just "22222")
    let addr = head addrs
    print addr
    runProxy (PortNumber 11111) addr

【讨论】:

  • 这已经很有帮助了;这提供了一个对应于stunnels 客户端模式的本地非 ssl 到远程 ssl 代理,您能否还提供一个示例如何监听本地 ssl 套接字(例如,提供一个本地 ssl 到远程-非ssl代理)?
猜你喜欢
  • 1970-01-01
  • 2019-05-04
  • 2017-03-21
  • 2022-09-26
  • 2017-09-05
  • 2016-04-16
  • 1970-01-01
  • 1970-01-01
  • 2019-09-25
相关资源
最近更新 更多