mirror of
https://github.com/xmrig/xmrig.git
synced 2025-01-18 16:55:55 +00:00
Sync TLS changes.
This commit is contained in:
parent
8a167cb2a7
commit
de97f3492e
12 changed files with 305 additions and 254 deletions
|
@ -1,6 +1,6 @@
|
|||
/* XMRig
|
||||
* Copyright (c) 2018-2021 SChernykh <https://github.com/SChernykh>
|
||||
* Copyright (c) 2016-2021 XMRig <https://github.com/xmrig>, <support@xmrig.com>
|
||||
* Copyright (c) 2018-2022 SChernykh <https://github.com/SChernykh>
|
||||
* Copyright (c) 2016-2022 XMRig <https://github.com/xmrig>, <support@xmrig.com>
|
||||
*
|
||||
* This program is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
|
@ -16,11 +16,27 @@
|
|||
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
*/
|
||||
|
||||
|
||||
#include "base/io/log/Tags.h"
|
||||
#include "base/io/log/Log.h"
|
||||
|
||||
|
||||
#ifndef XMRIG_FEATURE_EVENTS
|
||||
namespace xmrig {
|
||||
|
||||
|
||||
const char *tls_tag()
|
||||
{
|
||||
static const char *tag = GREEN_BG_BOLD(WHITE_BOLD_S " tls ");
|
||||
|
||||
return tag;
|
||||
}
|
||||
|
||||
|
||||
} // namespace xmrig
|
||||
#endif
|
||||
|
||||
|
||||
#ifdef XMRIG_LEGACY
|
||||
const char *xmrig::Tags::config()
|
||||
{
|
||||
static const char *tag = CYAN_BG_BOLD(WHITE_BOLD_S " config ");
|
||||
|
@ -29,6 +45,15 @@ const char *xmrig::Tags::config()
|
|||
}
|
||||
|
||||
|
||||
const char *xmrig::Tags::signal()
|
||||
{
|
||||
static const char *tag = YELLOW_BG_BOLD(WHITE_BOLD_S " signal ");
|
||||
|
||||
return tag;
|
||||
}
|
||||
#endif
|
||||
|
||||
|
||||
const char *xmrig::Tags::network()
|
||||
{
|
||||
static const char *tag = BLUE_BG_BOLD(WHITE_BOLD_S " net ");
|
||||
|
@ -45,14 +70,6 @@ const char* xmrig::Tags::origin()
|
|||
}
|
||||
|
||||
|
||||
const char *xmrig::Tags::signal()
|
||||
{
|
||||
static const char *tag = YELLOW_BG_BOLD(WHITE_BOLD_S " signal ");
|
||||
|
||||
return tag;
|
||||
}
|
||||
|
||||
|
||||
#ifdef XMRIG_MINER_PROJECT
|
||||
const char *xmrig::Tags::cpu()
|
||||
{
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
/* XMRig
|
||||
* Copyright (c) 2018-2021 SChernykh <https://github.com/SChernykh>
|
||||
* Copyright (c) 2016-2021 XMRig <https://github.com/xmrig>, <support@xmrig.com>
|
||||
* Copyright (c) 2018-2022 SChernykh <https://github.com/SChernykh>
|
||||
* Copyright (c) 2016-2022 XMRig <https://github.com/xmrig>, <support@xmrig.com>
|
||||
*
|
||||
* This program is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
|
@ -30,10 +30,13 @@ namespace xmrig {
|
|||
class Tags
|
||||
{
|
||||
public:
|
||||
# ifdef XMRIG_LEGACY
|
||||
static const char *config();
|
||||
static const char *signal();
|
||||
# endif
|
||||
|
||||
static const char *network();
|
||||
static const char *origin();
|
||||
static const char *signal();
|
||||
|
||||
# ifdef XMRIG_MINER_PROJECT
|
||||
static const char *cpu();
|
||||
|
|
|
@ -30,7 +30,7 @@
|
|||
#include "version.h"
|
||||
|
||||
|
||||
#ifndef XMRIG_LEGACY
|
||||
#ifdef XMRIG_FEATURE_EVENTS
|
||||
# include "base/kernel/Events.h"
|
||||
# include "base/kernel/events/ExitEvent.h"
|
||||
#endif
|
||||
|
@ -256,7 +256,7 @@ void xmrig::Process::exit(int code)
|
|||
d_fn()->exitCode = code;
|
||||
}
|
||||
|
||||
# ifndef XMRIG_LEGACY
|
||||
# ifdef XMRIG_FEATURE_EVENTS
|
||||
events().post<ExitEvent>(exitCode());
|
||||
# endif
|
||||
}
|
||||
|
@ -268,7 +268,7 @@ void xmrig::Process::setUserAgent(const String &userAgent)
|
|||
}
|
||||
|
||||
|
||||
#ifndef XMRIG_LEGACY
|
||||
#ifdef XMRIG_FEATURE_EVENTS
|
||||
xmrig::Events &xmrig::Process::events()
|
||||
{
|
||||
return d_fn()->events;
|
||||
|
|
|
@ -68,7 +68,7 @@ public:
|
|||
static void exit(int code = -1);
|
||||
static void setUserAgent(const String &userAgent);
|
||||
|
||||
# ifndef XMRIG_LEGACY
|
||||
# ifdef XMRIG_FEATURE_EVENTS
|
||||
static Events &events();
|
||||
# endif
|
||||
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
/* XMRig
|
||||
* Copyright (c) 2018-2021 SChernykh <https://github.com/SChernykh>
|
||||
* Copyright (c) 2016-2021 XMRig <https://github.com/xmrig>, <support@xmrig.com>
|
||||
* Copyright (c) 2018-2022 SChernykh <https://github.com/SChernykh>
|
||||
* Copyright (c) 2016-2022 XMRig <https://github.com/xmrig>, <support@xmrig.com>
|
||||
*
|
||||
* This program is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
|
@ -27,7 +27,7 @@
|
|||
|
||||
xmrig::HttpsContext::HttpsContext(TlsContext *tls, const std::weak_ptr<IHttpListener> &listener) :
|
||||
HttpContext(HTTP_REQUEST, listener),
|
||||
ServerTls(tls ? tls->ctx() : nullptr)
|
||||
ServerTls(tls ? tls->handle() : nullptr)
|
||||
{
|
||||
if (!tls) {
|
||||
m_mode = TLS_OFF;
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
/* XMRig
|
||||
* Copyright (c) 2018-2021 SChernykh <https://github.com/SChernykh>
|
||||
* Copyright (c) 2016-2021 XMRig <https://github.com/xmrig>, <support@xmrig.com>
|
||||
* Copyright (c) 2018-2022 SChernykh <https://github.com/SChernykh>
|
||||
* Copyright (c) 2016-2022 XMRig <https://github.com/xmrig>, <support@xmrig.com>
|
||||
*
|
||||
* This program is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
|
@ -34,8 +34,6 @@ xmrig::HttpsServer::HttpsServer(const std::shared_ptr<IHttpListener> &listener)
|
|||
xmrig::HttpsServer::~HttpsServer()
|
||||
{
|
||||
HttpContext::closeAll();
|
||||
|
||||
delete m_tls;
|
||||
}
|
||||
|
||||
|
||||
|
@ -49,7 +47,7 @@ bool xmrig::HttpsServer::setTls(const TlsConfig &config)
|
|||
|
||||
void xmrig::HttpsServer::onConnection(uv_stream_t *stream, uint16_t)
|
||||
{
|
||||
auto ctx = new HttpsContext(m_tls, m_listener);
|
||||
auto ctx = new HttpsContext(m_tls.get(), m_listener);
|
||||
uv_accept(stream, ctx->stream());
|
||||
|
||||
uv_read_start(ctx->stream(), NetBuffer::onAlloc, onRead); // NOLINT(clang-analyzer-cplusplus.NewDeleteLeaks)
|
||||
|
|
|
@ -58,8 +58,8 @@ protected:
|
|||
private:
|
||||
static void onRead(uv_stream_t *stream, ssize_t nread, const uv_buf_t *buf);
|
||||
|
||||
std::shared_ptr<TlsContext> m_tls;
|
||||
std::weak_ptr<IHttpListener> m_listener;
|
||||
TlsContext *m_tls = nullptr;
|
||||
};
|
||||
|
||||
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
/* XMRig
|
||||
* Copyright (c) 2018 Lee Clagett <https://github.com/vtnerd>
|
||||
* Copyright (c) 2018-2021 SChernykh <https://github.com/SChernykh>
|
||||
* Copyright (c) 2016-2021 XMRig <https://github.com/xmrig>, <support@xmrig.com>
|
||||
* Copyright (c) 2018-2022 SChernykh <https://github.com/SChernykh>
|
||||
* Copyright (c) 2016-2022 XMRig <https://github.com/xmrig>, <support@xmrig.com>
|
||||
*
|
||||
* This program is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
|
@ -24,15 +24,25 @@
|
|||
#include "base/net/tls/TlsGen.h"
|
||||
|
||||
|
||||
#ifdef APP_DEBUG
|
||||
# include "base/io/log/Log.h"
|
||||
# include "base/kernel/Config.h"
|
||||
#endif
|
||||
|
||||
|
||||
namespace xmrig {
|
||||
|
||||
|
||||
extern const char *tls_tag();
|
||||
|
||||
|
||||
const char *TlsConfig::kCert = "cert";
|
||||
const char *TlsConfig::kEnabled = "enabled";
|
||||
const char *TlsConfig::kCertKey = "cert_key";
|
||||
const char *TlsConfig::kCertKey = "cert-key";
|
||||
const char *TlsConfig::kCiphers = "ciphers";
|
||||
const char *TlsConfig::kCipherSuites = "ciphersuites";
|
||||
const char *TlsConfig::kDhparam = "dhparam";
|
||||
const char *TlsConfig::kField = "tls";
|
||||
const char *TlsConfig::kGen = "gen";
|
||||
const char *TlsConfig::kProtocols = "protocols";
|
||||
|
||||
|
@ -45,54 +55,18 @@ static const char *kTLSv1_3 = "TLSv1.3";
|
|||
} // namespace xmrig
|
||||
|
||||
|
||||
/**
|
||||
* "cert" load TLS certificate chain from file.
|
||||
* "cert_key" load TLS private key from file.
|
||||
* "ciphers" set list of available ciphers (TLSv1.2 and below).
|
||||
* "ciphersuites" set list of available TLSv1.3 ciphersuites.
|
||||
* "dhparam" load DH parameters for DHE ciphers from file.
|
||||
*/
|
||||
xmrig::TlsConfig::TlsConfig(const rapidjson::Value &value)
|
||||
xmrig::TlsConfig::TlsConfig(const Arguments &arguments)
|
||||
{
|
||||
if (value.IsObject()) {
|
||||
m_enabled = Json::getBool(value, kEnabled, m_enabled);
|
||||
|
||||
setProtocols(Json::getString(value, kProtocols));
|
||||
setCert(Json::getString(value, kCert));
|
||||
setKey(Json::getString(value, kCertKey));
|
||||
setCiphers(Json::getString(value, kCiphers));
|
||||
setCipherSuites(Json::getString(value, kCipherSuites));
|
||||
setDH(Json::getString(value, kDhparam));
|
||||
|
||||
if (m_key.isNull()) {
|
||||
setKey(Json::getString(value, "cert-key"));
|
||||
}
|
||||
|
||||
if (m_enabled && !isValid()) {
|
||||
generate(Json::getString(value, kGen));
|
||||
}
|
||||
}
|
||||
else if (value.IsBool()) {
|
||||
m_enabled = value.GetBool();
|
||||
|
||||
if (m_enabled) {
|
||||
generate();
|
||||
}
|
||||
}
|
||||
# ifdef XMRIG_FORCE_TLS
|
||||
else if (value.IsNull()) {
|
||||
generate();
|
||||
}
|
||||
# endif
|
||||
else if (value.IsString()) {
|
||||
generate(value.GetString());
|
||||
}
|
||||
else {
|
||||
m_enabled = false;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
//xmrig::TlsConfig::TlsConfig(const rapidjson::Value &value, const TlsConfig ¤t)
|
||||
//{
|
||||
|
||||
//}
|
||||
|
||||
|
||||
bool xmrig::TlsConfig::generate(const char *commonName)
|
||||
{
|
||||
TlsGen gen;
|
||||
|
@ -101,20 +75,34 @@ bool xmrig::TlsConfig::generate(const char *commonName)
|
|||
gen.generate(commonName);
|
||||
}
|
||||
catch (std::exception &ex) {
|
||||
LOG_ERR("%s", ex.what());
|
||||
m_enabled = false;
|
||||
|
||||
LOG_ERR("%s " RED_BOLD("%s"), tls_tag(), ex.what());
|
||||
|
||||
return false;
|
||||
}
|
||||
|
||||
setCert(gen.cert());
|
||||
setKey(gen.certKey());
|
||||
|
||||
m_enabled = true;
|
||||
m_cert = gen.cert();
|
||||
m_key = gen.certKey();
|
||||
m_enabled = true;
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
|
||||
bool xmrig::TlsConfig::isEqual(const TlsConfig &other) const
|
||||
{
|
||||
return (m_enabled == other.m_enabled
|
||||
&& m_protocols == other.m_protocols
|
||||
&& m_cert == other.m_cert
|
||||
&& m_ciphers == other.m_ciphers
|
||||
&& m_ciphersuites == other.m_ciphersuites
|
||||
&& m_dhparam == other.m_dhparam
|
||||
&& m_key == other.m_key
|
||||
);
|
||||
}
|
||||
|
||||
|
||||
rapidjson::Value xmrig::TlsConfig::toJSON(rapidjson::Document &doc) const
|
||||
{
|
||||
using namespace rapidjson;
|
||||
|
@ -151,13 +139,66 @@ rapidjson::Value xmrig::TlsConfig::toJSON(rapidjson::Document &doc) const
|
|||
obj.AddMember(StringRef(kCert), m_cert.toJSON(), allocator);
|
||||
obj.AddMember(StringRef(kCertKey), m_key.toJSON(), allocator);
|
||||
obj.AddMember(StringRef(kCiphers), m_ciphers.toJSON(), allocator);
|
||||
obj.AddMember(StringRef(kCipherSuites), m_cipherSuites.toJSON(), allocator);
|
||||
obj.AddMember(StringRef(kCipherSuites), m_ciphersuites.toJSON(), allocator);
|
||||
obj.AddMember(StringRef(kDhparam), m_dhparam.toJSON(), allocator);
|
||||
|
||||
return obj;
|
||||
}
|
||||
|
||||
|
||||
void xmrig::TlsConfig::print() const
|
||||
{
|
||||
# ifdef APP_DEBUG
|
||||
LOG_DEBUG("%s " MAGENTA_BOLD("TLS")
|
||||
MAGENTA("<enabled=") CYAN("%d")
|
||||
MAGENTA(", protocols=") CYAN("%u")
|
||||
MAGENTA(", cert=") "\"%s\""
|
||||
MAGENTA(", ciphers=") "\"%s\""
|
||||
MAGENTA(", ciphersuites=") "\"%s\""
|
||||
MAGENTA(", dhparam=") "\"%s\""
|
||||
MAGENTA(", key=") "\"%s\""
|
||||
MAGENTA(">"),
|
||||
Config::tag(), m_enabled, m_protocols, m_cert.data(), m_ciphers.data(), m_ciphersuites.data(), m_dhparam.data(), m_key.data());
|
||||
# endif
|
||||
}
|
||||
|
||||
|
||||
void xmrig::TlsConfig::init(const rapidjson::Value &value, const TlsConfig ¤t)
|
||||
{
|
||||
if (value.IsObject()) {
|
||||
setProtocols(Json::getString(value, kProtocols));
|
||||
|
||||
m_enabled = Json::getBool(value, kEnabled, current.m_enabled);
|
||||
m_cert = Json::getString(value, kCert, current.m_cert);
|
||||
m_key = Json::getString(value, kCertKey, current.m_key);
|
||||
m_ciphers = Json::getString(value, kCiphers, current.m_ciphers);
|
||||
m_ciphersuites = Json::getString(value, kCipherSuites, current.m_ciphersuites);
|
||||
m_dhparam = Json::getString(value, kDhparam, current.m_dhparam);
|
||||
|
||||
if (m_key.isNull()) {
|
||||
m_key = Json::getString(value, "cert_key", current.m_key);
|
||||
}
|
||||
|
||||
if (m_enabled && !isValid()) {
|
||||
generate(Json::getString(value, kGen));
|
||||
}
|
||||
}
|
||||
else if (value.IsBool()) {
|
||||
m_enabled = value.GetBool();
|
||||
|
||||
if (m_enabled) {
|
||||
generate();
|
||||
}
|
||||
}
|
||||
else if (value.IsString()) {
|
||||
generate(value.GetString());
|
||||
}
|
||||
else {
|
||||
m_enabled = false;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
void xmrig::TlsConfig::setProtocols(const char *protocols)
|
||||
{
|
||||
const std::vector<String> vec = String(protocols).split(' ');
|
||||
|
@ -183,11 +224,9 @@ void xmrig::TlsConfig::setProtocols(const rapidjson::Value &protocols)
|
|||
{
|
||||
m_protocols = 0;
|
||||
|
||||
if (protocols.IsUint()) {
|
||||
return setProtocols(protocols.GetUint());
|
||||
}
|
||||
|
||||
if (protocols.IsString()) {
|
||||
return setProtocols(protocols.GetString());
|
||||
setProtocols(protocols.GetString());
|
||||
} else if (protocols.IsUint()) {
|
||||
m_protocols = protocols.GetUint();
|
||||
}
|
||||
}
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
/* XMRig
|
||||
* Copyright (c) 2018 Lee Clagett <https://github.com/vtnerd>
|
||||
* Copyright (c) 2018-2021 SChernykh <https://github.com/SChernykh>
|
||||
* Copyright (c) 2016-2021 XMRig <https://github.com/xmrig>, <support@xmrig.com>
|
||||
* Copyright (c) 2018-2022 SChernykh <https://github.com/SChernykh>
|
||||
* Copyright (c) 2016-2022 XMRig <https://github.com/xmrig>, <support@xmrig.com>
|
||||
*
|
||||
* This program is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
|
@ -21,13 +21,15 @@
|
|||
#define XMRIG_TLSCONFIG_H
|
||||
|
||||
|
||||
#include "3rdparty/rapidjson/fwd.h"
|
||||
#include "base/tools/String.h"
|
||||
|
||||
|
||||
namespace xmrig {
|
||||
|
||||
|
||||
class Arguments;
|
||||
|
||||
|
||||
class TlsConfig
|
||||
{
|
||||
public:
|
||||
|
@ -37,6 +39,7 @@ public:
|
|||
static const char *kCipherSuites;
|
||||
static const char *kDhparam;
|
||||
static const char *kEnabled;
|
||||
static const char *kField;
|
||||
static const char *kGen;
|
||||
static const char *kProtocols;
|
||||
|
||||
|
@ -48,39 +51,44 @@ public:
|
|||
};
|
||||
|
||||
TlsConfig() = default;
|
||||
TlsConfig(const rapidjson::Value &value);
|
||||
TlsConfig(const Arguments &arguments);
|
||||
|
||||
inline bool isEnabled() const { return m_enabled && isValid(); }
|
||||
inline bool isValid() const { return !m_cert.isEmpty() && !m_key.isEmpty(); }
|
||||
inline const char *cert() const { return m_cert.data(); }
|
||||
inline const char *ciphers() const { return m_ciphers.isEmpty() ? nullptr : m_ciphers.data(); }
|
||||
inline const char *cipherSuites() const { return m_cipherSuites.isEmpty() ? nullptr : m_cipherSuites.data(); }
|
||||
inline const char *dhparam() const { return m_dhparam.isEmpty() ? nullptr : m_dhparam.data(); }
|
||||
inline const char *key() const { return m_key.data(); }
|
||||
inline uint32_t protocols() const { return m_protocols; }
|
||||
inline void setCert(const char *cert) { m_cert = cert; }
|
||||
inline void setCiphers(const char *ciphers) { m_ciphers = ciphers; }
|
||||
inline void setCipherSuites(const char *ciphers) { m_cipherSuites = ciphers; }
|
||||
inline void setDH(const char *dhparam) { m_dhparam = dhparam; }
|
||||
inline void setKey(const char *key) { m_key = key; }
|
||||
inline void setProtocols(uint32_t protocols) { m_protocols = protocols; }
|
||||
inline TlsConfig(const rapidjson::Value &value, const TlsConfig ¤t) { init(value, current); }
|
||||
inline TlsConfig(const rapidjson::Value &value) { init(value, {}); }
|
||||
|
||||
inline bool isEnabled() const { return m_enabled; }
|
||||
inline bool isValid() const { return !m_cert.isEmpty() && !m_key.isEmpty(); }
|
||||
inline const String &cert() const { return m_cert; }
|
||||
inline const String &ciphers() const { return m_ciphers; }
|
||||
inline const String &ciphersuites() const { return m_ciphersuites; }
|
||||
inline const String &dhparam() const { return m_dhparam; }
|
||||
inline const String &key() const { return m_key; }
|
||||
inline uint32_t protocols() const { return m_protocols; }
|
||||
|
||||
inline bool operator!=(const TlsConfig &other) const { return !isEqual(other); }
|
||||
inline bool operator==(const TlsConfig &other) const { return isEqual(other); }
|
||||
|
||||
bool generate(const char *commonName = nullptr);
|
||||
bool isEqual(const TlsConfig &other) const;
|
||||
rapidjson::Value toJSON(rapidjson::Document &doc) const;
|
||||
void print() const;
|
||||
|
||||
private:
|
||||
void init(const rapidjson::Value &value, const TlsConfig ¤t);
|
||||
void setProtocols(const char *protocols);
|
||||
void setProtocols(const rapidjson::Value &protocols);
|
||||
|
||||
private:
|
||||
bool m_enabled = true;
|
||||
bool m_enabled = false;
|
||||
uint32_t m_protocols = 0;
|
||||
String m_cert;
|
||||
String m_ciphers;
|
||||
String m_cipherSuites;
|
||||
String m_ciphersuites;
|
||||
String m_dhparam;
|
||||
String m_key;
|
||||
};
|
||||
|
||||
|
||||
} /* namespace xmrig */
|
||||
} // namespace xmrig
|
||||
|
||||
#endif /* XMRIG_TLSCONFIG_H */
|
||||
|
||||
#endif // XMRIG_TLSCONFIG_H
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
/* XMRig
|
||||
* Copyright (c) 2018 Lee Clagett <https://github.com/vtnerd>
|
||||
* Copyright (c) 2018-2021 SChernykh <https://github.com/SChernykh>
|
||||
* Copyright (c) 2016-2021 XMRig <https://github.com/xmrig>, <support@xmrig.com>
|
||||
* Copyright (c) 2018-2022 SChernykh <https://github.com/SChernykh>
|
||||
* Copyright (c) 2016-2022 XMRig <https://github.com/xmrig>, <support@xmrig.com>
|
||||
*
|
||||
* This program is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
|
@ -18,13 +18,14 @@
|
|||
*/
|
||||
|
||||
#include "base/net/tls/TlsContext.h"
|
||||
#include "3rdparty/fmt/core.h"
|
||||
#include "base/io/Env.h"
|
||||
#include "base/io/log/Log.h"
|
||||
#include "base/net/tls/TlsConfig.h"
|
||||
|
||||
|
||||
#include <openssl/ssl.h>
|
||||
#include <openssl/err.h>
|
||||
#include <openssl/ssl.h>
|
||||
#include <stdexcept>
|
||||
|
||||
|
||||
// https://wiki.openssl.org/index.php/OpenSSL_1.1.0_Changes#Compatibility_Layer
|
||||
|
@ -44,8 +45,106 @@ int DH_set0_pqg(DH *dh, BIGNUM *p, BIGNUM *q, BIGNUM *g)
|
|||
namespace xmrig {
|
||||
|
||||
|
||||
class TlsContext::Private
|
||||
{
|
||||
public:
|
||||
void load(const TlsConfig &config);
|
||||
|
||||
SSL_CTX *ctx = nullptr;
|
||||
|
||||
private:
|
||||
static inline const char *error() { return ERR_reason_error_string(ERR_get_error()); }
|
||||
|
||||
static DH *get_dh2048();
|
||||
|
||||
void setDH(const String &dhparam) const;
|
||||
void setProtocols(uint32_t protocols) const;
|
||||
};
|
||||
|
||||
|
||||
} // namespace xmrig
|
||||
|
||||
|
||||
xmrig::TlsContext::~TlsContext()
|
||||
{
|
||||
SSL_CTX_free(d->ctx);
|
||||
}
|
||||
|
||||
|
||||
SSL_CTX *xmrig::TlsContext::handle() const
|
||||
{
|
||||
return d->ctx;
|
||||
}
|
||||
|
||||
|
||||
xmrig::TlsContext::TlsContext() :
|
||||
d(std::make_shared<Private>())
|
||||
{
|
||||
}
|
||||
|
||||
|
||||
std::shared_ptr<xmrig::TlsContext> xmrig::TlsContext::create(const TlsConfig &config)
|
||||
{
|
||||
if (!config.isEnabled()) {
|
||||
return nullptr;
|
||||
}
|
||||
|
||||
auto tls = std::shared_ptr<TlsContext>(new TlsContext());
|
||||
tls->d->load(config);
|
||||
|
||||
return tls;
|
||||
}
|
||||
|
||||
|
||||
void xmrig::TlsContext::Private::load(const TlsConfig &config)
|
||||
{
|
||||
if ((ctx = SSL_CTX_new(SSLv23_server_method())) == nullptr) {
|
||||
throw std::runtime_error("Unable to create SSL context");
|
||||
}
|
||||
|
||||
const auto cert = Env::expand(config.cert());
|
||||
if (cert.isNull()) {
|
||||
throw std::runtime_error("Unable to load cert file");
|
||||
}
|
||||
|
||||
if (SSL_CTX_use_certificate_chain_file(ctx, cert) <= 0) {
|
||||
throw std::runtime_error(fmt::format("Unable to load cert file \"{}\": \"{}\"", cert.data(), error()));
|
||||
}
|
||||
|
||||
const auto key = Env::expand(config.key());
|
||||
if (key.isNull()) {
|
||||
throw std::runtime_error("Unable to load key file");
|
||||
}
|
||||
|
||||
if (SSL_CTX_use_PrivateKey_file(ctx, key, SSL_FILETYPE_PEM) <= 0) {
|
||||
throw std::runtime_error(fmt::format("Unable to load key file \"{}\": \"{}\"", key.data(), error()));
|
||||
}
|
||||
|
||||
SSL_CTX_set_options(ctx, SSL_OP_NO_SSLv2 | SSL_OP_NO_SSLv3);
|
||||
SSL_CTX_set_options(ctx, SSL_OP_CIPHER_SERVER_PREFERENCE);
|
||||
|
||||
# if OPENSSL_VERSION_NUMBER >= 0x1010100fL && !defined(LIBRESSL_VERSION_NUMBER)
|
||||
SSL_CTX_set_max_early_data(ctx, 0);
|
||||
# endif
|
||||
|
||||
setProtocols(config.protocols());
|
||||
|
||||
if (!config.ciphers().isNull() && SSL_CTX_set_cipher_list(ctx, config.ciphers()) <= 0) {
|
||||
throw std::runtime_error(fmt::format("Unable to set cipher list: \"{}\"", error()));
|
||||
}
|
||||
|
||||
# if OPENSSL_VERSION_NUMBER >= 0x1010100fL && !defined(LIBRESSL_VERSION_NUMBER)
|
||||
if (!config.ciphersuites().isNull() && SSL_CTX_set_ciphersuites(ctx, config.ciphersuites()) <= 0) {
|
||||
throw std::runtime_error(fmt::format("Unable to set ciphersuites: \"{}\"", error()));
|
||||
}
|
||||
# endif
|
||||
|
||||
setDH(Env::expand(config.dhparam()));
|
||||
}
|
||||
|
||||
|
||||
// https://wiki.openssl.org/index.php/Diffie-Hellman_parameters
|
||||
static DH *get_dh2048()
|
||||
DH *xmrig::TlsContext::Private::get_dh2048()
|
||||
{
|
||||
static unsigned char dhp_2048[] = {
|
||||
0xB2, 0x91, 0xA7, 0x05, 0x31, 0xCE, 0x12, 0x9D, 0x03, 0x43,
|
||||
|
@ -78,6 +177,7 @@ static DH *get_dh2048()
|
|||
|
||||
static unsigned char dhg_2048[] = { 0x02 };
|
||||
|
||||
|
||||
auto dh = DH_new();
|
||||
if (dh == nullptr) {
|
||||
return nullptr;
|
||||
|
@ -97,167 +197,63 @@ static DH *get_dh2048()
|
|||
return dh;
|
||||
}
|
||||
|
||||
} // namespace xmrig
|
||||
|
||||
|
||||
xmrig::TlsContext::~TlsContext()
|
||||
{
|
||||
SSL_CTX_free(m_ctx);
|
||||
}
|
||||
|
||||
|
||||
xmrig::TlsContext *xmrig::TlsContext::create(const TlsConfig &config)
|
||||
{
|
||||
if (!config.isEnabled()) {
|
||||
return nullptr;
|
||||
}
|
||||
|
||||
auto tls = new TlsContext();
|
||||
if (!tls->load(config)) {
|
||||
delete tls;
|
||||
|
||||
return nullptr;
|
||||
}
|
||||
|
||||
return tls;
|
||||
}
|
||||
|
||||
|
||||
bool xmrig::TlsContext::load(const TlsConfig &config)
|
||||
{
|
||||
m_ctx = SSL_CTX_new(SSLv23_server_method());
|
||||
if (m_ctx == nullptr) {
|
||||
LOG_ERR("Unable to create SSL context");
|
||||
|
||||
return false;
|
||||
}
|
||||
|
||||
const auto cert = Env::expand(config.cert());
|
||||
if (SSL_CTX_use_certificate_chain_file(m_ctx, cert) <= 0) {
|
||||
LOG_ERR("SSL_CTX_use_certificate_chain_file(\"%s\") failed.", config.cert());
|
||||
|
||||
return false;
|
||||
}
|
||||
|
||||
const auto key = Env::expand(config.key());
|
||||
if (SSL_CTX_use_PrivateKey_file(m_ctx, key, SSL_FILETYPE_PEM) <= 0) {
|
||||
LOG_ERR("SSL_CTX_use_PrivateKey_file(\"%s\") failed.", config.key());
|
||||
|
||||
return false;
|
||||
}
|
||||
|
||||
SSL_CTX_set_options(m_ctx, SSL_OP_NO_SSLv2 | SSL_OP_NO_SSLv3);
|
||||
SSL_CTX_set_options(m_ctx, SSL_OP_CIPHER_SERVER_PREFERENCE);
|
||||
|
||||
# if OPENSSL_VERSION_NUMBER >= 0x1010100fL && !defined(LIBRESSL_VERSION_NUMBER)
|
||||
SSL_CTX_set_max_early_data(m_ctx, 0);
|
||||
# endif
|
||||
|
||||
setProtocols(config.protocols());
|
||||
|
||||
return setCiphers(config.ciphers()) && setCipherSuites(config.cipherSuites()) && setDH(config.dhparam());
|
||||
}
|
||||
|
||||
|
||||
bool xmrig::TlsContext::setCiphers(const char *ciphers)
|
||||
{
|
||||
if (ciphers == nullptr || SSL_CTX_set_cipher_list(m_ctx, ciphers) == 1) {
|
||||
return true;
|
||||
}
|
||||
|
||||
LOG_ERR("SSL_CTX_set_cipher_list(\"%s\") failed.", ciphers);
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
|
||||
bool xmrig::TlsContext::setCipherSuites(const char *ciphersuites)
|
||||
{
|
||||
if (ciphersuites == nullptr) {
|
||||
return true;
|
||||
}
|
||||
|
||||
# if OPENSSL_VERSION_NUMBER >= 0x1010100fL && !defined(LIBRESSL_VERSION_NUMBER)
|
||||
if (SSL_CTX_set_ciphersuites(m_ctx, ciphersuites) == 1) {
|
||||
return true;
|
||||
}
|
||||
# endif
|
||||
|
||||
LOG_ERR("SSL_CTX_set_ciphersuites(\"%s\") failed.", ciphersuites);
|
||||
|
||||
return false;
|
||||
}
|
||||
|
||||
|
||||
bool xmrig::TlsContext::setDH(const char *dhparam)
|
||||
void xmrig::TlsContext::Private::setDH(const String &dhparam) const
|
||||
{
|
||||
DH *dh = nullptr;
|
||||
|
||||
if (dhparam != nullptr) {
|
||||
BIO *bio = BIO_new_file(Env::expand(dhparam), "r");
|
||||
if (bio == nullptr) {
|
||||
LOG_ERR("BIO_new_file(\"%s\") failed.", dhparam);
|
||||
|
||||
return false;
|
||||
}
|
||||
|
||||
dh = PEM_read_bio_DHparams(bio, nullptr, nullptr, nullptr);
|
||||
if (dh == nullptr) {
|
||||
LOG_ERR("PEM_read_bio_DHparams(\"%s\") failed.", dhparam);
|
||||
|
||||
if (!dhparam.isEmpty()) {
|
||||
BIO *bio = BIO_new_file(dhparam, "r");
|
||||
if (bio) {
|
||||
dh = PEM_read_bio_DHparams(bio, nullptr, nullptr, nullptr);
|
||||
BIO_free(bio);
|
||||
|
||||
return false;
|
||||
}
|
||||
|
||||
BIO_free(bio);
|
||||
if (!dh) {
|
||||
throw std::runtime_error(fmt::format("Unable to load DH params \"{}\": \"{}\"", dhparam.data(), error()));
|
||||
}
|
||||
}
|
||||
else {
|
||||
dh = get_dh2048();
|
||||
}
|
||||
|
||||
const int rc = SSL_CTX_set_tmp_dh(m_ctx, dh); // NOLINT(cppcoreguidelines-pro-type-cstyle-cast)
|
||||
|
||||
const int rc = SSL_CTX_set_tmp_dh(ctx, dh); // NOLINT(cppcoreguidelines-pro-type-cstyle-cast)
|
||||
DH_free(dh);
|
||||
|
||||
if (rc == 0) {
|
||||
LOG_ERR("SSL_CTX_set_tmp_dh(\"%s\") failed.", dhparam);
|
||||
|
||||
return false;
|
||||
if (rc <= 0) {
|
||||
throw std::runtime_error(fmt::format("Unable to set DH params: \"{}\"", error()));
|
||||
}
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
|
||||
void xmrig::TlsContext::setProtocols(uint32_t protocols)
|
||||
void xmrig::TlsContext::Private::setProtocols(uint32_t protocols) const
|
||||
{
|
||||
if (protocols == 0) {
|
||||
return;
|
||||
}
|
||||
|
||||
if (!(protocols & TlsConfig::TLSv1)) {
|
||||
SSL_CTX_set_options(m_ctx, SSL_OP_NO_TLSv1);
|
||||
SSL_CTX_set_options(ctx, SSL_OP_NO_TLSv1);
|
||||
}
|
||||
|
||||
# ifdef SSL_OP_NO_TLSv1_1
|
||||
SSL_CTX_clear_options(m_ctx, SSL_OP_NO_TLSv1_1);
|
||||
SSL_CTX_clear_options(ctx, SSL_OP_NO_TLSv1_1);
|
||||
if (!(protocols & TlsConfig::TLSv1_1)) {
|
||||
SSL_CTX_set_options(m_ctx, SSL_OP_NO_TLSv1_1);
|
||||
SSL_CTX_set_options(ctx, SSL_OP_NO_TLSv1_1);
|
||||
}
|
||||
# endif
|
||||
|
||||
# ifdef SSL_OP_NO_TLSv1_2
|
||||
SSL_CTX_clear_options(m_ctx, SSL_OP_NO_TLSv1_2);
|
||||
SSL_CTX_clear_options(ctx, SSL_OP_NO_TLSv1_2);
|
||||
if (!(protocols & TlsConfig::TLSv1_2)) {
|
||||
SSL_CTX_set_options(m_ctx, SSL_OP_NO_TLSv1_2);
|
||||
SSL_CTX_set_options(ctx, SSL_OP_NO_TLSv1_2);
|
||||
}
|
||||
# endif
|
||||
|
||||
# ifdef SSL_OP_NO_TLSv1_3
|
||||
SSL_CTX_clear_options(m_ctx, SSL_OP_NO_TLSv1_3);
|
||||
SSL_CTX_clear_options(ctx, SSL_OP_NO_TLSv1_3);
|
||||
if (!(protocols & TlsConfig::TLSv1_3)) {
|
||||
SSL_CTX_set_options(m_ctx, SSL_OP_NO_TLSv1_3);
|
||||
SSL_CTX_set_options(ctx, SSL_OP_NO_TLSv1_3);
|
||||
}
|
||||
# endif
|
||||
}
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
/* XMRig
|
||||
* Copyright (c) 2018 Lee Clagett <https://github.com/vtnerd>
|
||||
* Copyright (c) 2018-2021 SChernykh <https://github.com/SChernykh>
|
||||
* Copyright (c) 2016-2021 XMRig <https://github.com/xmrig>, <support@xmrig.com>
|
||||
* Copyright (c) 2018-2022 SChernykh <https://github.com/SChernykh>
|
||||
* Copyright (c) 2016-2022 XMRig <https://github.com/xmrig>, <support@xmrig.com>
|
||||
*
|
||||
* This program is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
|
@ -24,9 +24,6 @@
|
|||
#include "base/tools/Object.h"
|
||||
|
||||
|
||||
#include <cstdint>
|
||||
|
||||
|
||||
using SSL_CTX = struct ssl_ctx_st;
|
||||
|
||||
|
||||
|
@ -43,23 +40,18 @@ public:
|
|||
|
||||
~TlsContext();
|
||||
|
||||
static TlsContext *create(const TlsConfig &config);
|
||||
static std::shared_ptr<TlsContext> create(const TlsConfig &config);
|
||||
|
||||
inline SSL_CTX *ctx() const { return m_ctx; }
|
||||
SSL_CTX *handle() const;
|
||||
|
||||
private:
|
||||
TlsContext() = default;
|
||||
XMRIG_DECL_PRIVATE()
|
||||
|
||||
bool load(const TlsConfig &config);
|
||||
bool setCiphers(const char *ciphers);
|
||||
bool setCipherSuites(const char *ciphersuites);
|
||||
bool setDH(const char *dhparam);
|
||||
void setProtocols(uint32_t protocols);
|
||||
|
||||
SSL_CTX *m_ctx = nullptr;
|
||||
TlsContext();
|
||||
};
|
||||
|
||||
|
||||
} /* namespace xmrig */
|
||||
} // namespace xmrig
|
||||
|
||||
#endif /* XMRIG_TLSCONTEXT_H */
|
||||
|
||||
#endif // XMRIG_TLSCONTEXT_H
|
||||
|
|
|
@ -105,9 +105,7 @@ void xmrig::TlsGen::generate(const char *commonName)
|
|||
throw std::runtime_error("unable to write certificate to disk.");
|
||||
}
|
||||
|
||||
# if !defined(XMRIG_LEGACY)
|
||||
LOG_NOTICE("%s " MAGENTA_BOLD("generated") WHITE_BOLD(" \"%s/%s\" ") "CN=" WHITE_BOLD("\"%s\""), tls_tag(), m_cert.data(), m_certKey.data(), cn());
|
||||
# endif
|
||||
}
|
||||
|
||||
|
||||
|
|
Loading…
Reference in a new issue