mirror of
https://github.com/SoftEtherVPN/SoftEtherVPN.git
synced 2024-11-07 18:20:41 +03:00
59e1483dbf
On startup client creates TUN interface in UP state and kept it UP even if connection to the server was lost. Creating interface in DOWN state, turning it UP on successful (re-)connection to server and DOWN on either disconnect or connection loss would enable DHCP client (say dhclient5) to detect necessity for lease renewal. Added a client configuration parameter to create TUN interface in DOWN state and commands to enable, disable, and query the configuration parameter. Enabling the parameter causes client to put all unused TUN interfaces DOWN, create new TUN interfaces in DOWN state, and turn TUN interfaces corresponding to active sessions DOWN on connection loss or disconnecting from server. Disabling the parameter forces client to turn all TUN interfaces UP and create new TUN interfaces in UP state. Default value is 'Disable'.
2503 lines
57 KiB
C
2503 lines
57 KiB
C
// SoftEther VPN Source Code - Developer Edition Master Branch
|
|
// Cedar Communication Module
|
|
//
|
|
// SoftEther VPN Server, Client and Bridge are free software under GPLv2.
|
|
//
|
|
// Copyright (c) Daiyuu Nobori.
|
|
// Copyright (c) SoftEther VPN Project, University of Tsukuba, Japan.
|
|
// Copyright (c) SoftEther Corporation.
|
|
//
|
|
// All Rights Reserved.
|
|
//
|
|
// http://www.softether.org/
|
|
//
|
|
// Author: Daiyuu Nobori, Ph.D.
|
|
// Comments: Tetsuo Sugiyama, Ph.D.
|
|
//
|
|
// This program is free software; you can redistribute it and/or
|
|
// modify it under the terms of the GNU General Public License
|
|
// version 2 as published by the Free Software Foundation.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU General Public License version 2
|
|
// along with this program; if not, write to the Free Software
|
|
// Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
|
|
//
|
|
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
// EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
|
|
// IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
|
|
// CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
|
|
// TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
|
|
// SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
//
|
|
// THE LICENSE AGREEMENT IS ATTACHED ON THE SOURCE-CODE PACKAGE
|
|
// AS "LICENSE.TXT" FILE. READ THE TEXT FILE IN ADVANCE TO USE THE SOFTWARE.
|
|
//
|
|
//
|
|
// THIS SOFTWARE IS DEVELOPED IN JAPAN, AND DISTRIBUTED FROM JAPAN,
|
|
// UNDER JAPANESE LAWS. YOU MUST AGREE IN ADVANCE TO USE, COPY, MODIFY,
|
|
// MERGE, PUBLISH, DISTRIBUTE, SUBLICENSE, AND/OR SELL COPIES OF THIS
|
|
// SOFTWARE, THAT ANY JURIDICAL DISPUTES WHICH ARE CONCERNED TO THIS
|
|
// SOFTWARE OR ITS CONTENTS, AGAINST US (SOFTETHER PROJECT, SOFTETHER
|
|
// CORPORATION, DAIYUU NOBORI OR OTHER SUPPLIERS), OR ANY JURIDICAL
|
|
// DISPUTES AGAINST US WHICH ARE CAUSED BY ANY KIND OF USING, COPYING,
|
|
// MODIFYING, MERGING, PUBLISHING, DISTRIBUTING, SUBLICENSING, AND/OR
|
|
// SELLING COPIES OF THIS SOFTWARE SHALL BE REGARDED AS BE CONSTRUED AND
|
|
// CONTROLLED BY JAPANESE LAWS, AND YOU MUST FURTHER CONSENT TO
|
|
// EXCLUSIVE JURISDICTION AND VENUE IN THE COURTS SITTING IN TOKYO,
|
|
// JAPAN. YOU MUST WAIVE ALL DEFENSES OF LACK OF PERSONAL JURISDICTION
|
|
// AND FORUM NON CONVENIENS. PROCESS MAY BE SERVED ON EITHER PARTY IN
|
|
// THE MANNER AUTHORIZED BY APPLICABLE LAW OR COURT RULE.
|
|
//
|
|
// USE ONLY IN JAPAN. DO NOT USE THIS SOFTWARE IN ANOTHER COUNTRY UNLESS
|
|
// YOU HAVE A CONFIRMATION THAT THIS SOFTWARE DOES NOT VIOLATE ANY
|
|
// CRIMINAL LAWS OR CIVIL RIGHTS IN THAT PARTICULAR COUNTRY. USING THIS
|
|
// SOFTWARE IN OTHER COUNTRIES IS COMPLETELY AT YOUR OWN RISK. THE
|
|
// SOFTETHER VPN PROJECT HAS DEVELOPED AND DISTRIBUTED THIS SOFTWARE TO
|
|
// COMPLY ONLY WITH THE JAPANESE LAWS AND EXISTING CIVIL RIGHTS INCLUDING
|
|
// PATENTS WHICH ARE SUBJECTS APPLY IN JAPAN. OTHER COUNTRIES' LAWS OR
|
|
// CIVIL RIGHTS ARE NONE OF OUR CONCERNS NOR RESPONSIBILITIES. WE HAVE
|
|
// NEVER INVESTIGATED ANY CRIMINAL REGULATIONS, CIVIL LAWS OR
|
|
// INTELLECTUAL PROPERTY RIGHTS INCLUDING PATENTS IN ANY OF OTHER 200+
|
|
// COUNTRIES AND TERRITORIES. BY NATURE, THERE ARE 200+ REGIONS IN THE
|
|
// WORLD, WITH DIFFERENT LAWS. IT IS IMPOSSIBLE TO VERIFY EVERY
|
|
// COUNTRIES' LAWS, REGULATIONS AND CIVIL RIGHTS TO MAKE THE SOFTWARE
|
|
// COMPLY WITH ALL COUNTRIES' LAWS BY THE PROJECT. EVEN IF YOU WILL BE
|
|
// SUED BY A PRIVATE ENTITY OR BE DAMAGED BY A PUBLIC SERVANT IN YOUR
|
|
// COUNTRY, THE DEVELOPERS OF THIS SOFTWARE WILL NEVER BE LIABLE TO
|
|
// RECOVER OR COMPENSATE SUCH DAMAGES, CRIMINAL OR CIVIL
|
|
// RESPONSIBILITIES. NOTE THAT THIS LINE IS NOT LICENSE RESTRICTION BUT
|
|
// JUST A STATEMENT FOR WARNING AND DISCLAIMER.
|
|
//
|
|
//
|
|
// SOURCE CODE CONTRIBUTION
|
|
// ------------------------
|
|
//
|
|
// Your contribution to SoftEther VPN Project is much appreciated.
|
|
// Please send patches to us through GitHub.
|
|
// Read the SoftEther VPN Patch Acceptance Policy in advance:
|
|
// http://www.softether.org/5-download/src/9.patch
|
|
//
|
|
//
|
|
// DEAR SECURITY EXPERTS
|
|
// ---------------------
|
|
//
|
|
// If you find a bug or a security vulnerability please kindly inform us
|
|
// about the problem immediately so that we can fix the security problem
|
|
// to protect a lot of users around the world as soon as possible.
|
|
//
|
|
// Our e-mail address for security reports is:
|
|
// softether-vpn-security [at] softether.org
|
|
//
|
|
// Please note that the above e-mail address is not a technical support
|
|
// inquiry address. If you need technical assistance, please visit
|
|
// http://www.softether.org/ and ask your question on the users forum.
|
|
//
|
|
// Thank you for your cooperation.
|
|
//
|
|
//
|
|
// NO MEMORY OR RESOURCE LEAKS
|
|
// ---------------------------
|
|
//
|
|
// The memory-leaks and resource-leaks verification under the stress
|
|
// test has been passed before release this source code.
|
|
|
|
|
|
// Session.c
|
|
// Session Manager
|
|
|
|
#include "CedarPch.h"
|
|
|
|
// Main routine of the session
|
|
void SessionMain(SESSION *s)
|
|
{
|
|
CONNECTION *c;
|
|
POLICY *policy;
|
|
UINT64 now;
|
|
UINT i = 0;
|
|
PACKET_ADAPTER *pa;
|
|
bool pa_inited = false;
|
|
UINT packet_size;
|
|
void *packet;
|
|
bool packet_put;
|
|
bool pa_fail = false;
|
|
UINT test = 0;
|
|
bool update_hub_last_comm = false;
|
|
UINT err = ERR_SESSION_TIMEOUT;
|
|
UINT64 next_black_list_check = 0;
|
|
UINT64 next_update_hub_last_comm = 0;
|
|
UINT64 auto_disconnect_tick = 0;
|
|
bool block_all_packets = false;
|
|
UINT64 next_check_block_all_packets = 0;
|
|
TRAFFIC t;
|
|
SOCK *msgdlg_sock = NULL;
|
|
SOCK *nicinfo_sock = NULL;
|
|
bool is_server_session = false;
|
|
bool lock_receive_blocks_queue = false;
|
|
// Validate arguments
|
|
if (s == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
Debug("SessionMain: %s\n", s->Name);
|
|
|
|
Notify(s, CLIENT_NOTIFY_ACCOUNT_CHANGED);
|
|
|
|
// Generate a string from the session key
|
|
BinToStr(s->SessionKeyStr, sizeof(s->SessionKeyStr), s->SessionKey, sizeof(s->SessionKey));
|
|
|
|
// Reset the number of retries
|
|
s->CurrentRetryCount = 0;
|
|
s->ConnectSucceed = true;
|
|
s->SessionTimeOuted = false;
|
|
s->NumDisconnected = 0;
|
|
|
|
c = s->Connection;
|
|
policy = s->Policy;
|
|
|
|
// Initialize the packet adapter
|
|
#ifdef OS_WIN32
|
|
if (s->IsVPNClientAndVLAN_Win32)
|
|
{
|
|
MsBeginVLanCard();
|
|
|
|
if (MsIsVLanCardShouldStop())
|
|
{
|
|
err = ERR_SUSPENDING;
|
|
goto CLEANUP;
|
|
}
|
|
}
|
|
#endif // OS_WIN32
|
|
|
|
pa = s->PacketAdapter;
|
|
if (pa->Init(s) == false)
|
|
{
|
|
// Initialization Failed
|
|
if (s->VLanDeviceErrorCount >= 2)
|
|
{
|
|
s->ForceStopFlag = true;
|
|
}
|
|
else
|
|
{
|
|
s->VLanDeviceErrorCount++;
|
|
}
|
|
err = ERR_DEVICE_DRIVER_ERROR;
|
|
goto CLEANUP;
|
|
}
|
|
pa_inited = true;
|
|
|
|
if (s->BridgeMode == false)
|
|
{
|
|
s->Cancel2 = pa->GetCancel(s);
|
|
}
|
|
else
|
|
{
|
|
CANCEL *c = pa->GetCancel(s);
|
|
CANCEL *old = s->Cancel1;
|
|
s->Cancel1 = c;
|
|
ReleaseCancel(old);
|
|
}
|
|
|
|
s->RetryFlag = false;
|
|
|
|
s->LastCommTime = Tick64();
|
|
if (s->ServerMode == false)
|
|
{
|
|
s->NextConnectionTime = Tick64() + (UINT64)(s->ClientOption->AdditionalConnectionInterval * 1000);
|
|
}
|
|
|
|
s->NumConnectionsEstablished++;
|
|
s->CurrentConnectionEstablishTime = Tick64();
|
|
if (s->FirstConnectionEstablishedTime == 0)
|
|
{
|
|
s->FirstConnectionEstablishedTime = Tick64();
|
|
}
|
|
|
|
if (s->ServerMode == false && s->Cedar->Client != NULL)
|
|
{
|
|
if (s->Policy != NULL)
|
|
{
|
|
if (s->Policy->AutoDisconnect)
|
|
{
|
|
auto_disconnect_tick = s->CurrentConnectionEstablishTime +
|
|
(UINT64)s->Policy->AutoDisconnect * 1000ULL;
|
|
}
|
|
}
|
|
}
|
|
|
|
s->LastIncrementTraffic = Tick64();
|
|
|
|
c->Err = ERR_SESSION_TIMEOUT;
|
|
s->VLanDeviceErrorCount = 0;
|
|
|
|
s->LastTryAddConnectTime = Tick64();
|
|
|
|
Notify(s, CLIENT_NOTIFY_ACCOUNT_CHANGED);
|
|
|
|
if (policy != NULL)
|
|
{
|
|
// Determine the mode by referencing the contents of the policy
|
|
if (policy->MonitorPort)
|
|
{
|
|
s->IsMonitorMode = true;
|
|
}
|
|
|
|
if (policy->NoRouting == false || policy->NoBridge == false)
|
|
{
|
|
s->IsBridgeMode = true;
|
|
}
|
|
}
|
|
|
|
if (s->ServerMode == false && s->Cedar->Client != NULL)
|
|
{
|
|
if (IsEmptyUniStr(s->Client_Message) == false)
|
|
{
|
|
UI_MSG_DLG dlg;
|
|
|
|
Zero(&dlg, sizeof(dlg));
|
|
if (s->ClientOption != NULL)
|
|
{
|
|
StrCpy(dlg.HubName, sizeof(dlg.HubName), s->ClientOption->HubName);
|
|
StrCpy(dlg.ServerName, sizeof(dlg.ServerName), s->ClientOption->Hostname);
|
|
}
|
|
|
|
dlg.Msg = s->Client_Message;
|
|
|
|
msgdlg_sock = CncMsgDlg(&dlg);
|
|
}
|
|
|
|
if (s->Win32HideNicInfoWindow == false)
|
|
{
|
|
UI_NICINFO info;
|
|
|
|
Zero(&info, sizeof(info));
|
|
if (s->ClientOption != NULL)
|
|
{
|
|
StrCpy(info.NicName, sizeof(info.NicName), s->ClientOption->DeviceName);
|
|
UniStrCpy(info.AccountName, sizeof(info.AccountName), s->ClientOption->AccountName);
|
|
}
|
|
|
|
nicinfo_sock = CncNicInfo(&info);
|
|
}
|
|
}
|
|
|
|
is_server_session = s->ServerMode;
|
|
|
|
lock_receive_blocks_queue = s->LinkModeServer;
|
|
|
|
now = Tick64();
|
|
|
|
while (true)
|
|
{
|
|
Zero(&t, sizeof(t));
|
|
|
|
|
|
if (next_update_hub_last_comm == 0 ||
|
|
(next_update_hub_last_comm <= now))
|
|
{
|
|
next_update_hub_last_comm = now + 1000;
|
|
|
|
if (s->Hub != NULL)
|
|
{
|
|
if (update_hub_last_comm)
|
|
{
|
|
Lock(s->Hub->lock);
|
|
{
|
|
s->Hub->LastCommTime = SystemTime64();
|
|
}
|
|
Unlock(s->Hub->lock);
|
|
|
|
update_hub_last_comm = false;
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
if (is_server_session && s->LinkModeServer == false && s->SecureNATMode == false && s->BridgeMode == false && s->L3SwitchMode == false)
|
|
{
|
|
if (s->Hub != NULL && s->Hub->ForceDisableComm)
|
|
{
|
|
// Disconnect the session forcibly because the ForceDisableComm flag is set
|
|
err = ERR_SERVER_CANT_ACCEPT;
|
|
pa_fail = true;
|
|
}
|
|
}
|
|
|
|
if (s->InProcMode)
|
|
{
|
|
if (c->TubeSock == NULL || IsTubeConnected(c->TubeSock->SendTube) == false || IsTubeConnected(c->TubeSock->RecvTube) == false)
|
|
{
|
|
// Disconnection occurs in the in-process mode
|
|
err = ERR_DISCONNECTED;
|
|
pa_fail = true;
|
|
}
|
|
}
|
|
|
|
if (s->IsRUDPSession)
|
|
{
|
|
if (s->NumDisconnected >= 1 && s->EnableUdpRecovery == false)
|
|
{
|
|
// Disconnection occurs in the R-UDP session (UDP recovery is invalid)
|
|
err = ERR_DISCONNECTED;
|
|
pa_fail = true;
|
|
}
|
|
}
|
|
|
|
// Chance of additional connection
|
|
if (is_server_session == false)
|
|
{
|
|
if (GetGlobalServerFlag(GSF_DISABLE_SESSION_RECONNECT) == false)
|
|
{
|
|
ClientAdditionalConnectChance(s);
|
|
}
|
|
}
|
|
|
|
// Receive a block
|
|
ConnectionReceive(c, s->Cancel1, s->Cancel2);
|
|
|
|
// Get the current time
|
|
now = Tick64();
|
|
|
|
if (s->UseUdpAcceleration && s->UdpAccel != NULL && s->UdpAccel->FatalError)
|
|
{
|
|
// A serious error occurs during sending any data on UDP socket
|
|
// in the case of using UDP acceleration function
|
|
err = ERR_DISCONNECTED;
|
|
pa_fail = true;
|
|
}
|
|
|
|
#ifdef OS_WIN32
|
|
if (s->IsVPNClientAndVLAN_Win32)
|
|
{
|
|
if (MsIsVLanCardShouldStop())
|
|
{
|
|
// System is suspending
|
|
err = ERR_SUSPENDING;
|
|
pa_fail = true;
|
|
}
|
|
}
|
|
#endif // OS_WIN32
|
|
|
|
// Pass the received block to the PacketAdapter
|
|
if (lock_receive_blocks_queue)
|
|
{
|
|
LockQueue(c->ReceivedBlocks);
|
|
}
|
|
{
|
|
BLOCK *b;
|
|
packet_put = false;
|
|
while (true)
|
|
{
|
|
b = GetNext(c->ReceivedBlocks);
|
|
if (b == NULL)
|
|
{
|
|
break;
|
|
}
|
|
|
|
PROBE_DATA2("GetNext", b->Buf, b->Size);
|
|
|
|
update_hub_last_comm = true;
|
|
|
|
if (b->Size >= 14)
|
|
{
|
|
if (b->Buf[0] & 0x01)
|
|
{
|
|
if (is_server_session == false)
|
|
{
|
|
t.Recv.BroadcastCount++;
|
|
t.Recv.BroadcastBytes += (UINT64)b->Size;
|
|
}
|
|
else
|
|
{
|
|
t.Send.BroadcastCount++;
|
|
t.Send.BroadcastBytes += (UINT64)b->Size;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
if (is_server_session == false)
|
|
{
|
|
t.Recv.UnicastCount++;
|
|
t.Recv.UnicastBytes += (UINT64)b->Size;
|
|
}
|
|
else
|
|
{
|
|
t.Send.UnicastCount++;
|
|
t.Send.UnicastBytes += (UINT64)b->Size;
|
|
}
|
|
}
|
|
}
|
|
|
|
packet_put = true;
|
|
PROBE_DATA2("pa->PutPacket", b->Buf, b->Size);
|
|
if (pa->PutPacket(s, b->Buf, b->Size) == false)
|
|
{
|
|
pa_fail = true;
|
|
err = ERR_DEVICE_DRIVER_ERROR;
|
|
Free(b->Buf);
|
|
Debug(" Error: pa->PutPacket(Packet) Failed.\n");
|
|
}
|
|
Free(b);
|
|
}
|
|
|
|
if (true /* packet_put || is_server_session 2014.7.23 for optimizing */)
|
|
{
|
|
PROBE_DATA2("pa->PutPacket", NULL, 0);
|
|
if (pa->PutPacket(s, NULL, 0) == false)
|
|
{
|
|
Debug(" Error: pa->PutPacket(NULL) Failed.\n");
|
|
pa_fail = true;
|
|
err = ERR_DEVICE_DRIVER_ERROR;
|
|
}
|
|
}
|
|
}
|
|
if (lock_receive_blocks_queue)
|
|
{
|
|
UnlockQueue(c->ReceivedBlocks);
|
|
}
|
|
|
|
// Add the packet to be transmitted to SendBlocks by acquiring from PacketAdapter
|
|
{
|
|
UINT i, max_num = MAX_SEND_SOCKET_QUEUE_NUM;
|
|
i = 0;
|
|
while (packet_size = pa->GetNextPacket(s, &packet))
|
|
{
|
|
BLOCK *b;
|
|
if (packet_size == INFINITE)
|
|
{
|
|
err = ERR_DEVICE_DRIVER_ERROR;
|
|
pa_fail = true;
|
|
Debug(" Error: pa->GetNextPacket() Failed.\n");
|
|
break;
|
|
}
|
|
|
|
update_hub_last_comm = true;
|
|
|
|
if ((c->CurrentSendQueueSize > MAX_BUFFERING_PACKET_SIZE) ||
|
|
block_all_packets)
|
|
{
|
|
// WHERE;
|
|
// Discard because it exceeded the buffer size limit
|
|
Free(packet);
|
|
}
|
|
else
|
|
{
|
|
bool priority;
|
|
QUEUE *q = NULL;
|
|
// Buffering
|
|
if (packet_size >= 14)
|
|
{
|
|
UCHAR *buf = (UCHAR *)packet;
|
|
if (buf[0] & 0x01)
|
|
{
|
|
if (is_server_session == false)
|
|
{
|
|
t.Send.BroadcastCount++;
|
|
t.Send.BroadcastBytes += (UINT64)packet_size;
|
|
}
|
|
else
|
|
{
|
|
t.Recv.BroadcastCount++;
|
|
t.Recv.BroadcastBytes += (UINT64)packet_size;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
if (is_server_session == false)
|
|
{
|
|
t.Send.UnicastCount++;
|
|
t.Send.UnicastBytes += (UINT64)packet_size;
|
|
}
|
|
else
|
|
{
|
|
t.Recv.UnicastCount++;
|
|
t.Recv.UnicastBytes += (UINT64)packet_size;
|
|
}
|
|
}
|
|
}
|
|
priority = IsPriorityHighestPacketForQoS(packet, packet_size);
|
|
|
|
b = NewBlock(packet, packet_size, s->UseCompress ? 1 : 0);
|
|
b->PriorityQoS = priority;
|
|
|
|
if (b->PriorityQoS && c->Protocol == CONNECTION_TCP && s->QoS)
|
|
{
|
|
q = c->SendBlocks2;
|
|
}
|
|
else
|
|
{
|
|
q = c->SendBlocks;
|
|
}
|
|
|
|
if (q->num_item > MAX_STORED_QUEUE_NUM)
|
|
{
|
|
q = NULL;
|
|
}
|
|
|
|
if (q != NULL)
|
|
{
|
|
c->CurrentSendQueueSize += b->Size;
|
|
InsertQueue(q, b);
|
|
}
|
|
else
|
|
{
|
|
FreeBlock(b);
|
|
}
|
|
}
|
|
|
|
if ((i % 16) == 0)
|
|
{
|
|
int diff = ((int)c->CurrentSendQueueSize) - ((int)c->LastPacketQueueSize);
|
|
CedarAddCurrentTcpQueueSize(c->Cedar, diff);
|
|
c->LastPacketQueueSize = c->CurrentSendQueueSize;
|
|
}
|
|
|
|
i++;
|
|
if (i >= max_num)
|
|
{
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
AddTrafficForSession(s, &t);
|
|
|
|
if (true)
|
|
{
|
|
int diff = ((int)c->CurrentSendQueueSize) - ((int)c->LastPacketQueueSize);
|
|
CedarAddCurrentTcpQueueSize(c->Cedar, diff);
|
|
c->LastPacketQueueSize = c->CurrentSendQueueSize;
|
|
}
|
|
|
|
now = Tick64();
|
|
|
|
// Send a block
|
|
ConnectionSend(c, now);
|
|
|
|
// Determine the automatic disconnection
|
|
if (auto_disconnect_tick != 0 && auto_disconnect_tick <= now)
|
|
{
|
|
err = ERR_AUTO_DISCONNECTED;
|
|
s->CurrentRetryCount = INFINITE;
|
|
break;
|
|
}
|
|
|
|
// Stop determination
|
|
if (s->Halt)
|
|
{
|
|
if (s->ForceStopFlag)
|
|
{
|
|
err = ERR_USER_CANCEL;
|
|
}
|
|
break;
|
|
}
|
|
|
|
// Increments the number of logins for user object and Virtual HUB object.
|
|
// (It's incremented only if the time 30 seconds passed after connection.
|
|
// If not do this, it will be incremented on DoS attacks or any error.)
|
|
if (s->NumLoginIncrementTick != 0 && s->NumLoginIncrementTick <= now)
|
|
{
|
|
s->NumLoginIncrementTick = 0;
|
|
|
|
if (s->NumLoginIncrementHubObject != NULL)
|
|
{
|
|
s->NumLoginIncrementHubObject->NumLogin++;
|
|
}
|
|
|
|
if (s->NumLoginIncrementUserObject != NULL)
|
|
{
|
|
s->NumLoginIncrementUserObject->NumLogin++;
|
|
}
|
|
}
|
|
|
|
if (is_server_session)
|
|
{
|
|
HUB *hub;
|
|
|
|
// Update of traffic data of the user
|
|
if ((s->LastIncrementTraffic + INCREMENT_TRAFFIC_INTERVAL) <= now)
|
|
{
|
|
IncrementUserTraffic(s->Hub, s->UserNameReal, s);
|
|
s->LastIncrementTraffic = now;
|
|
}
|
|
|
|
hub = s->Hub;
|
|
|
|
if (hub != NULL)
|
|
{
|
|
if ((hub->LastIncrementTraffic + INCREMENT_TRAFFIC_INTERVAL) <= now)
|
|
{
|
|
hub->LastIncrementTraffic = now;
|
|
IncrementHubTraffic(s->Hub);
|
|
}
|
|
}
|
|
}
|
|
|
|
if (s->LinkModeServer == false && s->SecureNATMode == false && s->BridgeMode == false && s->L3SwitchMode == false && s->InProcMode == false)
|
|
{
|
|
bool timeouted = false;
|
|
|
|
if ((now > s->LastCommTime) && ((now - s->LastCommTime) >= ((UINT64)s->Timeout)))
|
|
{
|
|
// When communication is not possible for the predetermined time
|
|
timeouted = true;
|
|
WHERE;
|
|
}
|
|
|
|
if (c->Protocol == CONNECTION_TCP)
|
|
{
|
|
if (GetGlobalServerFlag(GSF_DISABLE_SESSION_RECONNECT))
|
|
{
|
|
UINT num_tcp_connections = Count(c->CurrentNumConnection);
|
|
|
|
if (num_tcp_connections == 0)
|
|
{
|
|
// All TCP connections are disconnected.
|
|
// Terminate the session immediately.
|
|
timeouted = true;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (is_server_session == false && s->ClientOption != NULL && s->ClientOption->ConnectionDisconnectSpan == 0)
|
|
{
|
|
if (LIST_NUM(s->Connection->Tcp->TcpSockList) < s->MaxConnection)
|
|
{
|
|
if ((s->LastTryAddConnectTime +
|
|
(UINT64)(s->ClientOption->AdditionalConnectionInterval * 1000 * 2 + CONNECTING_TIMEOUT * 2))
|
|
<= Tick64())
|
|
{
|
|
if (s->IsRUDPSession == false || LIST_NUM(s->Connection->Tcp->TcpSockList) == 0)
|
|
{
|
|
timeouted = true;
|
|
WHERE;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (timeouted)
|
|
{
|
|
// Timeout occurs
|
|
Debug("** Session Timeouted.\n");
|
|
s->SessionTimeOuted = true;
|
|
err = ERR_SESSION_TIMEOUT;
|
|
}
|
|
}
|
|
|
|
// Time-out decision
|
|
if (pa_fail || s->SessionTimeOuted)
|
|
{
|
|
s->Halt = true;
|
|
s->RetryFlag = true; // Retry flag
|
|
break;
|
|
}
|
|
}
|
|
|
|
CLEANUP:
|
|
Debug("Session %s Finishing...\n", s->Name);
|
|
|
|
// Remove from the session list of the HUB
|
|
if (s->ServerMode)
|
|
{
|
|
// Update the user information
|
|
IncrementUserTraffic(s->Hub, s->UserNameReal, s);
|
|
|
|
DelSession(s->Hub, s);
|
|
}
|
|
|
|
s->ConnectSucceed = false;
|
|
Notify(s, CLIENT_NOTIFY_ACCOUNT_CHANGED);
|
|
|
|
if (s->Connection)
|
|
{
|
|
int diff = -((int)s->Connection->LastTcpQueueSize);
|
|
s->Connection->LastTcpQueueSize = 0;
|
|
s->Connection->Halt = true;
|
|
CedarAddCurrentTcpQueueSize(s->Cedar, diff);
|
|
|
|
diff = ((int)c->CurrentSendQueueSize) - ((int)c->LastPacketQueueSize);
|
|
CedarAddCurrentTcpQueueSize(c->Cedar, diff);
|
|
c->LastPacketQueueSize = c->CurrentSendQueueSize;
|
|
}
|
|
|
|
// Release the packet adapter
|
|
if (pa_inited)
|
|
{
|
|
pa->Free(s);
|
|
}
|
|
|
|
#ifdef OS_WIN32
|
|
if (s->IsVPNClientAndVLAN_Win32)
|
|
{
|
|
MsEndVLanCard();
|
|
}
|
|
#endif // OS_WIN32
|
|
|
|
if (s->ServerMode == false)
|
|
{
|
|
// Cancel to make all additional connection
|
|
StopAllAdditionalConnectThread(s->Connection);
|
|
}
|
|
|
|
if (s->BridgeMode)
|
|
{
|
|
// Terminate the bridge
|
|
if (s->Bridge->Active)
|
|
{
|
|
CloseEth(s->Bridge->Eth);
|
|
s->Bridge->Eth = NULL;
|
|
}
|
|
}
|
|
|
|
if (s->Cancel2 != NULL)
|
|
{
|
|
// Release the Cancel 2
|
|
ReleaseCancel(s->Cancel2);
|
|
s->Cancel2 = NULL;
|
|
}
|
|
|
|
// Terminate the connection
|
|
EndTunnelingMode(c);
|
|
|
|
if (nicinfo_sock != NULL)
|
|
{
|
|
CncNicInfoFree(nicinfo_sock);
|
|
}
|
|
|
|
if (msgdlg_sock != NULL)
|
|
{
|
|
CndMsgDlgFree(msgdlg_sock);
|
|
}
|
|
|
|
c->Err = err;
|
|
}
|
|
|
|
// Get the time for the next delayed packet
|
|
UINT GetNextDelayedPacketTickDiff(SESSION *s)
|
|
{
|
|
UINT i;
|
|
UINT ret = 0x7fffffff;
|
|
UINT64 now;
|
|
// Validate arguments
|
|
if (s == NULL)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
if (LIST_NUM(s->DelayedPacketList) >= 1)
|
|
{
|
|
now = TickHighres64();
|
|
|
|
LockList(s->DelayedPacketList);
|
|
{
|
|
for (i = 0;i < LIST_NUM(s->DelayedPacketList);i++)
|
|
{
|
|
PKT *p = LIST_DATA(s->DelayedPacketList, i);
|
|
UINT64 t = p->DelayedForwardTick;
|
|
UINT d = 0x7fffffff;
|
|
|
|
if (now >= t)
|
|
{
|
|
d = 0;
|
|
}
|
|
else
|
|
{
|
|
d = (UINT)(t - now);
|
|
}
|
|
|
|
ret = MIN(ret, d);
|
|
}
|
|
}
|
|
UnlockList(s->DelayedPacketList);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
// Determine whether the packet have priority in the VoIP / QoS function
|
|
bool IsPriorityHighestPacketForQoS(void *data, UINT size)
|
|
{
|
|
UCHAR *buf;
|
|
// Validate arguments
|
|
if (data == NULL)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
buf = (UCHAR *)data;
|
|
if (size >= 16)
|
|
{
|
|
if (buf[12] == 0x08 && buf[13] == 0x00 && buf[15] != 0x00 && buf[15] != 0x08)
|
|
{
|
|
// IPv4 packet and ToS != 0
|
|
return true;
|
|
}
|
|
|
|
if (size >= 34 && size <= 128)
|
|
{
|
|
if (buf[12] == 0x08 && buf[13] == 0x00 && buf[23] == 0x01)
|
|
{
|
|
// IMCPv4 packet
|
|
return true;
|
|
}
|
|
}
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
// Update the traffic information of the user
|
|
void IncrementUserTraffic(HUB *hub, char *username, SESSION *s)
|
|
{
|
|
TRAFFIC report_traffic;
|
|
// Validate arguments
|
|
if (hub == NULL || username == NULL || s == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
Lock(s->TrafficLock);
|
|
{
|
|
// Calculate the traffic information (difference between last time) to be reported
|
|
report_traffic.Send.BroadcastBytes =
|
|
s->Traffic->Send.BroadcastBytes - s->OldTraffic->Send.BroadcastBytes;
|
|
report_traffic.Send.BroadcastCount =
|
|
s->Traffic->Send.BroadcastCount - s->OldTraffic->Send.BroadcastCount;
|
|
report_traffic.Send.UnicastBytes =
|
|
s->Traffic->Send.UnicastBytes - s->OldTraffic->Send.UnicastBytes;
|
|
report_traffic.Send.UnicastCount =
|
|
s->Traffic->Send.UnicastCount - s->OldTraffic->Send.UnicastCount;
|
|
report_traffic.Recv.BroadcastBytes =
|
|
s->Traffic->Recv.BroadcastBytes - s->OldTraffic->Recv.BroadcastBytes;
|
|
report_traffic.Recv.BroadcastCount =
|
|
s->Traffic->Recv.BroadcastCount - s->OldTraffic->Recv.BroadcastCount;
|
|
report_traffic.Recv.UnicastBytes =
|
|
s->Traffic->Recv.UnicastBytes - s->OldTraffic->Recv.UnicastBytes;
|
|
report_traffic.Recv.UnicastCount =
|
|
s->Traffic->Recv.UnicastCount - s->OldTraffic->Recv.UnicastCount;
|
|
Copy(s->OldTraffic, s->Traffic, sizeof(TRAFFIC));
|
|
|
|
if (hub->FarmMember == false)
|
|
{
|
|
// Update the user information in the local database if it is not a farm member
|
|
AcLock(hub);
|
|
{
|
|
USER *u = AcGetUser(hub, username);
|
|
if (u != NULL)
|
|
{
|
|
Lock(u->lock);
|
|
{
|
|
AddTraffic(u->Traffic, &report_traffic);
|
|
}
|
|
Unlock(u->lock);
|
|
if (u->Group != NULL)
|
|
{
|
|
Lock(u->Group->lock);
|
|
{
|
|
AddTraffic(u->Group->Traffic, &report_traffic);
|
|
}
|
|
Unlock(u->Group->lock);
|
|
}
|
|
ReleaseUser(u);
|
|
}
|
|
}
|
|
AcUnlock(hub);
|
|
}
|
|
else
|
|
{
|
|
// Update the traffic difference report list in the case of farm member
|
|
AddTrafficDiff(hub, username, TRAFFIC_DIFF_USER, &report_traffic);
|
|
}
|
|
}
|
|
Unlock(s->TrafficLock);
|
|
}
|
|
|
|
// Cumulate the traffic information of the connection
|
|
void AddTrafficForSession(SESSION *s, TRAFFIC *t)
|
|
{
|
|
HUB *h;
|
|
TRAFFIC t2;
|
|
// Validate arguments
|
|
if (s == NULL || t == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
Lock(s->TrafficLock);
|
|
{
|
|
AddTraffic(s->Traffic, t);
|
|
}
|
|
Unlock(s->TrafficLock);
|
|
|
|
if (s->ServerMode)
|
|
{
|
|
Copy(&t2.Recv, &t->Send, sizeof(TRAFFIC_ENTRY));
|
|
Copy(&t2.Send, &t->Recv, sizeof(TRAFFIC_ENTRY));
|
|
Lock(s->Cedar->TrafficLock);
|
|
{
|
|
AddTraffic(s->Cedar->Traffic, &t2);
|
|
}
|
|
Unlock(s->Cedar->TrafficLock);
|
|
|
|
h = s->Hub;
|
|
Lock(h->TrafficLock);
|
|
{
|
|
AddTraffic(h->Traffic, &t2);
|
|
}
|
|
Unlock(h->TrafficLock);
|
|
}
|
|
}
|
|
|
|
// A chance to establish an additional connection for client
|
|
void ClientAdditionalConnectChance(SESSION *s)
|
|
{
|
|
// Validate arguments
|
|
if (s == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
if (s->ServerMode)
|
|
{
|
|
// Do not connect additionally in the server mode
|
|
return;
|
|
}
|
|
if (s->Connection->Protocol != CONNECTION_TCP)
|
|
{
|
|
// Connect additionally only in the case of TCP protocol
|
|
return;
|
|
}
|
|
if (s->IsRUDPSession && s->EnableUdpRecovery == false)
|
|
{
|
|
// Do not connect additionally if the UDP recovery is disabled in the case of R-UDP session
|
|
return;
|
|
}
|
|
|
|
if (s->IsRUDPSession && (s->Connection->AdditionalConnectionFailedCounter > MAX_ADDITIONAL_CONNECTION_FAILED_COUNTER))
|
|
{
|
|
// Not to make a large amount of repeated connection retry within a certain time in the case of R-UDP session
|
|
return;
|
|
}
|
|
|
|
while (true)
|
|
{
|
|
if (s->Halt)
|
|
{
|
|
return;
|
|
}
|
|
// Consider whether there is a need to put an additional connection
|
|
// by examining the number of current connections and MaxConnection property
|
|
if (Count(s->Connection->CurrentNumConnection) < s->MaxConnection)
|
|
{
|
|
// Get the current time
|
|
UINT64 now = Tick64();
|
|
|
|
// Examine the NextConnectionTime, and if the time passed,
|
|
// attempt to make a connection
|
|
if (s->NextConnectionTime == 0 ||
|
|
s->ClientOption->AdditionalConnectionInterval == 0 ||
|
|
(s->NextConnectionTime <= now))
|
|
{
|
|
// Start the work to put an additional connection
|
|
s->NextConnectionTime = now + (UINT64)(s->ClientOption->AdditionalConnectionInterval * 1000);
|
|
SessionAdditionalConnect(s);
|
|
}
|
|
else
|
|
{
|
|
break;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
// Release the packet adapter
|
|
void FreePacketAdapter(PACKET_ADAPTER *pa)
|
|
{
|
|
// Validate arguments
|
|
if (pa == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
Free(pa);
|
|
}
|
|
|
|
// Create a new packet adapter
|
|
PACKET_ADAPTER *NewPacketAdapter(PA_INIT *init, PA_GETCANCEL *getcancel, PA_GETNEXTPACKET *getnext,
|
|
PA_PUTPACKET *put, PA_FREE *free)
|
|
{
|
|
PACKET_ADAPTER *pa;
|
|
// Validate arguments
|
|
if (init == NULL || getcancel == NULL || getnext == NULL || put == NULL || free == NULL)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
pa = ZeroMalloc(sizeof(PACKET_ADAPTER));
|
|
|
|
pa->Init = init;
|
|
pa->Free = free;
|
|
pa->GetCancel = getcancel;
|
|
pa->GetNextPacket = getnext;
|
|
pa->PutPacket = put;
|
|
|
|
return pa;
|
|
}
|
|
|
|
// Thread for putting an additional connection
|
|
void ClientAdditionalThread(THREAD *t, void *param)
|
|
{
|
|
SESSION *s;
|
|
CONNECTION *c;
|
|
// Validate arguments
|
|
if (t == NULL || param == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
s = (SESSION *)param;
|
|
|
|
s->LastTryAddConnectTime = Tick64();
|
|
|
|
c = s->Connection;
|
|
// Increment of connection counter
|
|
Inc(c->CurrentNumConnection);
|
|
LockList(c->ConnectingThreads);
|
|
{
|
|
// Add to processing thread
|
|
Add(c->ConnectingThreads, t);
|
|
AddRef(t->ref);
|
|
}
|
|
UnlockList(c->ConnectingThreads);
|
|
|
|
// Notify the completion of initialization
|
|
NoticeThreadInit(t);
|
|
|
|
Debug("Additional Connection #%u\n", Count(c->CurrentNumConnection));
|
|
|
|
// Put an additional connection
|
|
if (ClientAdditionalConnect(c, t) == false)
|
|
{
|
|
// Decrement the counter which is currently processing
|
|
Dec(c->CurrentNumConnection);
|
|
|
|
if (c->AdditionalConnectionFailedCounter == 0)
|
|
{
|
|
c->LastCounterResetTick = Tick64();
|
|
}
|
|
|
|
c->AdditionalConnectionFailedCounter++;
|
|
|
|
if ((c->LastCounterResetTick + (UINT64)ADDITIONAL_CONNECTION_COUNTER_RESET_INTERVAL) <= Tick64())
|
|
{
|
|
// Reset the number of failures periodically
|
|
c->AdditionalConnectionFailedCounter = 0;
|
|
c->LastCounterResetTick = Tick64();
|
|
}
|
|
}
|
|
else
|
|
{
|
|
s->LastTryAddConnectTime = Tick64();
|
|
c->AdditionalConnectionFailedCounter = 0;
|
|
c->LastCounterResetTick = Tick64();
|
|
}
|
|
|
|
// Remove from the processing thread
|
|
LockList(c->ConnectingThreads);
|
|
{
|
|
// Remove from the processing thread
|
|
if (Delete(c->ConnectingThreads, t))
|
|
{
|
|
ReleaseThread(t);
|
|
}
|
|
}
|
|
UnlockList(c->ConnectingThreads);
|
|
ReleaseSession(s);
|
|
}
|
|
|
|
// Put an additional connection from the client to the server
|
|
void SessionAdditionalConnect(SESSION *s)
|
|
{
|
|
THREAD *t;
|
|
// Validate arguments
|
|
if (s == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
// s->LastTryAddConnectTime = Tick64();
|
|
|
|
AddRef(s->ref);
|
|
t = NewThread(ClientAdditionalThread, (void *)s);
|
|
WaitThreadInit(t);
|
|
ReleaseThread(t);
|
|
}
|
|
|
|
// Connect the client session to the server
|
|
bool SessionConnect(SESSION *s)
|
|
{
|
|
CONNECTION *c;
|
|
bool ret = false;
|
|
// Validate arguments
|
|
if (s == NULL)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
s->ClientStatus = CLIENT_STATUS_CONNECTING;
|
|
|
|
Debug("SessionConnect() Started.\n");
|
|
|
|
// Initialize the session
|
|
Lock(s->lock);
|
|
{
|
|
s->Err = ERR_NO_ERROR;
|
|
if (s->Policy != NULL)
|
|
{
|
|
Free(s->Policy);
|
|
s->Policy = NULL;
|
|
}
|
|
}
|
|
Unlock(s->lock);
|
|
|
|
s->CancelConnect = false;
|
|
|
|
// Create a Client Connection
|
|
c = NewClientConnection(s);
|
|
s->Connection = c;
|
|
|
|
// Connect the client to the server
|
|
ret = ClientConnect(c);
|
|
s->Err = c->Err;
|
|
|
|
s->CancelConnect = false;
|
|
|
|
if (s->Cedar->Client != NULL)
|
|
{
|
|
if (s->Policy != NULL)
|
|
{
|
|
if (s->Policy->NoSavePassword)
|
|
{
|
|
s->Client_NoSavePassword = true;
|
|
|
|
if (s->Account != NULL)
|
|
{
|
|
Lock(s->Account->lock);
|
|
{
|
|
if (s->Account->ClientAuth != NULL)
|
|
{
|
|
if (s->Account->ClientAuth->AuthType == AUTHTYPE_PASSWORD ||
|
|
s->Account->ClientAuth->AuthType == AUTHTYPE_RADIUS)
|
|
{
|
|
Zero(s->Account->ClientAuth->HashedPassword, sizeof(s->Account->ClientAuth->HashedPassword));
|
|
Zero(s->Account->ClientAuth->PlainPassword, sizeof(s->Account->ClientAuth->PlainPassword));
|
|
}
|
|
}
|
|
}
|
|
Unlock(s->Account->lock);
|
|
|
|
CiSaveConfigurationFile(s->Cedar->Client);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (c->ClientConnectError_NoSavePassword)
|
|
{
|
|
s->Client_NoSavePassword = true;
|
|
}
|
|
|
|
// Release the client connection
|
|
s->Connection = NULL;
|
|
ReleaseConnection(c);
|
|
|
|
Lock(s->lock);
|
|
{
|
|
if (s->Policy != NULL)
|
|
{
|
|
Free(s->Policy);
|
|
s->Policy = NULL;
|
|
}
|
|
}
|
|
Unlock(s->lock);
|
|
|
|
return ret;
|
|
}
|
|
|
|
// Stop the session
|
|
void StopSession(SESSION *s)
|
|
{
|
|
StopSessionEx(s, false);
|
|
}
|
|
void StopSessionEx(SESSION *s, bool no_wait)
|
|
{
|
|
// Validate arguments
|
|
if (s == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
// Halting flag
|
|
s->UserCanceled = true;
|
|
s->CancelConnect = true;
|
|
s->Halt = true;
|
|
|
|
Debug("Stop Session %s\n", s->Name);
|
|
|
|
// Cancel
|
|
Cancel(s->Cancel1);
|
|
|
|
// Event
|
|
Set(s->HaltEvent);
|
|
|
|
if (s->ServerMode == false)
|
|
{
|
|
// Client mode
|
|
if (s->Connection)
|
|
{
|
|
StopConnection(s->Connection, no_wait);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// Server mode
|
|
if (s->Connection)
|
|
{
|
|
StopConnection(s->Connection, no_wait);
|
|
}
|
|
}
|
|
|
|
// Wait until the stop
|
|
if (no_wait == false)
|
|
{
|
|
while (true)
|
|
{
|
|
s->ForceStopFlag = true;
|
|
s->Halt = true;
|
|
if (WaitThread(s->Thread, 20))
|
|
{
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
s->ForceStopFlag = true;
|
|
s->Halt = true;
|
|
}
|
|
}
|
|
|
|
// Cleanup the session
|
|
void CleanupSession(SESSION *s)
|
|
{
|
|
// Validate arguments
|
|
if (s == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
// Release the delayed packet list
|
|
if (s->DelayedPacketList != NULL)
|
|
{
|
|
UINT i;
|
|
for (i = 0;i < LIST_NUM(s->DelayedPacketList);i++)
|
|
{
|
|
PKT *p = LIST_DATA(s->DelayedPacketList, i);
|
|
|
|
Free(p->PacketData);
|
|
FreePacket(p);
|
|
}
|
|
|
|
ReleaseList(s->DelayedPacketList);
|
|
}
|
|
|
|
// Release the client connection options
|
|
if (s->ClientOption != NULL)
|
|
{
|
|
Free(s->ClientOption);
|
|
}
|
|
|
|
// Release the client authentication data
|
|
if (s->ClientAuth != NULL)
|
|
{
|
|
if (s->ClientAuth->ClientX != NULL)
|
|
{
|
|
FreeX(s->ClientAuth->ClientX);
|
|
}
|
|
if (s->ClientAuth->ClientX != NULL)
|
|
{
|
|
FreeK(s->ClientAuth->ClientK);
|
|
}
|
|
Free(s->ClientAuth);
|
|
}
|
|
|
|
FreeTraffic(s->Traffic);
|
|
Free(s->Name);
|
|
|
|
if (s->Thread != NULL)
|
|
{
|
|
ReleaseThread(s->Thread);
|
|
}
|
|
|
|
DeleteLock(s->lock);
|
|
|
|
ReleaseEvent(s->HaltEvent);
|
|
|
|
if (s->Cancel1)
|
|
{
|
|
ReleaseCancel(s->Cancel1);
|
|
}
|
|
|
|
if (s->Cancel2)
|
|
{
|
|
ReleaseCancel(s->Cancel2);
|
|
}
|
|
|
|
if (s->Policy)
|
|
{
|
|
Free(s->Policy);
|
|
}
|
|
|
|
if (s->Connection)
|
|
{
|
|
ReleaseConnection(s->Connection);
|
|
}
|
|
|
|
Free(s->Username);
|
|
|
|
if (s->PacketAdapter)
|
|
{
|
|
FreePacketAdapter(s->PacketAdapter);
|
|
}
|
|
|
|
#ifdef OS_UNIX
|
|
if (s->NicDownOnDisconnect != NULL && *s->NicDownOnDisconnect)
|
|
{
|
|
UnixVLanSetState(s->ClientOption->DeviceName, false);
|
|
}
|
|
#endif
|
|
|
|
if (s->OldTraffic != NULL)
|
|
{
|
|
FreeTraffic(s->OldTraffic);
|
|
}
|
|
|
|
DeleteLock(s->TrafficLock);
|
|
|
|
if (s->CancelList != NULL)
|
|
{
|
|
ReleaseCancelList(s->CancelList);
|
|
}
|
|
|
|
if (s->Client_Message != NULL)
|
|
{
|
|
Free(s->Client_Message);
|
|
}
|
|
|
|
DeleteCounter(s->LoggingRecordCount);
|
|
|
|
Free(s);
|
|
}
|
|
|
|
// Release the session
|
|
void ReleaseSession(SESSION *s)
|
|
{
|
|
// Validate arguments
|
|
if (s == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
if (Release(s->ref) == 0)
|
|
{
|
|
CleanupSession(s);
|
|
}
|
|
}
|
|
|
|
// Display the total data transfer size of the session
|
|
void PrintSessionTotalDataSize(SESSION *s)
|
|
{
|
|
// Validate arguments
|
|
if (s == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
Debug(
|
|
"-- SESSION TOTAL PKT INFORMATION --\n\n"
|
|
" TotalSendSize: %I64u\n"
|
|
" TotalSendSizeReal: %I64u\n"
|
|
" TotalRecvSize: %I64u\n"
|
|
" TotalRecvSizeReal: %I64u\n"
|
|
" Compression Rate: %.2f%% (Send)\n"
|
|
" %.2f%% (Recv)\n",
|
|
s->TotalSendSize, s->TotalSendSizeReal,
|
|
s->TotalRecvSize, s->TotalRecvSizeReal,
|
|
(float)((double)s->TotalSendSizeReal / (double)s->TotalSendSize * 100.0f),
|
|
(float)((double)s->TotalRecvSizeReal / (double)s->TotalRecvSize * 100.0f)
|
|
);
|
|
|
|
}
|
|
|
|
// Client thread
|
|
void ClientThread(THREAD *t, void *param)
|
|
{
|
|
SESSION *s;
|
|
bool use_password_dlg;
|
|
bool no_save_password = false;
|
|
bool is_vpngate_connection = false;
|
|
CEDAR *cedar;
|
|
bool num_active_sessions_incremented = false;
|
|
// Validate arguments
|
|
if (t == NULL || param == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
Debug("ClientThread 0x%x Started.\n", t);
|
|
|
|
s = (SESSION *)param;
|
|
AddRef(s->ref);
|
|
s->Thread = t;
|
|
AddRef(t->ref);
|
|
|
|
if (s->LinkModeClient == false)
|
|
{
|
|
CiIncrementNumActiveSessions();
|
|
num_active_sessions_incremented = true;
|
|
}
|
|
|
|
NoticeThreadInit(t);
|
|
|
|
cedar = s->Cedar;
|
|
|
|
s->ClientStatus = CLIENT_STATUS_CONNECTING;
|
|
s->RetryFlag = true;
|
|
s->CurrentRetryCount = 0;
|
|
|
|
Notify(s, CLIENT_NOTIFY_ACCOUNT_CHANGED);
|
|
|
|
if (s->Cedar->Client != NULL)
|
|
{
|
|
no_save_password = s->Cedar->Client->DontSavePassword;
|
|
}
|
|
|
|
s->Win32HideConnectWindow = s->ClientOption->HideStatusWindow;
|
|
s->Win32HideNicInfoWindow = s->ClientOption->HideNicInfoWindow;
|
|
|
|
|
|
while (true)
|
|
{
|
|
Zero(&s->ServerIP_CacheForNextConnect, sizeof(IP));
|
|
|
|
if (s->Link != NULL && ((*s->Link->StopAllLinkFlag) || s->Link->Halting))
|
|
{
|
|
s->Err = ERR_USER_CANCEL;
|
|
break;
|
|
}
|
|
|
|
CLog(s->Cedar->Client, "LC_CONNECT_1", s->ClientOption->AccountName, s->CurrentRetryCount + 1);
|
|
if (s->LinkModeClient && s->Link != NULL)
|
|
{
|
|
HLog(s->Link->Hub, "LH_CONNECT_1", s->ClientOption->AccountName, s->CurrentRetryCount + 1);
|
|
}
|
|
|
|
Debug("Trying to Connect to Server... (%u / %u)\n", s->CurrentRetryCount + 0,
|
|
s->ClientOption->NumRetry);
|
|
|
|
// Initialize
|
|
// s->TotalRecvSize = s->TotalRecvSizeReal =
|
|
// s->TotalSendSize = s->TotalSendSizeReal = 0;
|
|
s->NextConnectionTime = 0;
|
|
|
|
// Connect
|
|
s->ClientStatus = CLIENT_STATUS_CONNECTING;
|
|
s->Halt = false;
|
|
SessionConnect(s);
|
|
if (s->UserCanceled)
|
|
{
|
|
s->Err = ERR_USER_CANCEL;
|
|
}
|
|
Debug("Disconnected. Err = %u : %S\n", s->Err, _E(s->Err));
|
|
|
|
PrintSessionTotalDataSize(s);
|
|
|
|
CLog(s->Cedar->Client, "LC_CONNECT_ERROR", s->ClientOption->AccountName,
|
|
GetUniErrorStr(s->Err), s->Err);
|
|
|
|
#ifdef OS_UNIX
|
|
if (s->NicDownOnDisconnect != NULL && *s->NicDownOnDisconnect)
|
|
{
|
|
UnixVLanSetState(s->ClientOption->DeviceName, false);
|
|
}
|
|
#endif
|
|
|
|
if (s->LinkModeClient && s->Link != NULL)
|
|
{
|
|
HLog(s->Link->Hub, "LH_CONNECT_ERROR", s->ClientOption->AccountName,
|
|
GetUniErrorStr(s->Err), s->Err);
|
|
}
|
|
|
|
s->ClientStatus = CLIENT_STATUS_RETRY;
|
|
|
|
if (s->Link != NULL)
|
|
{
|
|
((LINK *)s->Link)->LastError = s->Err;
|
|
}
|
|
|
|
if (s->Halt && (s->RetryFlag == false) || s->ForceStopFlag)
|
|
{
|
|
// Must be aborted
|
|
if (s->Err == ERR_DEVICE_DRIVER_ERROR)
|
|
{
|
|
#ifdef OS_WIN32
|
|
wchar_t tmp[MAX_SIZE];
|
|
if (s->Account != NULL && s->Cedar->Client != NULL)
|
|
{
|
|
UniFormat(tmp, sizeof(tmp), _UU("ERRDLG_DEVICE_ERROR"), s->ClientOption->DeviceName,
|
|
s->Err, _E(s->Err));
|
|
MsgBox(NULL, 0x10000 | 0x40000 | 0x200000 | 0x30, tmp);
|
|
}
|
|
#endif // OS_WIN32
|
|
}
|
|
break;
|
|
}
|
|
// Determine whether to display the password re-entry dialog
|
|
use_password_dlg = false;
|
|
|
|
if (s->Account != NULL && s->Cedar->Client != NULL)
|
|
{
|
|
#ifdef OS_WIN32
|
|
if (s->ClientAuth->AuthType == CLIENT_AUTHTYPE_PASSWORD || s->ClientAuth->AuthType == CLIENT_AUTHTYPE_PLAIN_PASSWORD)
|
|
{
|
|
if (s->Err == ERR_AUTH_FAILED || s->Err == ERR_PROXY_AUTH_FAILED)
|
|
{
|
|
use_password_dlg = true;
|
|
}
|
|
}
|
|
#endif // OS_WIN32
|
|
}
|
|
|
|
// Failed to connect or the connection is disconnected
|
|
// Wait for retry interval
|
|
if (use_password_dlg == false)
|
|
{
|
|
UINT retry_interval = s->RetryInterval;
|
|
|
|
if (s->LinkModeClient)
|
|
{
|
|
UINT current_num_links = Count(s->Cedar->CurrentActiveLinks);
|
|
UINT max_retry_interval = MAX(1000 * current_num_links, retry_interval);
|
|
|
|
retry_interval += retry_interval * MIN(s->CurrentRetryCount, 1000);
|
|
retry_interval = MIN(retry_interval, max_retry_interval);
|
|
|
|
// On the cascade client, adjust the retry_interval. (+/- 20%)
|
|
if (retry_interval >= 1000 && retry_interval <= (60 * 60 * 1000))
|
|
{
|
|
retry_interval = (retry_interval * 8 / 10) + (Rand32() % (retry_interval * 4 / 10));
|
|
}
|
|
}
|
|
|
|
if (s->Err == ERR_HUB_IS_BUSY || s->Err == ERR_LICENSE_ERROR ||
|
|
s->Err == ERR_HUB_STOPPING || s->Err == ERR_TOO_MANY_USER_SESSION)
|
|
{
|
|
retry_interval = RETRY_INTERVAL_SPECIAL;
|
|
}
|
|
|
|
if (s->CurrentRetryCount >= s->ClientOption->NumRetry)
|
|
{
|
|
// Retry count excess
|
|
|
|
#ifndef OS_WIN32
|
|
|
|
break;
|
|
|
|
#else // OS_WIN32
|
|
|
|
if (s->Win32HideConnectWindow == false &&
|
|
s->Cedar->Client != NULL && s->Account != NULL)
|
|
{
|
|
// Show a reconnection dialog
|
|
UI_CONNECTERROR_DLG p;
|
|
Zero(&p, sizeof(p));
|
|
UniStrCpy(p.AccountName, sizeof(p.AccountName), s->ClientOption->AccountName);
|
|
StrCpy(p.ServerName, sizeof(p.ServerName), s->ClientOption->Hostname);
|
|
p.Err = s->Err;
|
|
p.CurrentRetryCount = s->CurrentRetryCount + 1;
|
|
s->Halt = false;
|
|
p.RetryLimit = 0;
|
|
p.RetryIntervalSec = 0;
|
|
p.CancelEvent = s->HaltEvent;
|
|
p.HideWindow = s->Win32HideConnectWindow;
|
|
if (CncConnectErrorDlg(s, &p) == false)
|
|
{
|
|
// Abort
|
|
break;
|
|
}
|
|
else
|
|
{
|
|
s->Win32HideConnectWindow = p.HideWindow;
|
|
goto SKIP;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
break;
|
|
}
|
|
|
|
#endif
|
|
}
|
|
|
|
#ifndef OS_WIN32
|
|
|
|
// Simple wait
|
|
Wait(s->HaltEvent, retry_interval);
|
|
|
|
#else // OS_WIN32
|
|
|
|
if (s->Win32HideConnectWindow == false &&
|
|
s->Cedar->Client != NULL && s->Account != NULL)
|
|
{
|
|
// Show a reconnection dialog
|
|
UI_CONNECTERROR_DLG p;
|
|
Zero(&p, sizeof(p));
|
|
UniStrCpy(p.AccountName, sizeof(p.AccountName), s->ClientOption->AccountName);
|
|
StrCpy(p.ServerName, sizeof(p.ServerName), s->ClientOption->Hostname);
|
|
p.Err = s->Err;
|
|
p.CurrentRetryCount = s->CurrentRetryCount + 1;
|
|
p.RetryLimit = s->ClientOption->NumRetry;
|
|
p.RetryIntervalSec = retry_interval;
|
|
p.CancelEvent = s->HaltEvent;
|
|
s->Halt = false;
|
|
p.HideWindow = s->Win32HideConnectWindow;
|
|
if (CncConnectErrorDlg(s, &p) == false)
|
|
{
|
|
// Abort
|
|
break;
|
|
}
|
|
s->Win32HideConnectWindow = p.HideWindow;
|
|
}
|
|
else
|
|
{
|
|
// Simple wait
|
|
Wait(s->HaltEvent, s->RetryInterval);
|
|
}
|
|
|
|
#endif // OS_WIN32
|
|
}
|
|
else
|
|
{
|
|
#ifdef OS_WIN32
|
|
// Wait for re-entry the password
|
|
UI_PASSWORD_DLG p;
|
|
Zero(&p, sizeof(p));
|
|
if (s->Client_NoSavePassword == false)
|
|
{
|
|
p.ShowNoSavePassword = true;
|
|
}
|
|
p.NoSavePassword = no_save_password;
|
|
p.CancelEvent = s->HaltEvent;
|
|
if (s->Err == ERR_PROXY_AUTH_FAILED)
|
|
{
|
|
p.ProxyServer = true;
|
|
}
|
|
|
|
if (p.ProxyServer)
|
|
{
|
|
StrCpy(p.Username, sizeof(p.Username), s->ClientOption->ProxyUsername);
|
|
StrCpy(p.Password, sizeof(p.Password), s->ClientOption->ProxyPassword);
|
|
StrCpy(p.ServerName, sizeof(p.ServerName), s->ClientOption->ProxyName);
|
|
}
|
|
else
|
|
{
|
|
bool empty = false;
|
|
|
|
StrCpy(p.Username, sizeof(p.Username), s->ClientAuth->Username);
|
|
if (s->ClientAuth->AuthType == AUTHTYPE_RADIUS)
|
|
{
|
|
if (StrLen(s->ClientAuth->PlainPassword) == 0)
|
|
{
|
|
empty = true;
|
|
}
|
|
}
|
|
else if (s->ClientAuth->AuthType == AUTHTYPE_PASSWORD)
|
|
{
|
|
if (IsZero(s->ClientAuth->HashedPassword, sizeof(s->ClientAuth->HashedPassword)))
|
|
{
|
|
empty = true;
|
|
}
|
|
}
|
|
|
|
StrCpy(p.Password, sizeof(p.Password), empty ? "" : HIDDEN_PASSWORD);
|
|
StrCpy(p.ServerName, sizeof(p.ServerName), s->ClientOption->Hostname);
|
|
}
|
|
|
|
p.RetryIntervalSec = s->RetryInterval / 1000;
|
|
p.Type = s->ClientAuth->AuthType;
|
|
|
|
// Display the password re-entry dialog
|
|
if (CncPasswordDlg(s, &p) == false)
|
|
{
|
|
// Abort the connection
|
|
break;
|
|
}
|
|
else
|
|
{
|
|
// Overwrite the user name
|
|
if (p.ProxyServer)
|
|
{
|
|
// User name of the proxy
|
|
StrCpy(s->ClientOption->ProxyUsername, sizeof(s->ClientOption->ProxyUsername), p.Username);
|
|
}
|
|
else
|
|
{
|
|
// The user name for connecting to the server
|
|
StrCpy(s->ClientAuth->Username, sizeof(s->ClientAuth->Username), p.Username);
|
|
s->ClientAuth->AuthType = p.Type;
|
|
}
|
|
|
|
if (StrCmp(p.Password, HIDDEN_PASSWORD) != 0)
|
|
{
|
|
// Password is re-entered
|
|
if (p.ProxyServer)
|
|
{
|
|
// Password for the proxy server
|
|
StrCpy(s->ClientOption->ProxyPassword, sizeof(s->ClientOption->ProxyPassword), p.Password);
|
|
}
|
|
else
|
|
{
|
|
if (s->ClientAuth->AuthType == CLIENT_AUTHTYPE_PLAIN_PASSWORD)
|
|
{
|
|
// Plaintext password authentication
|
|
StrCpy(s->ClientAuth->PlainPassword, sizeof(s->ClientAuth->PlainPassword), p.Password);
|
|
}
|
|
else
|
|
{
|
|
// Encrypted password authentication
|
|
HashPassword(s->ClientAuth->HashedPassword, s->ClientAuth->Username, p.Password);
|
|
}
|
|
}
|
|
}
|
|
|
|
no_save_password = p.NoSavePassword;
|
|
|
|
if (s->Account != NULL && s->Cedar->Client != NULL)
|
|
{
|
|
s->Cedar->Client->DontSavePassword = no_save_password;
|
|
if (p.NoSavePassword == false)
|
|
{
|
|
// Update the account database of the client
|
|
if (p.ProxyServer == false)
|
|
{
|
|
// Update the Server connection information
|
|
ACCOUNT *a = s->Account;
|
|
Lock(a->lock);
|
|
{
|
|
CiFreeClientAuth(a->ClientAuth);
|
|
a->ClientAuth = CopyClientAuth(s->ClientAuth);
|
|
}
|
|
Unlock(a->lock);
|
|
CiSaveConfigurationFile(s->Cedar->Client);
|
|
}
|
|
else
|
|
{
|
|
// Update the proxy connection information
|
|
ACCOUNT *a = s->Account;
|
|
Lock(a->lock);
|
|
{
|
|
Copy(a->ClientOption, s->ClientOption, sizeof(CLIENT_OPTION));
|
|
}
|
|
Unlock(a->lock);
|
|
CiSaveConfigurationFile(s->Cedar->Client);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
#endif // OS_WIN32
|
|
}
|
|
|
|
SKIP:
|
|
// Increase the number of retries
|
|
if (s->ConnectSucceed == false)
|
|
{
|
|
s->CurrentRetryCount++;
|
|
}
|
|
|
|
if (s->ForceStopFlag)
|
|
{
|
|
break;
|
|
}
|
|
}
|
|
|
|
Debug("Session Halt.\n");
|
|
|
|
s->ClientStatus = CLIENT_STATUS_IDLE;
|
|
|
|
// Regard as that the session is ended here
|
|
if (s->Account != NULL)
|
|
{
|
|
s->Account->ClientSession = NULL;
|
|
ReleaseSession(s);
|
|
}
|
|
|
|
Notify(s, CLIENT_NOTIFY_ACCOUNT_CHANGED);
|
|
|
|
|
|
ReleaseSession(s);
|
|
|
|
if (num_active_sessions_incremented)
|
|
{
|
|
CiDecrementNumActiveSessions();
|
|
}
|
|
}
|
|
|
|
// Name comparison of sessions
|
|
int CompareSession(void *p1, void *p2)
|
|
{
|
|
SESSION *s1, *s2;
|
|
if (p1 == NULL || p2 == NULL)
|
|
{
|
|
return 0;
|
|
}
|
|
s1 = *(SESSION **)p1;
|
|
s2 = *(SESSION **)p2;
|
|
if (s1 == NULL || s2 == NULL)
|
|
{
|
|
return 0;
|
|
}
|
|
return StrCmpi(s1->Name, s2->Name);
|
|
}
|
|
|
|
// Create an RPC session
|
|
SESSION *NewRpcSession(CEDAR *cedar, CLIENT_OPTION *option)
|
|
{
|
|
return NewRpcSessionEx(cedar, option, NULL, NULL);
|
|
}
|
|
SESSION *NewRpcSessionEx(CEDAR *cedar, CLIENT_OPTION *option, UINT *err, char *client_str)
|
|
{
|
|
return NewRpcSessionEx2(cedar, option, err, client_str, NULL);
|
|
}
|
|
SESSION *NewRpcSessionEx2(CEDAR *cedar, CLIENT_OPTION *option, UINT *err, char *client_str, void *hWnd)
|
|
{
|
|
SESSION *s;
|
|
CONNECTION *c;
|
|
SOCK *sock;
|
|
// Validate arguments
|
|
if (cedar == NULL || option == NULL)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
s = ZeroMalloc(sizeof(SESSION));
|
|
|
|
s->LoggingRecordCount = NewCounter();
|
|
s->lock = NewLock();
|
|
s->ref = NewRef();
|
|
s->Cedar = cedar;
|
|
s->ServerMode = false;
|
|
s->Name = CopyStr("CLIENT_RPC_SESSION");
|
|
s->CreatedTime = s->LastCommTime = Tick64();
|
|
s->Traffic = NewTraffic();
|
|
s->HaltEvent = NewEvent();
|
|
s->TrafficLock = NewLock();
|
|
s->Cancel1 = NewCancel();
|
|
|
|
// Copy the client connection options
|
|
s->ClientOption = Malloc(sizeof(CLIENT_OPTION));
|
|
Copy(s->ClientOption, option, sizeof(CLIENT_OPTION));
|
|
|
|
s->MaxConnection = option->MaxConnection;
|
|
s->UseEncrypt = option->UseEncrypt;
|
|
s->UseCompress = option->UseCompress;
|
|
|
|
// Create a connection
|
|
c = s->Connection = NewClientConnectionEx(s, client_str, cedar->Version, cedar->Build);
|
|
c->hWndForUI = hWnd;
|
|
|
|
// Connect to the server
|
|
sock = ClientConnectToServer(c);
|
|
if (sock == NULL)
|
|
{
|
|
// Connection failure
|
|
if (err != NULL)
|
|
{
|
|
*err = c->Err;
|
|
}
|
|
ReleaseSession(s);
|
|
return NULL;
|
|
}
|
|
|
|
// Send a signature
|
|
if (ClientUploadSignature(sock) == false)
|
|
{
|
|
// Failure
|
|
if (err != NULL)
|
|
{
|
|
*err = c->Err;
|
|
}
|
|
ReleaseSession(s);
|
|
return NULL;
|
|
}
|
|
|
|
// Receive a Hello packet
|
|
if (ClientDownloadHello(c, sock) == false)
|
|
{
|
|
// Failure
|
|
if (err != NULL)
|
|
{
|
|
*err = c->Err;
|
|
}
|
|
ReleaseSession(s);
|
|
return NULL;
|
|
}
|
|
|
|
return s;
|
|
}
|
|
|
|
// Create a client session
|
|
SESSION *NewClientSessionEx(CEDAR *cedar, CLIENT_OPTION *option, CLIENT_AUTH *auth, PACKET_ADAPTER *pa, ACCOUNT *account, bool *NicDownOnDisconnect)
|
|
{
|
|
SESSION *s;
|
|
THREAD *t;
|
|
// Validate arguments
|
|
if (cedar == NULL || option == NULL || auth == NULL || pa == NULL ||
|
|
(auth->AuthType == CLIENT_AUTHTYPE_SECURE && auth->SecureSignProc == NULL))
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
// Initialize the SESSION object
|
|
s = ZeroMalloc(sizeof(SESSION));
|
|
|
|
s->LoggingRecordCount = NewCounter();
|
|
|
|
s->lock = NewLock();
|
|
s->ref = NewRef();
|
|
s->Cedar = cedar;
|
|
s->ServerMode = false;
|
|
s->Name = CopyStr("CLIENT_SESSION");
|
|
s->CreatedTime = s->LastCommTime = Tick64();
|
|
s->Traffic = NewTraffic();
|
|
s->HaltEvent = NewEvent();
|
|
s->PacketAdapter = pa;
|
|
s->TrafficLock = NewLock();
|
|
s->OldTraffic = NewTraffic();
|
|
s->Cancel1 = NewCancel();
|
|
s->CancelList = NewCancelList();
|
|
|
|
// Copy the client connection options
|
|
s->ClientOption = Malloc(sizeof(CLIENT_OPTION));
|
|
Copy(s->ClientOption, option, sizeof(CLIENT_OPTION));
|
|
|
|
if (GetGlobalServerFlag(GSF_DISABLE_SESSION_RECONNECT))
|
|
{
|
|
s->ClientOption->DisableQoS = true;
|
|
s->ClientOption->MaxConnection = 1;
|
|
s->ClientOption->HalfConnection = false;
|
|
}
|
|
|
|
s->MaxConnection = option->MaxConnection;
|
|
s->UseEncrypt = option->UseEncrypt;
|
|
s->UseCompress = option->UseCompress;
|
|
|
|
// Set the retry interval
|
|
s->RetryInterval = MAKESURE(option->RetryInterval, 0, 4000000) * 1000;
|
|
s->RetryInterval = MAKESURE(s->RetryInterval, MIN_RETRY_INTERVAL, MAX_RETRY_INTERVAL);
|
|
|
|
// Interval for additional connection creation is at least 1 second
|
|
s->ClientOption->AdditionalConnectionInterval = MAX(s->ClientOption->AdditionalConnectionInterval, 1);
|
|
|
|
// Hold whether the virtual LAN card is used in client mode
|
|
s->ClientModeAndUseVLan = (StrLen(s->ClientOption->DeviceName) == 0) ? false : true;
|
|
|
|
if (s->ClientOption->NoRoutingTracking)
|
|
{
|
|
s->ClientModeAndUseVLan = false;
|
|
}
|
|
|
|
if (pa->Id == PACKET_ADAPTER_ID_VLAN_WIN32)
|
|
{
|
|
s->IsVPNClientAndVLAN_Win32 = true;
|
|
}
|
|
|
|
if (StrLen(option->DeviceName) == 0)
|
|
{
|
|
// NAT mode
|
|
s->ClientModeAndUseVLan = false;
|
|
s->VirtualHost = true;
|
|
}
|
|
|
|
if (OS_IS_WINDOWS_9X(GetOsInfo()->OsType))
|
|
{
|
|
// Prohibit the half-duplex mode in the case of Win9x
|
|
s->ClientOption->HalfConnection = false;
|
|
}
|
|
|
|
// Copy the client authentication data
|
|
s->ClientAuth = Malloc(sizeof(CLIENT_AUTH));
|
|
Copy(s->ClientAuth, auth, sizeof(CLIENT_AUTH));
|
|
|
|
// Clone the certificate and the private key
|
|
if (s->ClientAuth->ClientX != NULL)
|
|
{
|
|
s->ClientAuth->ClientX = CloneX(s->ClientAuth->ClientX);
|
|
}
|
|
if (s->ClientAuth->ClientK != NULL)
|
|
{
|
|
s->ClientAuth->ClientK = CloneK(s->ClientAuth->ClientK);
|
|
}
|
|
|
|
if (StrCmpi(s->ClientOption->DeviceName, LINK_DEVICE_NAME) == 0)
|
|
{
|
|
// Link client mode
|
|
s->LinkModeClient = true;
|
|
s->Link = (LINK *)s->PacketAdapter->Param;
|
|
}
|
|
|
|
if (StrCmpi(s->ClientOption->DeviceName, SNAT_DEVICE_NAME) == 0)
|
|
{
|
|
// SecureNAT mode
|
|
s->SecureNATMode = true;
|
|
}
|
|
|
|
if (StrCmpi(s->ClientOption->DeviceName, BRIDGE_DEVICE_NAME) == 0)
|
|
{
|
|
// Bridge mode
|
|
s->BridgeMode = true;
|
|
}
|
|
|
|
if (s->VirtualHost)
|
|
{
|
|
VH *v = (VH *)s->PacketAdapter->Param;
|
|
|
|
// Add the session object to VH
|
|
v->Session = s;
|
|
AddRef(s->ref);
|
|
}
|
|
|
|
s->Account = account;
|
|
|
|
if (s->ClientAuth->AuthType == CLIENT_AUTHTYPE_SECURE)
|
|
{
|
|
// Do not retry in the case of a smart card authentication
|
|
s->ClientOption->NumRetry = 0;
|
|
}
|
|
|
|
s->NicDownOnDisconnect = NicDownOnDisconnect;
|
|
|
|
// Create a client thread
|
|
t = NewThread(ClientThread, (void *)s);
|
|
WaitThreadInit(t);
|
|
ReleaseThread(t);
|
|
|
|
return s;
|
|
}
|
|
SESSION *NewClientSession(CEDAR *cedar, CLIENT_OPTION *option, CLIENT_AUTH *auth, PACKET_ADAPTER *pa, bool *NicDownOnDisconnect)
|
|
{
|
|
return NewClientSessionEx(cedar, option, auth, pa, NULL, NicDownOnDisconnect);
|
|
}
|
|
|
|
// Get the session from the 32bit session key
|
|
SESSION *GetSessionFromKey32(CEDAR *cedar, UINT key32)
|
|
{
|
|
HUB *h;
|
|
UINT i, j;
|
|
// Validate arguments
|
|
if (cedar == NULL)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
LockList(cedar->HubList);
|
|
{
|
|
for (i = 0;i < LIST_NUM(cedar->HubList);i++)
|
|
{
|
|
h = LIST_DATA(cedar->HubList, i);
|
|
LockList(h->SessionList);
|
|
{
|
|
for (j = 0;j < LIST_NUM(h->SessionList);j++)
|
|
{
|
|
SESSION *s = LIST_DATA(h->SessionList, j);
|
|
Lock(s->lock);
|
|
{
|
|
if (s->SessionKey32 == key32)
|
|
{
|
|
// Session found
|
|
AddRef(s->ref);
|
|
|
|
// Unlock
|
|
Unlock(s->lock);
|
|
UnlockList(h->SessionList);
|
|
UnlockList(cedar->HubList);
|
|
return s;
|
|
}
|
|
}
|
|
Unlock(s->lock);
|
|
}
|
|
}
|
|
UnlockList(h->SessionList);
|
|
}
|
|
}
|
|
UnlockList(cedar->HubList);
|
|
|
|
return NULL;
|
|
}
|
|
|
|
// Get the session from the session key
|
|
SESSION *GetSessionFromKey(CEDAR *cedar, UCHAR *session_key)
|
|
{
|
|
HUB *h;
|
|
UINT i, j;
|
|
// Validate arguments
|
|
if (cedar == NULL || session_key == NULL)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
LockList(cedar->HubList);
|
|
{
|
|
for (i = 0;i < LIST_NUM(cedar->HubList);i++)
|
|
{
|
|
h = LIST_DATA(cedar->HubList, i);
|
|
LockList(h->SessionList);
|
|
{
|
|
for (j = 0;j < LIST_NUM(h->SessionList);j++)
|
|
{
|
|
SESSION *s = LIST_DATA(h->SessionList, j);
|
|
Lock(s->lock);
|
|
{
|
|
if (Cmp(s->SessionKey, session_key, SHA1_SIZE) == 0)
|
|
{
|
|
// Session found
|
|
AddRef(s->ref);
|
|
|
|
// Unlock
|
|
Unlock(s->lock);
|
|
UnlockList(h->SessionList);
|
|
UnlockList(cedar->HubList);
|
|
return s;
|
|
}
|
|
}
|
|
Unlock(s->lock);
|
|
}
|
|
}
|
|
UnlockList(h->SessionList);
|
|
}
|
|
}
|
|
UnlockList(cedar->HubList);
|
|
|
|
return NULL;
|
|
}
|
|
|
|
// Create a new session key
|
|
void NewSessionKey(CEDAR *cedar, UCHAR *session_key, UINT *session_key_32)
|
|
{
|
|
// Validate arguments
|
|
if (cedar == NULL || session_key == NULL || session_key_32 == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
Rand(session_key, SHA1_SIZE);
|
|
*session_key_32 = Rand32();
|
|
}
|
|
|
|
bool if_init(SESSION *s);
|
|
CANCEL *if_getcancel(SESSION *s);
|
|
UINT if_getnext(SESSION *s, void **data);
|
|
bool if_putpacket(SESSION *s, void *data, UINT size);
|
|
void if_free(SESSION *s);
|
|
|
|
|
|
// Create a server session
|
|
SESSION *NewServerSession(CEDAR *cedar, CONNECTION *c, HUB *h, char *username, POLICY *policy)
|
|
{
|
|
return NewServerSessionEx(cedar, c, h, username, policy, false);
|
|
}
|
|
SESSION *NewServerSessionEx(CEDAR *cedar, CONNECTION *c, HUB *h, char *username, POLICY *policy, bool inproc_mode)
|
|
{
|
|
SESSION *s;
|
|
char name[MAX_SIZE];
|
|
char hub_name_upper[MAX_SIZE];
|
|
char user_name_upper[MAX_USERNAME_LEN + 1];
|
|
// Validate arguments
|
|
if (cedar == NULL || c == NULL || h == NULL || username == NULL || policy == NULL)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
// Initialize the SESSION object
|
|
s = ZeroMalloc(sizeof(SESSION));
|
|
|
|
s->LoggingRecordCount = NewCounter();
|
|
s->lock = NewLock();
|
|
s->ref = NewRef();
|
|
s->Cedar = cedar;
|
|
s->ServerMode = true;
|
|
s->CreatedTime = s->LastCommTime = Tick64();
|
|
s->Traffic = NewTraffic();
|
|
s->HaltEvent = NewEvent();
|
|
s->Cancel1 = NewCancel();
|
|
s->CancelList = NewCancelList();
|
|
s->Thread = c->Thread;
|
|
s->TrafficLock = NewLock();
|
|
s->OldTraffic = NewTraffic();
|
|
s->QoS = GetServerCapsBool(cedar->Server, "b_support_qos");
|
|
AddRef(s->Thread->ref);
|
|
s->Hub = h;
|
|
s->ClientStatus = CLIENT_STATUS_ESTABLISHED;
|
|
|
|
// Delayed packet list
|
|
s->DelayedPacketList = NewList(NULL);
|
|
|
|
// Packet adapter for the HUB
|
|
s->PacketAdapter = GetHubPacketAdapter();
|
|
|
|
s->Connection = c;
|
|
AddRef(c->ref);
|
|
|
|
// Determine the new session name
|
|
StrCpy(hub_name_upper, sizeof(hub_name_upper), h->Name);
|
|
StrUpper(hub_name_upper);
|
|
StrCpy(user_name_upper, sizeof(user_name_upper), username);
|
|
StrUpper(user_name_upper);
|
|
|
|
if ((StrCmpi(username, ADMINISTRATOR_USERNAME) != 0) && (StrCmpi(username, BRIDGE_USER_NAME) != 0) || (cedar->Server == NULL || cedar->Server->ServerType == SERVER_TYPE_STANDALONE))
|
|
{
|
|
if (IsEmptyStr(c->InProcPrefix))
|
|
{
|
|
Format(name, sizeof(name), "SID-%s-%u", user_name_upper, Inc(h->SessionCounter));
|
|
}
|
|
else
|
|
{
|
|
Format(name, sizeof(name), "SID-%s-[%s]-%u", user_name_upper, c->InProcPrefix, Inc(h->SessionCounter));
|
|
}
|
|
|
|
if (h->IsVgsHub || h->IsVgsSuperRelayHub)
|
|
{
|
|
UCHAR rand[5];
|
|
char tmp[32];
|
|
|
|
Rand(rand, sizeof(rand));
|
|
|
|
BinToStr(tmp, sizeof(tmp), rand, sizeof(rand));
|
|
|
|
StrCat(name, sizeof(name), "-");
|
|
StrCat(name, sizeof(name), tmp);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
UCHAR rand[SHA1_SIZE];
|
|
char tmp[MAX_SIZE];
|
|
Rand(rand, sizeof(rand));
|
|
BinToStr(tmp, sizeof(tmp), rand, 3);
|
|
|
|
if (StrCmpi(username, BRIDGE_USER_NAME) != 0)
|
|
{
|
|
Format(name, sizeof(name), "SID-%s-%s", user_name_upper,
|
|
tmp);
|
|
}
|
|
else
|
|
{
|
|
char pc_name[MAX_SIZE];
|
|
TOKEN_LIST *t;
|
|
|
|
GetMachineName(tmp, sizeof(tmp));
|
|
t = ParseToken(tmp, ".");
|
|
if (t->NumTokens >= 1)
|
|
{
|
|
StrCpy(pc_name, sizeof(pc_name), t->Token[0]);
|
|
}
|
|
else
|
|
{
|
|
StrCpy(pc_name, sizeof(pc_name), "pc");
|
|
}
|
|
FreeToken(t);
|
|
|
|
StrUpper(pc_name);
|
|
|
|
Format(name, sizeof(name), "SID-%s-%s-%u", user_name_upper, pc_name,
|
|
Inc(h->SessionCounter));
|
|
}
|
|
}
|
|
|
|
s->Name = CopyStr(name);
|
|
s->Policy = policy;
|
|
s->InProcMode = inproc_mode;
|
|
|
|
// Add a SESSION to the HUB
|
|
AddSession(h, s);
|
|
|
|
// Create a key
|
|
NewSessionKey(cedar, s->SessionKey, &s->SessionKey32);
|
|
|
|
// Generate a MAC address for IPC
|
|
if (s->InProcMode)
|
|
{
|
|
char tmp[MAX_SIZE];
|
|
char machine[MAX_SIZE];
|
|
UCHAR hash[SHA1_SIZE];
|
|
|
|
GetMachineName(machine, sizeof(machine));
|
|
|
|
Format(tmp, sizeof(tmp), "%s@%s@%u", machine, h->Name, s->UniqueId);
|
|
|
|
StrUpper(tmp);
|
|
Trim(tmp);
|
|
|
|
Hash(hash, tmp, StrLen(tmp), true);
|
|
|
|
s->IpcMacAddress[0] = 0xCA;
|
|
s->IpcMacAddress[1] = hash[1];
|
|
s->IpcMacAddress[2] = hash[2];
|
|
s->IpcMacAddress[3] = hash[3];
|
|
s->IpcMacAddress[4] = hash[4];
|
|
s->IpcMacAddress[5] = hash[5];
|
|
|
|
MacToStr(tmp, sizeof(tmp), s->IpcMacAddress);
|
|
Debug("MAC Address for IPC: %s\n", tmp);
|
|
}
|
|
|
|
return s;
|
|
}
|
|
|
|
// Check whether the specified MAC address is IPC address
|
|
bool IsIpcMacAddress(UCHAR *mac)
|
|
{
|
|
// Validate arguments
|
|
if (mac == NULL)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
if (mac[0] == 0xCA)
|
|
{
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
// Display the session key for debugging
|
|
void DebugPrintSessionKey(UCHAR *session_key)
|
|
{
|
|
char tmp[MAX_SIZE];
|
|
// Validate arguments
|
|
if (session_key == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
Bit160ToStr(tmp, session_key);
|
|
Debug("SessionKey: %s\n", tmp);
|
|
}
|
|
|
|
// Display the status on the client
|
|
void PrintStatus(SESSION *s, wchar_t *str)
|
|
{
|
|
// Validate arguments
|
|
if (s == NULL || str == NULL || s->Account == NULL || s->Cedar->Client == NULL
|
|
|| s->Account->StatusPrinter == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
// Inform the status to the callback function
|
|
s->Account->StatusPrinter(s, str);
|
|
}
|
|
|
|
// Create a cancellation list
|
|
LIST *NewCancelList()
|
|
{
|
|
return NewList(NULL);
|
|
}
|
|
|
|
// Add a Cancel to the cancellation list
|
|
void AddCancelList(LIST *o, CANCEL *c)
|
|
{
|
|
UINT i;
|
|
// Validate arguments
|
|
if (o == NULL || c == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
for (i = 0;i < LIST_NUM(o);i++)
|
|
{
|
|
CANCEL *t = LIST_DATA(o, i);
|
|
if (t == c)
|
|
{
|
|
return;
|
|
}
|
|
}
|
|
|
|
AddRef(c->ref);
|
|
Add(o, c);
|
|
}
|
|
|
|
// Issue all cancellations in the cancellation list
|
|
void CancelList(LIST *o)
|
|
{
|
|
UINT i;
|
|
// Validate arguments
|
|
if (o == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
for (i = 0;i < LIST_NUM(o);i++)
|
|
{
|
|
CANCEL *c = LIST_DATA(o, i);
|
|
Cancel(c);
|
|
ReleaseCancel(c);
|
|
}
|
|
|
|
DeleteAll(o);
|
|
}
|
|
|
|
// Release the cancellation list
|
|
void ReleaseCancelList(LIST *o)
|
|
{
|
|
UINT i;
|
|
// Validate arguments
|
|
if (o == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
for (i = 0;i < LIST_NUM(o);i++)
|
|
{
|
|
CANCEL *c = LIST_DATA(o, i);
|
|
ReleaseCancel(c);
|
|
}
|
|
|
|
ReleaseList(o);
|
|
}
|
|
|
|
// Notify to the client
|
|
void Notify(SESSION *s, UINT code)
|
|
{
|
|
// Validate arguments
|
|
if (s == NULL || s->Account == NULL || s->Cedar->Client == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
CiNotify(s->Cedar->Client);
|
|
}
|
|
|
|
|