ns_turn_server.c 164 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451345234533454345534563457345834593460346134623463346434653466346734683469347034713472347334743475347634773478347934803481348234833484348534863487348834893490349134923493349434953496349734983499350035013502350335043505350635073508350935103511351235133514351535163517351835193520352135223523352435253526352735283529353035313532353335343535353635373538353935403541354235433544354535463547354835493550355135523553355435553556355735583559356035613562356335643565356635673568356935703571357235733574357535763577357835793580358135823583358435853586358735883589359035913592359335943595359635973598359936003601360236033604360536063607360836093610361136123613361436153616361736183619362036213622362336243625362636273628362936303631363236333634363536363637363836393640364136423643364436453646364736483649365036513652365336543655365636573658365936603661366236633664366536663667366836693670367136723673367436753676367736783679368036813682368336843685368636873688368936903691369236933694369536963697369836993700370137023703370437053706370737083709371037113712371337143715371637173718371937203721372237233724372537263727372837293730373137323733373437353736373737383739374037413742374337443745374637473748374937503751375237533754375537563757375837593760376137623763376437653766376737683769377037713772377337743775377637773778377937803781378237833784378537863787378837893790379137923793379437953796379737983799380038013802380338043805380638073808380938103811381238133814381538163817381838193820382138223823382438253826382738283829383038313832383338343835383638373838383938403841384238433844384538463847384838493850385138523853385438553856385738583859386038613862386338643865386638673868386938703871387238733874387538763877387838793880388138823883388438853886388738883889389038913892389338943895389638973898389939003901390239033904390539063907390839093910391139123913391439153916391739183919392039213922392339243925392639273928392939303931393239333934393539363937393839393940394139423943394439453946394739483949395039513952395339543955395639573958395939603961396239633964396539663967396839693970397139723973397439753976397739783979398039813982398339843985398639873988398939903991399239933994399539963997399839994000400140024003400440054006400740084009401040114012401340144015401640174018401940204021402240234024402540264027402840294030403140324033403440354036403740384039404040414042404340444045404640474048404940504051405240534054405540564057405840594060406140624063406440654066406740684069407040714072407340744075407640774078407940804081408240834084408540864087408840894090409140924093409440954096409740984099410041014102410341044105410641074108410941104111411241134114411541164117411841194120412141224123412441254126412741284129413041314132413341344135413641374138413941404141414241434144414541464147414841494150415141524153415441554156415741584159416041614162416341644165416641674168416941704171417241734174417541764177417841794180418141824183418441854186418741884189419041914192419341944195419641974198419942004201420242034204420542064207420842094210421142124213421442154216421742184219422042214222422342244225422642274228422942304231423242334234423542364237423842394240424142424243424442454246424742484249425042514252425342544255425642574258425942604261426242634264426542664267426842694270427142724273427442754276427742784279428042814282428342844285428642874288428942904291429242934294429542964297429842994300430143024303430443054306430743084309431043114312431343144315431643174318431943204321432243234324432543264327432843294330433143324333433443354336433743384339434043414342434343444345434643474348434943504351435243534354435543564357435843594360436143624363436443654366436743684369437043714372437343744375437643774378437943804381438243834384438543864387438843894390439143924393439443954396439743984399440044014402440344044405440644074408440944104411441244134414441544164417441844194420442144224423442444254426442744284429443044314432443344344435443644374438443944404441444244434444444544464447444844494450445144524453445444554456445744584459446044614462446344644465446644674468446944704471447244734474447544764477447844794480448144824483448444854486448744884489449044914492449344944495449644974498449945004501450245034504450545064507450845094510451145124513451445154516451745184519452045214522452345244525452645274528452945304531453245334534453545364537453845394540454145424543454445454546454745484549455045514552455345544555455645574558455945604561456245634564456545664567456845694570457145724573457445754576457745784579458045814582458345844585458645874588458945904591459245934594459545964597459845994600460146024603460446054606460746084609461046114612461346144615461646174618461946204621462246234624462546264627462846294630463146324633463446354636463746384639464046414642464346444645464646474648464946504651465246534654465546564657465846594660466146624663466446654666466746684669467046714672467346744675467646774678467946804681468246834684468546864687468846894690469146924693469446954696469746984699470047014702470347044705470647074708470947104711471247134714471547164717471847194720472147224723472447254726472747284729473047314732473347344735473647374738473947404741474247434744474547464747474847494750475147524753475447554756475747584759476047614762476347644765476647674768476947704771477247734774477547764777477847794780478147824783478447854786478747884789479047914792479347944795479647974798479948004801480248034804480548064807480848094810481148124813481448154816481748184819482048214822482348244825482648274828482948304831483248334834483548364837483848394840484148424843484448454846484748484849485048514852485348544855485648574858485948604861486248634864486548664867486848694870487148724873487448754876487748784879488048814882488348844885488648874888488948904891489248934894489548964897489848994900490149024903
  1. /*
  2. * Copyright (C) 2011, 2012, 2013 Citrix Systems
  3. *
  4. * All rights reserved.
  5. *
  6. * Redistribution and use in source and binary forms, with or without
  7. * modification, are permitted provided that the following conditions
  8. * are met:
  9. * 1. Redistributions of source code must retain the above copyright
  10. * notice, this list of conditions and the following disclaimer.
  11. * 2. Redistributions in binary form must reproduce the above copyright
  12. * notice, this list of conditions and the following disclaimer in the
  13. * documentation and/or other materials provided with the distribution.
  14. * 3. Neither the name of the project nor the names of its contributors
  15. * may be used to endorse or promote products derived from this software
  16. * without specific prior written permission.
  17. *
  18. * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
  19. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  20. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  21. * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
  22. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  23. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  24. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  25. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  26. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  27. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  28. * SUCH DAMAGE.
  29. */
  30. #include "ns_turn_server.h"
  31. #include "../apps/relay/ns_ioalib_impl.h"
  32. #include "ns_turn_allocation.h"
  33. #include "ns_turn_ioalib.h"
  34. #include "ns_turn_utils.h"
  35. ///////////////////////////////////////////
  36. #define FUNCSTART \
  37. if (server && eve(server->verbose)) \
  38. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s:%d:start\n", __FUNCTION__, __LINE__)
  39. #define FUNCEND \
  40. if (server && eve(server->verbose)) \
  41. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s:%d:end\n", __FUNCTION__, __LINE__)
  42. ////////////////////////////////////////////////
  43. static inline int get_family(int stun_family, ioa_engine_handle e, ioa_socket_handle client_socket) {
  44. switch (stun_family) {
  45. case STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_IPV4:
  46. return AF_INET;
  47. break;
  48. case STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_IPV6:
  49. return AF_INET6;
  50. break;
  51. case STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_DEFAULT:
  52. if (e->default_relays && get_ioa_socket_address_family(client_socket) == AF_INET6)
  53. return AF_INET6;
  54. else
  55. return AF_INET;
  56. default:
  57. return AF_INET;
  58. };
  59. }
  60. ////////////////////////////////////////////////
  61. const char *get_version(turn_turnserver *server) {
  62. if (server && !*server->no_software_attribute) {
  63. return (const char *)TURN_SOFTWARE;
  64. } else {
  65. return (const char *)"None";
  66. }
  67. }
  68. #define MAX_NUMBER_OF_UNKNOWN_ATTRS (128)
  69. int TURN_MAX_ALLOCATE_TIMEOUT = 60;
  70. int TURN_MAX_ALLOCATE_TIMEOUT_STUN_ONLY = 3;
  71. static inline void log_method(ts_ur_super_session *ss, const char *method, int err_code, const uint8_t *reason) {
  72. if (ss) {
  73. if (!method)
  74. method = "unknown";
  75. if (!err_code) {
  76. if (ss->origin[0]) {
  77. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO,
  78. "session %018llu: origin <%s> realm <%s> user <%s>: incoming packet %s processed, success\n",
  79. (unsigned long long)(ss->id), (const char *)(ss->origin), (const char *)(ss->realm_options.name),
  80. (const char *)(ss->username), method);
  81. } else {
  82. TURN_LOG_FUNC(
  83. TURN_LOG_LEVEL_INFO, "session %018llu: realm <%s> user <%s>: incoming packet %s processed, success\n",
  84. (unsigned long long)(ss->id), (const char *)(ss->realm_options.name), (const char *)(ss->username), method);
  85. }
  86. } else {
  87. if (!reason)
  88. reason = get_default_reason(err_code);
  89. if (ss->origin[0]) {
  90. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO,
  91. "session %018llu: origin <%s> realm <%s> user <%s>: incoming packet %s processed, error %d: %s\n",
  92. (unsigned long long)(ss->id), (const char *)(ss->origin), (const char *)(ss->realm_options.name),
  93. (const char *)(ss->username), method, err_code, reason);
  94. } else {
  95. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO,
  96. "session %018llu: realm <%s> user <%s>: incoming packet %s processed, error %d: %s\n",
  97. (unsigned long long)(ss->id), (const char *)(ss->realm_options.name),
  98. (const char *)(ss->username), method, err_code, reason);
  99. }
  100. }
  101. }
  102. }
  103. ///////////////////////////////////////////
  104. static int attach_socket_to_session(turn_turnserver *server, ioa_socket_handle s, ts_ur_super_session *ss);
  105. static int check_stun_auth(turn_turnserver *server, ts_ur_super_session *ss, stun_tid *tid, int *resp_constructed,
  106. int *err_code, const uint8_t **reason, ioa_net_data *in_buffer,
  107. ioa_network_buffer_handle nbh, uint16_t method, int *message_integrity, int *postpone_reply,
  108. int can_resume);
  109. static int create_relay_connection(turn_turnserver *server, ts_ur_super_session *ss, uint32_t lifetime,
  110. int address_family, uint8_t transport, int even_port, uint64_t in_reservation_token,
  111. uint64_t *out_reservation_token, int *err_code, const uint8_t **reason,
  112. accept_cb acb);
  113. static int refresh_relay_connection(turn_turnserver *server, ts_ur_super_session *ss, uint32_t lifetime, int even_port,
  114. uint64_t in_reservation_token, uint64_t *out_reservation_token, int *err_code,
  115. int family);
  116. static int write_client_connection(turn_turnserver *server, ts_ur_super_session *ss, ioa_network_buffer_handle nbh,
  117. int ttl, int tos);
  118. static void tcp_peer_accept_connection(ioa_socket_handle s, void *arg);
  119. static int read_client_connection(turn_turnserver *server, ts_ur_super_session *ss, ioa_net_data *in_buffer,
  120. int can_resume, int count_usage);
  121. static int need_stun_authentication(turn_turnserver *server, ts_ur_super_session *ss);
  122. /////////////////// timer //////////////////////////
  123. static void timer_timeout_handler(ioa_engine_handle e, void *arg) {
  124. UNUSED_ARG(e);
  125. if (arg) {
  126. turn_turnserver *server = (turn_turnserver *)arg;
  127. server->ctime = turn_time();
  128. }
  129. }
  130. turn_time_t get_turn_server_time(turn_turnserver *server) {
  131. if (server) {
  132. return server->ctime;
  133. }
  134. return turn_time();
  135. }
  136. /////////////////// quota //////////////////////
  137. static int inc_quota(ts_ur_super_session *ss, uint8_t *username) {
  138. if (ss && !(ss->quota_used) && ss->server && ((turn_turnserver *)ss->server)->chquotacb && username) {
  139. if (((turn_turnserver *)ss->server)->ct == TURN_CREDENTIALS_LONG_TERM) {
  140. if (!(ss->origin_set)) {
  141. return -1;
  142. }
  143. }
  144. if ((((turn_turnserver *)ss->server)->chquotacb)(username, ss->oauth, (uint8_t *)ss->realm_options.name) < 0) {
  145. return -1;
  146. } else {
  147. STRCPY(ss->username, username);
  148. ss->quota_used = 1;
  149. }
  150. }
  151. return 0;
  152. }
  153. static void dec_quota(ts_ur_super_session *ss) {
  154. if (ss && ss->quota_used && ss->server && ((turn_turnserver *)ss->server)->raqcb) {
  155. ss->quota_used = 0;
  156. (((turn_turnserver *)ss->server)->raqcb)(ss->username, ss->oauth, (uint8_t *)ss->realm_options.name);
  157. }
  158. }
  159. static void dec_bps(ts_ur_super_session *ss) {
  160. if (ss && ss->server) {
  161. if (ss->bps) {
  162. if (((turn_turnserver *)ss->server)->allocate_bps_func) {
  163. ((turn_turnserver *)ss->server)->allocate_bps_func(ss->bps, 0);
  164. }
  165. ss->bps = 0;
  166. }
  167. }
  168. }
  169. /////////////////// server lists ///////////////////
  170. void init_turn_server_addrs_list(turn_server_addrs_list_t *l) {
  171. if (l) {
  172. l->addrs = NULL;
  173. l->size = 0;
  174. TURN_MUTEX_INIT(&(l->m));
  175. }
  176. }
  177. /////////////////// RFC 5780 ///////////////////////
  178. void set_rfc5780(turn_turnserver *server, get_alt_addr_cb cb, send_message_cb smcb) {
  179. if (server) {
  180. if (!cb || !smcb) {
  181. server->rfc5780 = 0;
  182. server->alt_addr_cb = NULL;
  183. server->sm_cb = NULL;
  184. } else {
  185. server->rfc5780 = 1;
  186. server->alt_addr_cb = cb;
  187. server->sm_cb = smcb;
  188. }
  189. }
  190. }
  191. static int is_rfc5780(turn_turnserver *server) {
  192. if (!server)
  193. return 0;
  194. return ((server->rfc5780) && (server->alt_addr_cb));
  195. }
  196. static int get_other_address(turn_turnserver *server, ts_ur_super_session *ss, ioa_addr *alt_addr) {
  197. if (is_rfc5780(server) && ss && ss->client_socket) {
  198. int ret = server->alt_addr_cb(get_local_addr_from_ioa_socket(ss->client_socket), alt_addr);
  199. return ret;
  200. }
  201. return -1;
  202. }
  203. static int send_turn_message_to(turn_turnserver *server, ioa_network_buffer_handle nbh, ioa_addr *response_origin,
  204. ioa_addr *response_destination) {
  205. if (is_rfc5780(server) && nbh && response_origin && response_destination) {
  206. return server->sm_cb(server->e, nbh, response_origin, response_destination);
  207. }
  208. return -1;
  209. }
  210. /////////////////// Peer addr check /////////////////////////////
  211. static int good_peer_addr(turn_turnserver *server, const char *realm, ioa_addr *peer_addr, turnsession_id session_id) {
  212. #define CHECK_REALM(r) \
  213. if ((r)[0] && realm && realm[0] && strcmp((r), realm)) \
  214. continue
  215. turnserver_id server_id = (turnserver_id)(session_id / TURN_SESSION_ID_FACTOR);
  216. if (server && peer_addr) {
  217. if (*(server->no_multicast_peers) && ioa_addr_is_multicast(peer_addr))
  218. return 0;
  219. if (!*(server->allow_loopback_peers) && ioa_addr_is_loopback(peer_addr))
  220. return 0;
  221. if (ioa_addr_is_zero(peer_addr))
  222. return 0;
  223. {
  224. int i;
  225. if (server->ip_whitelist) {
  226. // White listing of addr ranges
  227. for (i = server->ip_whitelist->ranges_number - 1; i >= 0; --i) {
  228. CHECK_REALM(server->ip_whitelist->rs[i].realm);
  229. if (ioa_addr_in_range(&(server->ip_whitelist->rs[i].enc), peer_addr))
  230. return 1;
  231. }
  232. }
  233. {
  234. ioa_lock_whitelist(server->e);
  235. const ip_range_list_t *wl = ioa_get_whitelist(server->e);
  236. if (wl) {
  237. // White listing of addr ranges
  238. for (i = wl->ranges_number - 1; i >= 0; --i) {
  239. CHECK_REALM(wl->rs[i].realm);
  240. if (ioa_addr_in_range(&(wl->rs[i].enc), peer_addr)) {
  241. ioa_unlock_whitelist(server->e);
  242. return 1;
  243. }
  244. }
  245. }
  246. ioa_unlock_whitelist(server->e);
  247. }
  248. if (server->ip_blacklist) {
  249. // Black listing of addr ranges
  250. for (i = server->ip_blacklist->ranges_number - 1; i >= 0; --i) {
  251. CHECK_REALM(server->ip_blacklist->rs[i].realm);
  252. if (ioa_addr_in_range(&(server->ip_blacklist->rs[i].enc), peer_addr)) {
  253. char saddr[129];
  254. addr_to_string_no_port(peer_addr, (uint8_t *)saddr);
  255. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "session %018llu: A peer IP %s denied in the range: %s in server %d \n",
  256. (unsigned long long)session_id, saddr, server->ip_blacklist->rs[i].str, server_id);
  257. return 0;
  258. }
  259. }
  260. }
  261. {
  262. ioa_lock_blacklist(server->e);
  263. const ip_range_list_t *bl = ioa_get_blacklist(server->e);
  264. if (bl) {
  265. // Black listing of addr ranges
  266. for (i = bl->ranges_number - 1; i >= 0; --i) {
  267. CHECK_REALM(bl->rs[i].realm);
  268. if (ioa_addr_in_range(&(bl->rs[i].enc), peer_addr)) {
  269. ioa_unlock_blacklist(server->e);
  270. char saddr[129];
  271. addr_to_string_no_port(peer_addr, (uint8_t *)saddr);
  272. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR,
  273. "session %018llu: A peer IP %s denied in the range= %s in server %d \n",
  274. (unsigned long long)session_id, saddr, bl->rs[i].str, server_id);
  275. return 0;
  276. }
  277. }
  278. }
  279. ioa_unlock_blacklist(server->e);
  280. }
  281. }
  282. }
  283. #undef CHECK_REALM
  284. return 1;
  285. }
  286. /////////////////// Allocation //////////////////////////////////
  287. allocation *get_allocation_ss(ts_ur_super_session *ss) { return &(ss->alloc); }
  288. static inline relay_endpoint_session *get_relay_session_ss(ts_ur_super_session *ss, int family) {
  289. return get_relay_session(&(ss->alloc), family);
  290. }
  291. static inline ioa_socket_handle get_relay_socket_ss(ts_ur_super_session *ss, int family) {
  292. return get_relay_socket(&(ss->alloc), family);
  293. }
  294. /////////// Session info ///////
  295. void turn_session_info_init(struct turn_session_info *tsi) {
  296. if (tsi) {
  297. memset(tsi, 0, sizeof(struct turn_session_info));
  298. }
  299. }
  300. void turn_session_info_clean(struct turn_session_info *tsi) {
  301. if (tsi) {
  302. if (tsi->extra_peers_data) {
  303. free(tsi->extra_peers_data);
  304. }
  305. turn_session_info_init(tsi);
  306. }
  307. }
  308. void turn_session_info_add_peer(struct turn_session_info *tsi, ioa_addr *peer) {
  309. if (tsi && peer) {
  310. {
  311. size_t i;
  312. for (i = 0; i < tsi->main_peers_size; ++i) {
  313. if (addr_eq(peer, &(tsi->main_peers_data[i].addr))) {
  314. return;
  315. }
  316. }
  317. if (tsi->main_peers_size < TURN_MAIN_PEERS_ARRAY_SIZE) {
  318. addr_cpy(&(tsi->main_peers_data[tsi->main_peers_size].addr), peer);
  319. addr_to_string(&(tsi->main_peers_data[tsi->main_peers_size].addr),
  320. (uint8_t *)tsi->main_peers_data[tsi->main_peers_size].saddr);
  321. tsi->main_peers_size += 1;
  322. return;
  323. }
  324. }
  325. if (tsi->extra_peers_data) {
  326. size_t sz;
  327. for (sz = 0; sz < tsi->extra_peers_size; ++sz) {
  328. if (addr_eq(peer, &(tsi->extra_peers_data[sz].addr))) {
  329. return;
  330. }
  331. }
  332. }
  333. tsi->extra_peers_data =
  334. (addr_data *)realloc(tsi->extra_peers_data, (tsi->extra_peers_size + 1) * sizeof(addr_data));
  335. addr_cpy(&(tsi->extra_peers_data[tsi->extra_peers_size].addr), peer);
  336. addr_to_string(&(tsi->extra_peers_data[tsi->extra_peers_size].addr),
  337. (uint8_t *)tsi->extra_peers_data[tsi->extra_peers_size].saddr);
  338. tsi->extra_peers_size += 1;
  339. }
  340. }
  341. struct tsi_arg {
  342. struct turn_session_info *tsi;
  343. ioa_addr *addr;
  344. };
  345. static int turn_session_info_foreachcb(ur_map_key_type key, ur_map_value_type value, void *arg) {
  346. UNUSED_ARG(value);
  347. int port = (int)key;
  348. struct tsi_arg *ta = (struct tsi_arg *)arg;
  349. if (port && ta && ta->tsi && ta->addr) {
  350. ioa_addr a;
  351. addr_cpy(&a, ta->addr);
  352. addr_set_port(&a, port);
  353. turn_session_info_add_peer(ta->tsi, &a);
  354. }
  355. return 0;
  356. }
  357. int turn_session_info_copy_from(struct turn_session_info *tsi, ts_ur_super_session *ss) {
  358. int ret = -1;
  359. if (tsi && ss) {
  360. tsi->id = ss->id;
  361. tsi->bps = ss->bps;
  362. tsi->start_time = ss->start_time;
  363. tsi->valid = is_allocation_valid(&(ss->alloc)) && !(ss->to_be_closed) && (ss->quota_used);
  364. if (tsi->valid) {
  365. if (ss->alloc.relay_sessions[ALLOC_IPV4_INDEX].s) {
  366. tsi->expiration_time = ss->alloc.relay_sessions[ALLOC_IPV4_INDEX].expiration_time;
  367. if (ss->alloc.relay_sessions[ALLOC_IPV6_INDEX].s) {
  368. if (turn_time_before(tsi->expiration_time, ss->alloc.relay_sessions[ALLOC_IPV6_INDEX].expiration_time)) {
  369. tsi->expiration_time = ss->alloc.relay_sessions[ALLOC_IPV6_INDEX].expiration_time;
  370. }
  371. }
  372. } else if (ss->alloc.relay_sessions[ALLOC_IPV6_INDEX].s) {
  373. tsi->expiration_time = ss->alloc.relay_sessions[ALLOC_IPV6_INDEX].expiration_time;
  374. }
  375. if (ss->client_socket) {
  376. tsi->client_protocol = get_ioa_socket_type(ss->client_socket);
  377. addr_cpy(&(tsi->local_addr_data.addr), get_local_addr_from_ioa_socket(ss->client_socket));
  378. addr_to_string(&(tsi->local_addr_data.addr), (uint8_t *)tsi->local_addr_data.saddr);
  379. addr_cpy(&(tsi->remote_addr_data.addr), get_remote_addr_from_ioa_socket(ss->client_socket));
  380. addr_to_string(&(tsi->remote_addr_data.addr), (uint8_t *)tsi->remote_addr_data.saddr);
  381. }
  382. {
  383. if (ss->alloc.relay_sessions[ALLOC_IPV4_INDEX].s) {
  384. tsi->peer_protocol = get_ioa_socket_type(ss->alloc.relay_sessions[ALLOC_IPV4_INDEX].s);
  385. if (ss->alloc.is_valid) {
  386. addr_cpy(&(tsi->relay_addr_data_ipv4.addr),
  387. get_local_addr_from_ioa_socket(ss->alloc.relay_sessions[ALLOC_IPV4_INDEX].s));
  388. addr_to_string(&(tsi->relay_addr_data_ipv4.addr), (uint8_t *)tsi->relay_addr_data_ipv4.saddr);
  389. }
  390. }
  391. if (ss->alloc.relay_sessions[ALLOC_IPV6_INDEX].s) {
  392. tsi->peer_protocol = get_ioa_socket_type(ss->alloc.relay_sessions[ALLOC_IPV6_INDEX].s);
  393. if (ss->alloc.is_valid) {
  394. addr_cpy(&(tsi->relay_addr_data_ipv6.addr),
  395. get_local_addr_from_ioa_socket(ss->alloc.relay_sessions[ALLOC_IPV6_INDEX].s));
  396. addr_to_string(&(tsi->relay_addr_data_ipv6.addr), (uint8_t *)tsi->relay_addr_data_ipv6.saddr);
  397. }
  398. }
  399. }
  400. STRCPY(tsi->username, ss->username);
  401. tsi->enforce_fingerprints = ss->enforce_fingerprints;
  402. STRCPY(tsi->tls_method, get_ioa_socket_tls_method(ss->client_socket));
  403. STRCPY(tsi->tls_cipher, get_ioa_socket_tls_cipher(ss->client_socket));
  404. STRCPY(tsi->realm, ss->realm_options.name);
  405. STRCPY(tsi->origin, ss->origin);
  406. if (ss->t_received_packets > ss->received_packets)
  407. tsi->received_packets = ss->t_received_packets;
  408. else
  409. tsi->received_packets = ss->received_packets;
  410. if (ss->t_sent_packets > ss->sent_packets)
  411. tsi->sent_packets = ss->t_sent_packets;
  412. else
  413. tsi->sent_packets = ss->sent_packets;
  414. if (ss->t_received_bytes > ss->received_bytes)
  415. tsi->received_bytes = ss->t_received_bytes;
  416. else
  417. tsi->received_bytes = ss->received_bytes;
  418. if (ss->t_sent_bytes > ss->sent_bytes)
  419. tsi->sent_bytes = ss->t_sent_bytes;
  420. else
  421. tsi->sent_bytes = ss->sent_bytes;
  422. if (ss->t_peer_received_packets > ss->peer_received_packets)
  423. tsi->peer_received_packets = ss->t_peer_received_packets;
  424. else
  425. tsi->peer_received_packets = ss->peer_received_packets;
  426. if (ss->t_peer_sent_packets > ss->peer_sent_packets)
  427. tsi->peer_sent_packets = ss->t_peer_sent_packets;
  428. else
  429. tsi->peer_sent_packets = ss->peer_sent_packets;
  430. if (ss->t_peer_received_bytes > ss->peer_received_bytes)
  431. tsi->peer_received_bytes = ss->t_peer_received_bytes;
  432. else
  433. tsi->peer_received_bytes = ss->peer_received_bytes;
  434. if (ss->t_peer_sent_bytes > ss->peer_sent_bytes)
  435. tsi->peer_sent_bytes = ss->t_peer_sent_bytes;
  436. else
  437. tsi->peer_sent_bytes = ss->peer_sent_bytes;
  438. {
  439. tsi->received_rate = ss->received_rate;
  440. tsi->sent_rate = ss->sent_rate;
  441. tsi->total_rate = tsi->received_rate + tsi->sent_rate;
  442. tsi->peer_received_rate = ss->peer_received_rate;
  443. tsi->peer_sent_rate = ss->peer_sent_rate;
  444. tsi->peer_total_rate = tsi->peer_received_rate + tsi->peer_sent_rate;
  445. }
  446. tsi->is_mobile = ss->is_mobile;
  447. {
  448. size_t i;
  449. for (i = 0; i < TURN_PERMISSION_HASHTABLE_SIZE; ++i) {
  450. turn_permission_array *parray = &(ss->alloc.addr_to_perm.table[i]);
  451. {
  452. size_t j;
  453. for (j = 0; j < TURN_PERMISSION_ARRAY_SIZE; ++j) {
  454. turn_permission_slot *slot = &(parray->main_slots[j]);
  455. if (slot->info.allocated) {
  456. turn_session_info_add_peer(tsi, &(slot->info.addr));
  457. struct tsi_arg arg = {tsi, &(slot->info.addr)};
  458. lm_map_foreach_arg(&(slot->info.chns), turn_session_info_foreachcb, &arg);
  459. }
  460. }
  461. }
  462. {
  463. turn_permission_slot **slots = parray->extra_slots;
  464. if (slots) {
  465. size_t sz = parray->extra_sz;
  466. size_t j;
  467. for (j = 0; j < sz; ++j) {
  468. turn_permission_slot *slot = slots[j];
  469. if (slot && slot->info.allocated) {
  470. turn_session_info_add_peer(tsi, &(slot->info.addr));
  471. struct tsi_arg arg = {tsi, &(slot->info.addr)};
  472. lm_map_foreach_arg(&(slot->info.chns), turn_session_info_foreachcb, &arg);
  473. }
  474. }
  475. }
  476. }
  477. }
  478. }
  479. {
  480. tcp_connection_list *tcl = &(ss->alloc.tcs);
  481. if (tcl->elems) {
  482. size_t i;
  483. size_t sz = tcl->sz;
  484. for (i = 0; i < sz; ++i) {
  485. if (tcl->elems[i]) {
  486. tcp_connection *tc = tcl->elems[i];
  487. if (tc) {
  488. turn_session_info_add_peer(tsi, &(tc->peer_addr));
  489. }
  490. }
  491. }
  492. }
  493. }
  494. }
  495. ret = 0;
  496. }
  497. return ret;
  498. }
  499. int report_turn_session_info(turn_turnserver *server, ts_ur_super_session *ss, int force_invalid) {
  500. if (server && ss && server->send_turn_session_info) {
  501. struct turn_session_info tsi;
  502. turn_session_info_init(&tsi);
  503. if (turn_session_info_copy_from(&tsi, ss) < 0) {
  504. turn_session_info_clean(&tsi);
  505. } else {
  506. if (force_invalid)
  507. tsi.valid = 0;
  508. if (server->send_turn_session_info(&tsi) < 0) {
  509. turn_session_info_clean(&tsi);
  510. } else {
  511. return 0;
  512. }
  513. }
  514. }
  515. return -1;
  516. }
  517. /////////// SS /////////////////
  518. static int mobile_id_to_string(mobile_id_t mid, char *dst, size_t dst_sz) {
  519. size_t output_length = 0;
  520. if (!dst)
  521. return -1;
  522. char *s = base64_encode((const unsigned char *)&mid, sizeof(mid), &output_length);
  523. if (!s)
  524. return -1;
  525. if (!output_length || (output_length + 1 > dst_sz)) {
  526. free(s);
  527. return -1;
  528. }
  529. memcpy(dst, s, output_length);
  530. free(s);
  531. dst[output_length] = 0;
  532. return (int)output_length;
  533. }
  534. static mobile_id_t string_to_mobile_id(char *src) {
  535. mobile_id_t mid = 0;
  536. if (src) {
  537. size_t output_length = 0;
  538. unsigned char *out = base64_decode(src, strlen(src), &output_length);
  539. if (out) {
  540. if (output_length == sizeof(mid)) {
  541. mid = *((mobile_id_t *)out);
  542. }
  543. free(out);
  544. }
  545. }
  546. return mid;
  547. }
  548. static mobile_id_t get_new_mobile_id(turn_turnserver *server) {
  549. mobile_id_t newid = 0;
  550. if (server && server->mobile_connections_map) {
  551. ur_map *map = server->mobile_connections_map;
  552. uint64_t sid = server->id;
  553. sid = sid << 56;
  554. do {
  555. while (!newid) {
  556. if (TURN_RANDOM_SIZE == sizeof(mobile_id_t))
  557. newid = (mobile_id_t)turn_random();
  558. else {
  559. newid = (mobile_id_t)turn_random();
  560. newid = (newid << 32) + (mobile_id_t)turn_random();
  561. }
  562. if (!newid) {
  563. continue;
  564. }
  565. newid = newid & 0x00FFFFFFFFFFFFFFLL;
  566. if (!newid) {
  567. continue;
  568. }
  569. newid = newid | sid;
  570. }
  571. } while (ur_map_get(map, (ur_map_key_type)newid, NULL));
  572. }
  573. return newid;
  574. }
  575. static void put_session_into_mobile_map(ts_ur_super_session *ss) {
  576. if (ss && ss->server) {
  577. turn_turnserver *server = (turn_turnserver *)(ss->server);
  578. if (*(server->mobility) && server->mobile_connections_map) {
  579. if (!(ss->mobile_id)) {
  580. ss->mobile_id = get_new_mobile_id(server);
  581. mobile_id_to_string(ss->mobile_id, ss->s_mobile_id, sizeof(ss->s_mobile_id));
  582. }
  583. ur_map_put(server->mobile_connections_map, (ur_map_key_type)(ss->mobile_id), (ur_map_value_type)ss);
  584. }
  585. }
  586. }
  587. static void put_session_into_map(ts_ur_super_session *ss) {
  588. if (ss && ss->server) {
  589. turn_turnserver *server = (turn_turnserver *)(ss->server);
  590. if (!(ss->id)) {
  591. ss->id = (turnsession_id)((turnsession_id)server->id * TURN_SESSION_ID_FACTOR);
  592. ss->id += ++(server->session_id_counter);
  593. ss->start_time = server->ctime;
  594. }
  595. ur_map_put(server->sessions_map, (ur_map_key_type)(ss->id), (ur_map_value_type)ss);
  596. put_session_into_mobile_map(ss);
  597. }
  598. }
  599. static void delete_session_from_mobile_map(ts_ur_super_session *ss) {
  600. if (ss && ss->server && ss->mobile_id) {
  601. turn_turnserver *server = (turn_turnserver *)(ss->server);
  602. if (server->mobile_connections_map) {
  603. ur_map_del(server->mobile_connections_map, (ur_map_key_type)(ss->mobile_id), NULL);
  604. }
  605. ss->mobile_id = 0;
  606. ss->s_mobile_id[0] = 0;
  607. }
  608. }
  609. static void delete_session_from_map(ts_ur_super_session *ss) {
  610. if (ss && ss->server) {
  611. turn_turnserver *server = (turn_turnserver *)(ss->server);
  612. ur_map_del(server->sessions_map, (ur_map_key_type)(ss->id), NULL);
  613. delete_session_from_mobile_map(ss);
  614. }
  615. }
  616. static ts_ur_super_session *get_session_from_map(turn_turnserver *server, turnsession_id sid) {
  617. ts_ur_super_session *ss = NULL;
  618. if (server) {
  619. ur_map_value_type value = 0;
  620. if (ur_map_get(server->sessions_map, (ur_map_key_type)sid, &value) && value) {
  621. ss = (ts_ur_super_session *)value;
  622. }
  623. }
  624. return ss;
  625. }
  626. void turn_cancel_session(turn_turnserver *server, turnsession_id sid) {
  627. if (server) {
  628. ts_ur_super_session *ts = get_session_from_map(server, sid);
  629. if (ts) {
  630. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "Session %018llu to be forcefully canceled\n", (unsigned long long)sid);
  631. shutdown_client_connection(server, ts, 0, "Forceful shutdown");
  632. }
  633. }
  634. }
  635. static ts_ur_super_session *get_session_from_mobile_map(turn_turnserver *server, mobile_id_t mid) {
  636. ts_ur_super_session *ss = NULL;
  637. if (server && *(server->mobility) && server->mobile_connections_map && mid) {
  638. ur_map_value_type value = 0;
  639. if (ur_map_get(server->mobile_connections_map, (ur_map_key_type)mid, &value) && value) {
  640. ss = (ts_ur_super_session *)value;
  641. }
  642. }
  643. return ss;
  644. }
  645. static ts_ur_super_session *create_new_ss(turn_turnserver *server) {
  646. //
  647. // printf("%s: 111.111: session size=%lu\n",__FUNCTION__,(unsigned long)sizeof(ts_ur_super_session));
  648. //
  649. ts_ur_super_session *ss = (ts_ur_super_session *)calloc(sizeof(ts_ur_super_session), 1);
  650. ss->server = server;
  651. get_default_realm_options(&(ss->realm_options));
  652. put_session_into_map(ss);
  653. init_allocation(ss, &(ss->alloc), server->tcp_relay_connections);
  654. return ss;
  655. }
  656. static void delete_ur_map_ss(void *p, SOCKET_TYPE socket_type) {
  657. if (p) {
  658. ts_ur_super_session *ss = (ts_ur_super_session *)p;
  659. delete_session_from_map(ss);
  660. IOA_CLOSE_SOCKET(ss->client_socket);
  661. clear_allocation(get_allocation_ss(ss), socket_type);
  662. IOA_EVENT_DEL(ss->to_be_allocated_timeout_ev);
  663. free(p);
  664. }
  665. }
  666. /////////// clean all /////////////////////
  667. static int turn_server_remove_all_from_ur_map_ss(ts_ur_super_session *ss, SOCKET_TYPE socket_type) {
  668. if (!ss)
  669. return 0;
  670. else {
  671. int ret = 0;
  672. if (ss->client_socket) {
  673. clear_ioa_socket_session_if(ss->client_socket, ss);
  674. }
  675. if (get_relay_socket_ss(ss, AF_INET)) {
  676. clear_ioa_socket_session_if(get_relay_socket_ss(ss, AF_INET), ss);
  677. }
  678. if (get_relay_socket_ss(ss, AF_INET6)) {
  679. clear_ioa_socket_session_if(get_relay_socket_ss(ss, AF_INET6), ss);
  680. }
  681. delete_ur_map_ss(ss, socket_type);
  682. return ret;
  683. }
  684. }
  685. /////////////////////////////////////////////////////////////////
  686. static void client_ss_channel_timeout_handler(ioa_engine_handle e, void *arg) {
  687. UNUSED_ARG(e);
  688. if (!arg)
  689. return;
  690. ch_info *chn = (ch_info *)arg;
  691. turn_channel_delete(chn);
  692. }
  693. static void client_ss_perm_timeout_handler(ioa_engine_handle e, void *arg) {
  694. UNUSED_ARG(e);
  695. if (!arg) {
  696. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "!!! %s: empty permission to be cleaned\n", __FUNCTION__);
  697. return;
  698. }
  699. turn_permission_info *tinfo = (turn_permission_info *)arg;
  700. if (!(tinfo->allocated)) {
  701. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "!!! %s: unallocated permission to be cleaned\n", __FUNCTION__);
  702. return;
  703. }
  704. if (!(tinfo->lifetime_ev)) {
  705. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "!!! %s: strange (1) permission to be cleaned\n", __FUNCTION__);
  706. }
  707. if (!(tinfo->owner)) {
  708. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "!!! %s: strange (2) permission to be cleaned\n", __FUNCTION__);
  709. }
  710. turn_permission_clean(tinfo);
  711. }
  712. ///////////////////////////////////////////////////////////////////
  713. static int update_turn_permission_lifetime(ts_ur_super_session *ss, turn_permission_info *tinfo,
  714. turn_time_t time_delta) {
  715. if (ss && tinfo && tinfo->owner) {
  716. turn_turnserver *server = (turn_turnserver *)(ss->server);
  717. if (server) {
  718. if (!time_delta)
  719. time_delta = *(server->permission_lifetime);
  720. tinfo->expiration_time = server->ctime + time_delta;
  721. IOA_EVENT_DEL(tinfo->lifetime_ev);
  722. tinfo->lifetime_ev = set_ioa_timer(server->e, time_delta, 0, client_ss_perm_timeout_handler, tinfo, 0,
  723. "client_ss_channel_timeout_handler");
  724. if (server->verbose) {
  725. tinfo->verbose = 1;
  726. tinfo->session_id = ss->id;
  727. char s[257] = "\0";
  728. addr_to_string(&(tinfo->addr), (uint8_t *)s);
  729. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "session %018llu: peer %s lifetime updated: %lu\n",
  730. (unsigned long long)ss->id, s, (unsigned long)time_delta);
  731. }
  732. return 0;
  733. }
  734. }
  735. return -1;
  736. }
  737. static int update_channel_lifetime(ts_ur_super_session *ss, ch_info *chn) {
  738. if (chn) {
  739. turn_permission_info *tinfo = (turn_permission_info *)(chn->owner);
  740. if (tinfo && tinfo->owner) {
  741. turn_turnserver *server = (turn_turnserver *)(ss->server);
  742. if (server) {
  743. if (update_turn_permission_lifetime(ss, tinfo, *(server->channel_lifetime)) < 0)
  744. return -1;
  745. chn->expiration_time = server->ctime + *(server->channel_lifetime);
  746. IOA_EVENT_DEL(chn->lifetime_ev);
  747. chn->lifetime_ev = set_ioa_timer(server->e, *(server->channel_lifetime), 0, client_ss_channel_timeout_handler,
  748. chn, 0, "client_ss_channel_timeout_handler");
  749. return 0;
  750. }
  751. }
  752. }
  753. return -1;
  754. }
  755. /////////////// TURN ///////////////////////////
  756. #define SKIP_ATTRIBUTES \
  757. case STUN_ATTRIBUTE_OAUTH_ACCESS_TOKEN: \
  758. case STUN_ATTRIBUTE_PRIORITY: \
  759. case STUN_ATTRIBUTE_FINGERPRINT: \
  760. case STUN_ATTRIBUTE_MESSAGE_INTEGRITY: \
  761. break; \
  762. case STUN_ATTRIBUTE_USERNAME: \
  763. case STUN_ATTRIBUTE_REALM: \
  764. case STUN_ATTRIBUTE_NONCE: \
  765. case STUN_ATTRIBUTE_ORIGIN: \
  766. sar = stun_attr_get_next_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh), \
  767. sar); \
  768. continue
  769. static uint8_t get_transport_value(const uint8_t *value) {
  770. if ((value[0] == STUN_ATTRIBUTE_TRANSPORT_UDP_VALUE) || (value[0] == STUN_ATTRIBUTE_TRANSPORT_TCP_VALUE)) {
  771. return value[0];
  772. }
  773. return 0;
  774. }
  775. static int handle_turn_allocate(turn_turnserver *server, ts_ur_super_session *ss, stun_tid *tid, int *resp_constructed,
  776. int *err_code, const uint8_t **reason, uint16_t *unknown_attrs, uint16_t *ua_num,
  777. ioa_net_data *in_buffer, ioa_network_buffer_handle nbh) {
  778. int err_code4 = 0;
  779. int err_code6 = 0;
  780. allocation *alloc = get_allocation_ss(ss);
  781. if (is_allocation_valid(alloc)) {
  782. if (!stun_tid_equals(tid, &(alloc->tid))) {
  783. *err_code = 437;
  784. *reason = (const uint8_t *)"Wrong TID";
  785. } else {
  786. size_t len = ioa_network_buffer_get_size(nbh);
  787. ioa_addr xor_relayed_addr1, *pxor_relayed_addr1 = NULL;
  788. ioa_addr xor_relayed_addr2, *pxor_relayed_addr2 = NULL;
  789. ioa_addr *relayed_addr1 = get_local_addr_from_ioa_socket(get_relay_socket_ss(ss, AF_INET));
  790. ioa_addr *relayed_addr2 = get_local_addr_from_ioa_socket(get_relay_socket_ss(ss, AF_INET6));
  791. if (get_relay_session_failure(alloc, AF_INET)) {
  792. addr_set_any(&xor_relayed_addr1);
  793. pxor_relayed_addr1 = &xor_relayed_addr1;
  794. } else if (relayed_addr1) {
  795. if (server->external_ip_set) {
  796. addr_cpy(&xor_relayed_addr1, &(server->external_ip));
  797. addr_set_port(&xor_relayed_addr1, addr_get_port(relayed_addr1));
  798. } else {
  799. addr_cpy(&xor_relayed_addr1, relayed_addr1);
  800. }
  801. pxor_relayed_addr1 = &xor_relayed_addr1;
  802. }
  803. if (get_relay_session_failure(alloc, AF_INET6)) {
  804. addr_set_any(&xor_relayed_addr2);
  805. pxor_relayed_addr2 = &xor_relayed_addr2;
  806. } else if (relayed_addr2) {
  807. if (server->external_ip_set) {
  808. addr_cpy(&xor_relayed_addr2, &(server->external_ip));
  809. addr_set_port(&xor_relayed_addr2, addr_get_port(relayed_addr2));
  810. } else {
  811. addr_cpy(&xor_relayed_addr2, relayed_addr2);
  812. }
  813. pxor_relayed_addr2 = &xor_relayed_addr2;
  814. }
  815. if (pxor_relayed_addr1 || pxor_relayed_addr2) {
  816. uint32_t lifetime = 0;
  817. if (pxor_relayed_addr1) {
  818. lifetime = (get_relay_session(alloc, pxor_relayed_addr1->ss.sa_family)->expiration_time - server->ctime);
  819. } else if (pxor_relayed_addr2) {
  820. lifetime = (get_relay_session(alloc, pxor_relayed_addr2->ss.sa_family)->expiration_time - server->ctime);
  821. }
  822. stun_set_allocate_response_str(ioa_network_buffer_data(nbh), &len, tid, pxor_relayed_addr1, pxor_relayed_addr2,
  823. get_remote_addr_from_ioa_socket(ss->client_socket), lifetime,
  824. *(server->max_allocate_lifetime), 0, NULL, 0, ss->s_mobile_id);
  825. ioa_network_buffer_set_size(nbh, len);
  826. *resp_constructed = 1;
  827. }
  828. }
  829. } else {
  830. uint8_t transport = 0;
  831. turn_time_t lifetime = 0;
  832. int even_port = -1;
  833. int dont_fragment = 0;
  834. uint64_t in_reservation_token = 0;
  835. int af4 = 0;
  836. int af6 = 0;
  837. uint8_t username[STUN_MAX_USERNAME_SIZE + 1] = "\0";
  838. size_t ulen = 0;
  839. band_limit_t bps = 0;
  840. band_limit_t max_bps = 0;
  841. stun_attr_ref sar =
  842. stun_attr_get_first_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh));
  843. while (sar && (!(*err_code)) && (*ua_num < MAX_NUMBER_OF_UNKNOWN_ATTRS)) {
  844. int attr_type = stun_attr_get_type(sar);
  845. if (attr_type == STUN_ATTRIBUTE_USERNAME) {
  846. const uint8_t *value = stun_attr_get_value(sar);
  847. if (value) {
  848. ulen = stun_attr_get_len(sar);
  849. if (ulen >= sizeof(username)) {
  850. *err_code = 400;
  851. *reason = (const uint8_t *)"User name is too long";
  852. break;
  853. }
  854. memcpy(username, value, ulen);
  855. username[ulen] = 0;
  856. if (!is_secure_string(username, 1)) {
  857. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "%s: wrong username: %s\n", __FUNCTION__, (char *)username);
  858. username[0] = 0;
  859. *err_code = 400;
  860. break;
  861. }
  862. }
  863. }
  864. switch (attr_type) {
  865. SKIP_ATTRIBUTES;
  866. case STUN_ATTRIBUTE_NEW_BANDWIDTH:
  867. bps = stun_attr_get_bandwidth(sar);
  868. break;
  869. case STUN_ATTRIBUTE_MOBILITY_TICKET:
  870. if (!(*(server->mobility))) {
  871. *err_code = 405;
  872. *reason = (const uint8_t *)"Mobility Forbidden";
  873. } else if (stun_attr_get_len(sar) != 0) {
  874. *err_code = 400;
  875. *reason = (const uint8_t *)"Wrong Mobility Field";
  876. } else {
  877. ss->is_mobile = 1;
  878. }
  879. break;
  880. case STUN_ATTRIBUTE_REQUESTED_TRANSPORT: {
  881. if (stun_attr_get_len(sar) != 4) {
  882. *err_code = 400;
  883. *reason = (const uint8_t *)"Wrong Transport Field";
  884. } else if (transport) {
  885. *err_code = 400;
  886. *reason = (const uint8_t *)"Duplicate Transport Fields";
  887. } else {
  888. const uint8_t *value = stun_attr_get_value(sar);
  889. if (value) {
  890. transport = get_transport_value(value);
  891. if (!transport) {
  892. *err_code = 442;
  893. }
  894. if ((transport == STUN_ATTRIBUTE_TRANSPORT_TCP_VALUE) && *(server->no_tcp_relay)) {
  895. *err_code = 442;
  896. *reason = (const uint8_t *)"TCP Transport is not allowed by the TURN Server configuration";
  897. } else if ((transport == STUN_ATTRIBUTE_TRANSPORT_UDP_VALUE) && *(server->no_udp_relay)) {
  898. *err_code = 442;
  899. *reason = (const uint8_t *)"UDP Transport is not allowed by the TURN Server configuration";
  900. } else if (ss->client_socket) {
  901. SOCKET_TYPE cst = get_ioa_socket_type(ss->client_socket);
  902. if ((transport == STUN_ATTRIBUTE_TRANSPORT_TCP_VALUE) && !is_stream_socket(cst)) {
  903. *err_code = 400;
  904. *reason = (const uint8_t *)"Wrong Transport Data";
  905. } else {
  906. ss->is_tcp_relay = (transport == STUN_ATTRIBUTE_TRANSPORT_TCP_VALUE);
  907. }
  908. }
  909. } else {
  910. *err_code = 400;
  911. *reason = (const uint8_t *)"Wrong Transport Data";
  912. }
  913. }
  914. } break;
  915. case STUN_ATTRIBUTE_DONT_FRAGMENT:
  916. dont_fragment = 1;
  917. if (!(server->dont_fragment))
  918. unknown_attrs[(*ua_num)++] = nswap16(attr_type);
  919. break;
  920. case STUN_ATTRIBUTE_LIFETIME: {
  921. if (stun_attr_get_len(sar) != 4) {
  922. *err_code = 400;
  923. *reason = (const uint8_t *)"Wrong Lifetime Field";
  924. } else {
  925. const uint8_t *value = stun_attr_get_value(sar);
  926. if (!value) {
  927. *err_code = 400;
  928. *reason = (const uint8_t *)"Wrong Lifetime Data";
  929. } else {
  930. lifetime = nswap32(*((const uint32_t *)value));
  931. }
  932. }
  933. } break;
  934. case STUN_ATTRIBUTE_EVEN_PORT: {
  935. if (in_reservation_token) {
  936. *err_code = 400;
  937. *reason = (const uint8_t *)"Even Port and Reservation Token cannot be used together";
  938. } else {
  939. even_port = stun_attr_get_even_port(sar);
  940. if (even_port) {
  941. if (af4 && af6) {
  942. *err_code = 400;
  943. *reason = (const uint8_t *)"Even Port cannot be used with Dual Allocation";
  944. }
  945. }
  946. }
  947. } break;
  948. case STUN_ATTRIBUTE_RESERVATION_TOKEN: {
  949. int len = stun_attr_get_len(sar);
  950. if (len != 8) {
  951. *err_code = 400;
  952. *reason = (const uint8_t *)"Wrong Format of Reservation Token";
  953. } else if (af4 || af6) {
  954. *err_code = 400;
  955. *reason = (const uint8_t *)"Address family attribute can not be used with reservation token request";
  956. } else {
  957. if (even_port >= 0) {
  958. *err_code = 400;
  959. *reason = (const uint8_t *)"Reservation Token cannot be used in this request with even port";
  960. } else if (in_reservation_token) {
  961. *err_code = 400;
  962. *reason = (const uint8_t *)"Reservation Token cannot be used in this request";
  963. } else {
  964. in_reservation_token = stun_attr_get_reservation_token_value(sar);
  965. }
  966. }
  967. } break;
  968. case STUN_ATTRIBUTE_ADDITIONAL_ADDRESS_FAMILY:
  969. if (even_port > 0) {
  970. *err_code = 400;
  971. *reason = (const uint8_t *)"Even Port cannot be used with Dual Allocation";
  972. break;
  973. }
  974. /* Falls through. */
  975. case STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY: {
  976. if (in_reservation_token) {
  977. *err_code = 400;
  978. *reason = (const uint8_t *)"Address family attribute can not be used with reservation token request";
  979. } else if (af4 || af6) {
  980. *err_code = 400;
  981. *reason = (const uint8_t *)"Extra address family attribute can not be used in the request";
  982. } else {
  983. int af_req = stun_get_requested_address_family(sar);
  984. switch (af_req) {
  985. case STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_IPV4:
  986. if (attr_type == STUN_ATTRIBUTE_ADDITIONAL_ADDRESS_FAMILY) {
  987. *err_code = 400;
  988. *reason = (const uint8_t *)"Invalid value of the additional address family attribute";
  989. } else {
  990. af4 = af_req;
  991. }
  992. break;
  993. case STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_IPV6:
  994. if (attr_type == STUN_ATTRIBUTE_ADDITIONAL_ADDRESS_FAMILY) {
  995. af4 = STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_IPV4;
  996. }
  997. af6 = af_req;
  998. break;
  999. default:
  1000. *err_code = 440;
  1001. }
  1002. }
  1003. } break;
  1004. default:
  1005. if (attr_type >= 0x0000 && attr_type <= 0x7FFF)
  1006. unknown_attrs[(*ua_num)++] = nswap16(attr_type);
  1007. };
  1008. sar = stun_attr_get_next_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh),
  1009. sar);
  1010. }
  1011. if (!transport) {
  1012. *err_code = 400;
  1013. if (!(*reason))
  1014. *reason = (const uint8_t *)"Transport field missed or wrong";
  1015. } else if (*ua_num > 0) {
  1016. *err_code = 420;
  1017. } else if (*err_code) {
  1018. ;
  1019. } else if ((transport == STUN_ATTRIBUTE_TRANSPORT_TCP_VALUE) &&
  1020. (dont_fragment || in_reservation_token || (even_port != -1))) {
  1021. *err_code = 400;
  1022. if (!(*reason))
  1023. *reason = (const uint8_t *)"Request parameters are incompatible with TCP transport";
  1024. } else {
  1025. if (*(server->mobility)) {
  1026. if (!(ss->is_mobile)) {
  1027. delete_session_from_mobile_map(ss);
  1028. }
  1029. }
  1030. lifetime = stun_adjust_allocate_lifetime(lifetime, *(server->max_allocate_lifetime), ss->max_session_time_auth);
  1031. uint64_t out_reservation_token = 0;
  1032. if (inc_quota(ss, username) < 0) {
  1033. *err_code = 486;
  1034. } else {
  1035. if (server->allocate_bps_func) {
  1036. max_bps = ss->realm_options.perf_options.max_bps;
  1037. if (max_bps && (!bps || (bps && (bps > max_bps)))) {
  1038. bps = max_bps;
  1039. }
  1040. if (bps && (ss->bps == 0)) {
  1041. ss->bps = server->allocate_bps_func(bps, 1);
  1042. if (!(ss->bps)) {
  1043. *err_code = 486;
  1044. *reason = (const uint8_t *)"Allocation Bandwidth Quota Reached";
  1045. }
  1046. }
  1047. }
  1048. if (af4)
  1049. af4 = STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_IPV4;
  1050. if (af6)
  1051. af6 = STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_IPV6;
  1052. if (af4 && af6) {
  1053. if (server->external_ip_set) {
  1054. *err_code = 440;
  1055. *reason = (const uint8_t *)"Dual allocation cannot be supported in the current server configuration";
  1056. }
  1057. if (even_port > 0) {
  1058. *err_code = 440;
  1059. *reason = (const uint8_t *)"Dual allocation cannot be supported with even-port functionality";
  1060. }
  1061. }
  1062. if (!(*err_code)) {
  1063. if (!af4 && !af6) {
  1064. switch (server->allocation_default_address_family) {
  1065. case ALLOCATION_DEFAULT_ADDRESS_FAMILY_KEEP:
  1066. switch (get_ioa_socket_address_family(ss->client_socket)) {
  1067. case AF_INET6:
  1068. af6 = STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_IPV6;
  1069. break;
  1070. case AF_INET:
  1071. default:
  1072. af4 = STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_IPV4;
  1073. break;
  1074. }
  1075. break;
  1076. case ALLOCATION_DEFAULT_ADDRESS_FAMILY_IPV6:
  1077. af6 = STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_IPV6;
  1078. break;
  1079. case ALLOCATION_DEFAULT_ADDRESS_FAMILY_IPV4:
  1080. /* no break */
  1081. /* Falls through. */
  1082. default:
  1083. af4 = STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_IPV4;
  1084. break;
  1085. }
  1086. }
  1087. if (!af4 && af6) {
  1088. int af6res = create_relay_connection(server, ss, lifetime, af6, transport, even_port, in_reservation_token,
  1089. &out_reservation_token, err_code, reason, tcp_peer_accept_connection);
  1090. if (af6res < 0) {
  1091. set_relay_session_failure(alloc, AF_INET6);
  1092. if (!(*err_code)) {
  1093. *err_code = 437;
  1094. }
  1095. }
  1096. } else if (af4 && !af6) {
  1097. int af4res = create_relay_connection(server, ss, lifetime, af4, transport, even_port, in_reservation_token,
  1098. &out_reservation_token, err_code, reason, tcp_peer_accept_connection);
  1099. if (af4res < 0) {
  1100. set_relay_session_failure(alloc, AF_INET);
  1101. if (!(*err_code)) {
  1102. *err_code = 437;
  1103. }
  1104. }
  1105. } else {
  1106. const uint8_t *reason4 = NULL;
  1107. const uint8_t *reason6 = NULL;
  1108. {
  1109. int af4res =
  1110. create_relay_connection(server, ss, lifetime, af4, transport, even_port, in_reservation_token,
  1111. &out_reservation_token, &err_code4, &reason4, tcp_peer_accept_connection);
  1112. if (af4res < 0) {
  1113. set_relay_session_failure(alloc, AF_INET);
  1114. if (!err_code4) {
  1115. err_code4 = 440;
  1116. }
  1117. }
  1118. }
  1119. {
  1120. int af6res =
  1121. create_relay_connection(server, ss, lifetime, af6, transport, even_port, in_reservation_token,
  1122. &out_reservation_token, &err_code6, &reason6, tcp_peer_accept_connection);
  1123. if (af6res < 0) {
  1124. set_relay_session_failure(alloc, AF_INET6);
  1125. if (!err_code6) {
  1126. err_code6 = 440;
  1127. }
  1128. }
  1129. }
  1130. if (err_code4 && err_code6) {
  1131. if (reason4) {
  1132. *err_code = err_code4;
  1133. *reason = reason4;
  1134. } else if (reason6) {
  1135. *err_code = err_code6;
  1136. *reason = reason6;
  1137. } else {
  1138. *err_code = err_code4;
  1139. }
  1140. }
  1141. }
  1142. }
  1143. if (*err_code) {
  1144. if (!(*reason)) {
  1145. *reason = (const uint8_t *)"Cannot create relay endpoint(s)";
  1146. }
  1147. } else {
  1148. set_allocation_valid(alloc, 1);
  1149. stun_tid_cpy(&(alloc->tid), tid);
  1150. size_t len = ioa_network_buffer_get_size(nbh);
  1151. ioa_addr xor_relayed_addr1, *pxor_relayed_addr1 = NULL;
  1152. ioa_addr xor_relayed_addr2, *pxor_relayed_addr2 = NULL;
  1153. ioa_addr *relayed_addr1 = get_local_addr_from_ioa_socket(get_relay_socket_ss(ss, AF_INET));
  1154. ioa_addr *relayed_addr2 = get_local_addr_from_ioa_socket(get_relay_socket_ss(ss, AF_INET6));
  1155. if (get_relay_session_failure(alloc, AF_INET)) {
  1156. addr_set_any(&xor_relayed_addr1);
  1157. pxor_relayed_addr1 = &xor_relayed_addr1;
  1158. } else if (relayed_addr1) {
  1159. if (server->external_ip_set) {
  1160. addr_cpy(&xor_relayed_addr1, &(server->external_ip));
  1161. addr_set_port(&xor_relayed_addr1, addr_get_port(relayed_addr1));
  1162. } else {
  1163. addr_cpy(&xor_relayed_addr1, relayed_addr1);
  1164. }
  1165. pxor_relayed_addr1 = &xor_relayed_addr1;
  1166. }
  1167. if (get_relay_session_failure(alloc, AF_INET6)) {
  1168. addr_set_any(&xor_relayed_addr2);
  1169. pxor_relayed_addr2 = &xor_relayed_addr2;
  1170. } else if (relayed_addr2) {
  1171. if (server->external_ip_set) {
  1172. addr_cpy(&xor_relayed_addr2, &(server->external_ip));
  1173. addr_set_port(&xor_relayed_addr2, addr_get_port(relayed_addr2));
  1174. } else {
  1175. addr_cpy(&xor_relayed_addr2, relayed_addr2);
  1176. }
  1177. pxor_relayed_addr2 = &xor_relayed_addr2;
  1178. }
  1179. if (pxor_relayed_addr1 || pxor_relayed_addr2) {
  1180. stun_set_allocate_response_str(ioa_network_buffer_data(nbh), &len, tid, pxor_relayed_addr1,
  1181. pxor_relayed_addr2, get_remote_addr_from_ioa_socket(ss->client_socket),
  1182. lifetime, *(server->max_allocate_lifetime), 0, NULL, out_reservation_token,
  1183. ss->s_mobile_id);
  1184. if (ss->bps) {
  1185. stun_attr_add_bandwidth_str(ioa_network_buffer_data(nbh), &len, ss->bps);
  1186. }
  1187. ioa_network_buffer_set_size(nbh, len);
  1188. *resp_constructed = 1;
  1189. turn_report_allocation_set(&(ss->alloc), lifetime, 0);
  1190. }
  1191. }
  1192. }
  1193. }
  1194. }
  1195. if (!(*resp_constructed)) {
  1196. if (!(*err_code)) {
  1197. *err_code = 437;
  1198. }
  1199. size_t len = ioa_network_buffer_get_size(nbh);
  1200. stun_set_allocate_response_str(ioa_network_buffer_data(nbh), &len, tid, NULL, NULL, NULL, 0,
  1201. *(server->max_allocate_lifetime), *err_code, *reason, 0, ss->s_mobile_id);
  1202. ioa_network_buffer_set_size(nbh, len);
  1203. *resp_constructed = 1;
  1204. }
  1205. if (*resp_constructed && !(*err_code)) {
  1206. if (err_code4) {
  1207. size_t len = ioa_network_buffer_get_size(nbh);
  1208. stun_attr_add_address_error_code(ioa_network_buffer_data(nbh), &len,
  1209. STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_IPV4, err_code4);
  1210. ioa_network_buffer_set_size(nbh, len);
  1211. }
  1212. if (err_code6) {
  1213. size_t len = ioa_network_buffer_get_size(nbh);
  1214. stun_attr_add_address_error_code(ioa_network_buffer_data(nbh), &len,
  1215. STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_IPV6, err_code6);
  1216. ioa_network_buffer_set_size(nbh, len);
  1217. }
  1218. }
  1219. return 0;
  1220. }
  1221. static void copy_auth_parameters(ts_ur_super_session *orig_ss, ts_ur_super_session *ss) {
  1222. if (orig_ss && ss) {
  1223. dec_quota(ss);
  1224. memcpy(ss->nonce, orig_ss->nonce, sizeof(ss->nonce));
  1225. ss->nonce_expiration_time = orig_ss->nonce_expiration_time;
  1226. memcpy(&(ss->realm_options), &(orig_ss->realm_options), sizeof(ss->realm_options));
  1227. memcpy(ss->username, orig_ss->username, sizeof(ss->username));
  1228. ss->hmackey_set = orig_ss->hmackey_set;
  1229. memcpy(ss->hmackey, orig_ss->hmackey, sizeof(ss->hmackey));
  1230. ss->oauth = orig_ss->oauth;
  1231. memcpy(ss->origin, orig_ss->origin, sizeof(ss->origin));
  1232. ss->origin_set = orig_ss->origin_set;
  1233. memcpy(ss->pwd, orig_ss->pwd, sizeof(ss->pwd));
  1234. ss->max_session_time_auth = orig_ss->max_session_time_auth;
  1235. inc_quota(ss, ss->username);
  1236. }
  1237. }
  1238. static int handle_turn_refresh(turn_turnserver *server, ts_ur_super_session *ss, stun_tid *tid, int *resp_constructed,
  1239. int *err_code, const uint8_t **reason, uint16_t *unknown_attrs, uint16_t *ua_num,
  1240. ioa_net_data *in_buffer, ioa_network_buffer_handle nbh, int message_integrity,
  1241. int *no_response, int can_resume) {
  1242. allocation *a = get_allocation_ss(ss);
  1243. int af4c = 0;
  1244. int af6c = 0;
  1245. int af4 = 0;
  1246. int af6 = 0;
  1247. {
  1248. int i;
  1249. for (i = 0; i < ALLOC_PROTOCOLS_NUMBER; ++i) {
  1250. if (a->relay_sessions[i].s && !ioa_socket_tobeclosed(a->relay_sessions[i].s)) {
  1251. int family = get_ioa_socket_address_family(a->relay_sessions[i].s);
  1252. if (AF_INET == family) {
  1253. af4c = 1;
  1254. } else if (AF_INET6 == family) {
  1255. af6c = 1;
  1256. }
  1257. }
  1258. }
  1259. }
  1260. if (!is_allocation_valid(a) && !(*(server->mobility))) {
  1261. *err_code = 437;
  1262. *reason = (const uint8_t *)"Invalid allocation";
  1263. } else {
  1264. turn_time_t lifetime = 0;
  1265. int to_delete = 0;
  1266. mobile_id_t mid = 0;
  1267. char smid[sizeof(ss->s_mobile_id)] = "\0";
  1268. stun_attr_ref sar =
  1269. stun_attr_get_first_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh));
  1270. while (sar && (!(*err_code)) && (*ua_num < MAX_NUMBER_OF_UNKNOWN_ATTRS)) {
  1271. int attr_type = stun_attr_get_type(sar);
  1272. switch (attr_type) {
  1273. SKIP_ATTRIBUTES;
  1274. case STUN_ATTRIBUTE_MOBILITY_TICKET: {
  1275. if (!(*(server->mobility))) {
  1276. *err_code = 405;
  1277. *reason = (const uint8_t *)"Mobility forbidden";
  1278. } else {
  1279. int smid_len = stun_attr_get_len(sar);
  1280. if (smid_len > 0 && (((size_t)smid_len) < sizeof(smid))) {
  1281. const uint8_t *smid_val = stun_attr_get_value(sar);
  1282. if (smid_val) {
  1283. memcpy(smid, smid_val, (size_t)smid_len);
  1284. mid = string_to_mobile_id(smid);
  1285. if (is_allocation_valid(a) && (mid != ss->old_mobile_id)) {
  1286. *err_code = 400;
  1287. *reason =
  1288. (const uint8_t *)"Mobility ticket cannot be used for a stable, already established allocation";
  1289. }
  1290. }
  1291. } else {
  1292. *err_code = 400;
  1293. *reason = (const uint8_t *)"Mobility ticket has wrong length";
  1294. }
  1295. }
  1296. } break;
  1297. case STUN_ATTRIBUTE_LIFETIME: {
  1298. if (stun_attr_get_len(sar) != 4) {
  1299. *err_code = 400;
  1300. *reason = (const uint8_t *)"Wrong Lifetime field format";
  1301. } else {
  1302. const uint8_t *value = stun_attr_get_value(sar);
  1303. if (!value) {
  1304. *err_code = 400;
  1305. *reason = (const uint8_t *)"Wrong lifetime field data";
  1306. } else {
  1307. lifetime = nswap32(*((const uint32_t *)value));
  1308. if (!lifetime)
  1309. to_delete = 1;
  1310. }
  1311. }
  1312. } break;
  1313. case STUN_ATTRIBUTE_ADDITIONAL_ADDRESS_FAMILY: /* deprecated, for backward compatibility with older versions of
  1314. TURN-bis */
  1315. case STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY: {
  1316. int af_req = stun_get_requested_address_family(sar);
  1317. {
  1318. int is_err = 0;
  1319. switch (af_req) {
  1320. case STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_IPV4:
  1321. if (!af4c) {
  1322. is_err = 1;
  1323. } else {
  1324. af4 = 1;
  1325. }
  1326. break;
  1327. case STUN_ATTRIBUTE_REQUESTED_ADDRESS_FAMILY_VALUE_IPV6:
  1328. if (!af6c) {
  1329. is_err = 1;
  1330. } else {
  1331. af6 = 1;
  1332. }
  1333. break;
  1334. default:
  1335. is_err = 1;
  1336. }
  1337. if (is_err) {
  1338. *err_code = 443;
  1339. *reason = (const uint8_t *)"Peer Address Family Mismatch (1)";
  1340. }
  1341. }
  1342. } break;
  1343. default:
  1344. if (attr_type >= 0x0000 && attr_type <= 0x7FFF)
  1345. unknown_attrs[(*ua_num)++] = nswap16(attr_type);
  1346. };
  1347. sar = stun_attr_get_next_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh),
  1348. sar);
  1349. }
  1350. if (*ua_num > 0) {
  1351. *err_code = 420;
  1352. } else if (*err_code) {
  1353. ;
  1354. } else if (!is_allocation_valid(a)) {
  1355. if (mid && smid[0]) {
  1356. turnserver_id tsid = ((0xFF00000000000000LL) & mid) >> 56;
  1357. if (tsid != server->id) {
  1358. if (server->send_socket_to_relay) {
  1359. ioa_socket_handle new_s = detach_ioa_socket(ss->client_socket);
  1360. if (new_s) {
  1361. if (server->send_socket_to_relay(tsid, mid, tid, new_s, message_integrity, RMT_MOBILE_SOCKET, in_buffer,
  1362. can_resume) < 0) {
  1363. *err_code = 400;
  1364. *reason = (const uint8_t *)"Wrong mobile ticket";
  1365. } else {
  1366. *no_response = 1;
  1367. }
  1368. } else {
  1369. *err_code = 500;
  1370. *reason = (const uint8_t *)"Cannot create new socket";
  1371. return -1;
  1372. }
  1373. } else {
  1374. *err_code = 500;
  1375. *reason = (const uint8_t *)"Server send socket procedure is not set";
  1376. }
  1377. ss->to_be_closed = 1;
  1378. } else {
  1379. ts_ur_super_session *orig_ss = get_session_from_mobile_map(server, mid);
  1380. if (!orig_ss || orig_ss->to_be_closed || ioa_socket_tobeclosed(orig_ss->client_socket)) {
  1381. *err_code = 404;
  1382. *reason = (const uint8_t *)"Allocation not found";
  1383. } else if (orig_ss == ss) {
  1384. *err_code = 437;
  1385. *reason = (const uint8_t *)"Invalid allocation";
  1386. } else if (!(orig_ss->is_mobile)) {
  1387. *err_code = 500;
  1388. *reason = (const uint8_t *)"Software error: invalid mobile allocation";
  1389. } else if (orig_ss->client_socket == ss->client_socket) {
  1390. *err_code = 500;
  1391. *reason = (const uint8_t *)"Software error: invalid mobile client socket (orig)";
  1392. } else if (!(ss->client_socket)) {
  1393. *err_code = 500;
  1394. *reason = (const uint8_t *)"Software error: invalid mobile client socket (new)";
  1395. } else {
  1396. get_realm_options_by_name(orig_ss->realm_options.name, &(ss->realm_options));
  1397. // Check security:
  1398. int postpone_reply = 0;
  1399. if (!(ss->hmackey_set)) {
  1400. copy_auth_parameters(orig_ss, ss);
  1401. }
  1402. if (check_stun_auth(server, ss, tid, resp_constructed, err_code, reason, in_buffer, nbh,
  1403. STUN_METHOD_REFRESH, &message_integrity, &postpone_reply, can_resume) < 0) {
  1404. if (!(*err_code)) {
  1405. *err_code = 401;
  1406. }
  1407. }
  1408. if (postpone_reply) {
  1409. *no_response = 1;
  1410. } else if (!(*err_code)) {
  1411. // Session transfer:
  1412. if (to_delete)
  1413. lifetime = 0;
  1414. else {
  1415. lifetime = stun_adjust_allocate_lifetime(lifetime, *(server->max_allocate_lifetime),
  1416. ss->max_session_time_auth);
  1417. }
  1418. if (af4c && refresh_relay_connection(server, orig_ss, lifetime, 0, 0, 0, err_code, AF_INET) < 0) {
  1419. if (!(*err_code)) {
  1420. *err_code = 437;
  1421. *reason = (const uint8_t *)"Cannot refresh relay connection (internal error)";
  1422. }
  1423. } else if (af6c && refresh_relay_connection(server, orig_ss, lifetime, 0, 0, 0, err_code, AF_INET6) < 0) {
  1424. if (!(*err_code)) {
  1425. *err_code = 437;
  1426. *reason = (const uint8_t *)"Cannot refresh relay connection (internal error)";
  1427. }
  1428. } else {
  1429. // Transfer socket:
  1430. ioa_socket_handle s = detach_ioa_socket(ss->client_socket);
  1431. ss->to_be_closed = 1;
  1432. if (!s) {
  1433. *err_code = 500;
  1434. } else {
  1435. if (attach_socket_to_session(server, s, orig_ss) < 0) {
  1436. if (orig_ss->client_socket != s) {
  1437. IOA_CLOSE_SOCKET(s);
  1438. }
  1439. *err_code = 500;
  1440. } else {
  1441. if (ss->hmackey_set) {
  1442. copy_auth_parameters(ss, orig_ss);
  1443. }
  1444. delete_session_from_mobile_map(ss);
  1445. delete_session_from_mobile_map(orig_ss);
  1446. put_session_into_mobile_map(orig_ss);
  1447. // Use new buffer and redefine ss:
  1448. nbh = ioa_network_buffer_allocate(server->e);
  1449. dec_quota(ss);
  1450. ss = orig_ss;
  1451. inc_quota(ss, ss->username);
  1452. ss->old_mobile_id = mid;
  1453. size_t len = ioa_network_buffer_get_size(nbh);
  1454. turn_report_allocation_set(&(ss->alloc), lifetime, 1);
  1455. stun_init_success_response_str(STUN_METHOD_REFRESH, ioa_network_buffer_data(nbh), &len, tid);
  1456. uint32_t lt = nswap32(lifetime);
  1457. stun_attr_add_str(ioa_network_buffer_data(nbh), &len, STUN_ATTRIBUTE_LIFETIME, (const uint8_t *)&lt,
  1458. 4);
  1459. ioa_network_buffer_set_size(nbh, len);
  1460. stun_attr_add_str(ioa_network_buffer_data(nbh), &len, STUN_ATTRIBUTE_MOBILITY_TICKET,
  1461. (uint8_t *)ss->s_mobile_id, strlen(ss->s_mobile_id));
  1462. ioa_network_buffer_set_size(nbh, len);
  1463. if (!(*server->no_software_attribute)) {
  1464. const uint8_t *field = (const uint8_t *)get_version(server);
  1465. size_t fsz = strlen(get_version(server));
  1466. size_t len = ioa_network_buffer_get_size(nbh);
  1467. stun_attr_add_str(ioa_network_buffer_data(nbh), &len, STUN_ATTRIBUTE_SOFTWARE, field, fsz);
  1468. ioa_network_buffer_set_size(nbh, len);
  1469. }
  1470. if (message_integrity) {
  1471. size_t len = ioa_network_buffer_get_size(nbh);
  1472. stun_attr_add_integrity_str(server->ct, ioa_network_buffer_data(nbh), &len, ss->hmackey, ss->pwd,
  1473. SHATYPE_DEFAULT);
  1474. ioa_network_buffer_set_size(nbh, len);
  1475. }
  1476. if ((server->fingerprint) || ss->enforce_fingerprints) {
  1477. size_t len = ioa_network_buffer_get_size(nbh);
  1478. if (stun_attr_add_fingerprint_str(ioa_network_buffer_data(nbh), &len) < 0) {
  1479. *err_code = 500;
  1480. ioa_network_buffer_delete(server->e, nbh);
  1481. return -1;
  1482. }
  1483. ioa_network_buffer_set_size(nbh, len);
  1484. }
  1485. *no_response = 1;
  1486. return write_client_connection(server, ss, nbh, TTL_IGNORE, TOS_IGNORE);
  1487. }
  1488. }
  1489. }
  1490. }
  1491. report_turn_session_info(server, orig_ss, 0);
  1492. }
  1493. }
  1494. } else {
  1495. *err_code = 437;
  1496. *reason = (const uint8_t *)"Invalid allocation";
  1497. }
  1498. } else {
  1499. if (to_delete)
  1500. lifetime = 0;
  1501. else {
  1502. lifetime = stun_adjust_allocate_lifetime(lifetime, *(server->max_allocate_lifetime), ss->max_session_time_auth);
  1503. }
  1504. if (!af4 && !af6) {
  1505. af4 = af4c;
  1506. af6 = af6c;
  1507. }
  1508. if (af4 && refresh_relay_connection(server, ss, lifetime, 0, 0, 0, err_code, AF_INET) < 0) {
  1509. if (!(*err_code)) {
  1510. *err_code = 437;
  1511. *reason = (const uint8_t *)"Cannot refresh relay connection (internal error)";
  1512. }
  1513. } else if (af6 && refresh_relay_connection(server, ss, lifetime, 0, 0, 0, err_code, AF_INET6) < 0) {
  1514. if (!(*err_code)) {
  1515. *err_code = 437;
  1516. *reason = (const uint8_t *)"Cannot refresh relay connection (internal error)";
  1517. }
  1518. } else {
  1519. turn_report_allocation_set(&(ss->alloc), lifetime, 1);
  1520. size_t len = ioa_network_buffer_get_size(nbh);
  1521. stun_init_success_response_str(STUN_METHOD_REFRESH, ioa_network_buffer_data(nbh), &len, tid);
  1522. if (ss->s_mobile_id[0]) {
  1523. stun_attr_add_str(ioa_network_buffer_data(nbh), &len, STUN_ATTRIBUTE_MOBILITY_TICKET,
  1524. (uint8_t *)ss->s_mobile_id, strlen(ss->s_mobile_id));
  1525. ioa_network_buffer_set_size(nbh, len);
  1526. }
  1527. uint32_t lt = nswap32(lifetime);
  1528. stun_attr_add_str(ioa_network_buffer_data(nbh), &len, STUN_ATTRIBUTE_LIFETIME, (const uint8_t *)&lt, 4);
  1529. ioa_network_buffer_set_size(nbh, len);
  1530. *resp_constructed = 1;
  1531. }
  1532. }
  1533. }
  1534. if (!no_response) {
  1535. if (!(*resp_constructed)) {
  1536. if (!(*err_code)) {
  1537. *err_code = 437;
  1538. }
  1539. size_t len = ioa_network_buffer_get_size(nbh);
  1540. stun_init_error_response_str(STUN_METHOD_REFRESH, ioa_network_buffer_data(nbh), &len, *err_code, *reason, tid);
  1541. ioa_network_buffer_set_size(nbh, len);
  1542. *resp_constructed = 1;
  1543. }
  1544. }
  1545. return 0;
  1546. }
  1547. /* RFC 6062 ==>> */
  1548. static void tcp_deliver_delayed_buffer(unsent_buffer *ub, ioa_socket_handle s, ts_ur_super_session *ss) {
  1549. if (ub && s && ub->bufs && ub->sz && ss) {
  1550. size_t i = 0;
  1551. do {
  1552. ioa_network_buffer_handle nbh = top_unsent_buffer(ub);
  1553. if (!nbh)
  1554. break;
  1555. uint32_t bytes = (uint32_t)ioa_network_buffer_get_size(nbh);
  1556. int ret = send_data_from_ioa_socket_nbh(s, NULL, nbh, TTL_IGNORE, TOS_IGNORE, NULL);
  1557. if (ret < 0) {
  1558. set_ioa_socket_tobeclosed(s);
  1559. } else {
  1560. ++(ss->sent_packets);
  1561. ss->sent_bytes += bytes;
  1562. turn_report_session_usage(ss, 0);
  1563. }
  1564. pop_unsent_buffer(ub);
  1565. } while (!ioa_socket_tobeclosed(s) && ((i++) < MAX_UNSENT_BUFFER_SIZE));
  1566. }
  1567. }
  1568. static void tcp_peer_input_handler(ioa_socket_handle s, int event_type, ioa_net_data *in_buffer, void *arg,
  1569. int can_resume) {
  1570. if (!(event_type & IOA_EV_READ) || !arg)
  1571. return;
  1572. UNUSED_ARG(s);
  1573. UNUSED_ARG(can_resume);
  1574. tcp_connection *tc = (tcp_connection *)arg;
  1575. ts_ur_super_session *ss = NULL;
  1576. allocation *a = (allocation *)tc->owner;
  1577. if (a) {
  1578. ss = (ts_ur_super_session *)a->owner;
  1579. }
  1580. if ((tc->state != TC_STATE_READY) || !(tc->client_s)) {
  1581. add_unsent_buffer(&(tc->ub_to_client), in_buffer->nbh);
  1582. in_buffer->nbh = NULL;
  1583. return;
  1584. }
  1585. ioa_network_buffer_handle nbh = in_buffer->nbh;
  1586. in_buffer->nbh = NULL;
  1587. uint32_t bytes = (uint32_t)ioa_network_buffer_get_size(nbh);
  1588. if (ss) {
  1589. ++(ss->peer_received_packets);
  1590. ss->peer_received_bytes += bytes;
  1591. }
  1592. int ret = send_data_from_ioa_socket_nbh(tc->client_s, NULL, nbh, TTL_IGNORE, TOS_IGNORE, NULL);
  1593. if (ret < 0) {
  1594. set_ioa_socket_tobeclosed(s);
  1595. } else if (ss) {
  1596. ++(ss->sent_packets);
  1597. ss->sent_bytes += bytes;
  1598. }
  1599. if (ss) {
  1600. turn_report_session_usage(ss, 0);
  1601. }
  1602. }
  1603. static void tcp_client_input_handler_rfc6062data(ioa_socket_handle s, int event_type, ioa_net_data *in_buffer,
  1604. void *arg, int can_resume) {
  1605. if (!(event_type & IOA_EV_READ) || !arg)
  1606. return;
  1607. UNUSED_ARG(s);
  1608. UNUSED_ARG(can_resume);
  1609. tcp_connection *tc = (tcp_connection *)arg;
  1610. ts_ur_super_session *ss = NULL;
  1611. allocation *a = (allocation *)tc->owner;
  1612. if (a) {
  1613. ss = (ts_ur_super_session *)a->owner;
  1614. }
  1615. if (tc->state != TC_STATE_READY)
  1616. return;
  1617. if (!(tc->peer_s))
  1618. return;
  1619. ioa_network_buffer_handle nbh = in_buffer->nbh;
  1620. in_buffer->nbh = NULL;
  1621. uint32_t bytes = (uint32_t)ioa_network_buffer_get_size(nbh);
  1622. if (ss) {
  1623. ++(ss->received_packets);
  1624. ss->received_bytes += bytes;
  1625. }
  1626. int skip = 0;
  1627. int ret = send_data_from_ioa_socket_nbh(tc->peer_s, NULL, nbh, TTL_IGNORE, TOS_IGNORE, &skip);
  1628. if (ret < 0) {
  1629. set_ioa_socket_tobeclosed(s);
  1630. }
  1631. if (!skip && ss) {
  1632. ++(ss->peer_sent_packets);
  1633. ss->peer_sent_bytes += bytes;
  1634. }
  1635. if (ss)
  1636. turn_report_session_usage(ss, 0);
  1637. }
  1638. static void tcp_conn_bind_timeout_handler(ioa_engine_handle e, void *arg) {
  1639. UNUSED_ARG(e);
  1640. if (arg) {
  1641. tcp_connection *tc = (tcp_connection *)arg;
  1642. delete_tcp_connection(tc);
  1643. }
  1644. }
  1645. static void tcp_peer_connection_completed_callback(int success, void *arg) {
  1646. if (arg) {
  1647. tcp_connection *tc = (tcp_connection *)arg;
  1648. allocation *a = (allocation *)(tc->owner);
  1649. ts_ur_super_session *ss = (ts_ur_super_session *)(a->owner);
  1650. turn_turnserver *server = (turn_turnserver *)(ss->server);
  1651. int err_code = 0;
  1652. IOA_EVENT_DEL(tc->peer_conn_timeout);
  1653. ioa_network_buffer_handle nbh = ioa_network_buffer_allocate(server->e);
  1654. size_t len = ioa_network_buffer_get_size(nbh);
  1655. if (success) {
  1656. if (register_callback_on_ioa_socket(server->e, tc->peer_s, IOA_EV_READ, tcp_peer_input_handler, tc, 1) < 0) {
  1657. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "%s: cannot set TCP peer data input callback\n", __FUNCTION__);
  1658. success = 0;
  1659. err_code = 500;
  1660. }
  1661. }
  1662. if (success) {
  1663. tc->state = TC_STATE_PEER_CONNECTED;
  1664. stun_init_success_response_str(STUN_METHOD_CONNECT, ioa_network_buffer_data(nbh), &len, &(tc->tid));
  1665. stun_attr_add_str(ioa_network_buffer_data(nbh), &len, STUN_ATTRIBUTE_CONNECTION_ID, (const uint8_t *)&(tc->id),
  1666. 4);
  1667. IOA_EVENT_DEL(tc->conn_bind_timeout);
  1668. tc->conn_bind_timeout = set_ioa_timer(server->e, TCP_CONN_BIND_TIMEOUT, 0, tcp_conn_bind_timeout_handler, tc, 0,
  1669. "tcp_conn_bind_timeout_handler");
  1670. } else {
  1671. tc->state = TC_STATE_FAILED;
  1672. if (!err_code) {
  1673. err_code = 447;
  1674. }
  1675. {
  1676. char ls[257] = "\0";
  1677. char rs[257] = "\0";
  1678. ioa_addr *laddr = get_local_addr_from_ioa_socket(ss->client_socket);
  1679. if (laddr)
  1680. addr_to_string(laddr, (uint8_t *)ls);
  1681. addr_to_string(&(tc->peer_addr), (uint8_t *)rs);
  1682. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: failure to connect from %s to %s\n", __FUNCTION__, ls, rs);
  1683. }
  1684. stun_init_error_response_str(STUN_METHOD_CONNECT, ioa_network_buffer_data(nbh), &len, err_code, NULL, &(tc->tid));
  1685. }
  1686. ioa_network_buffer_set_size(nbh, len);
  1687. if (need_stun_authentication(server, ss)) {
  1688. stun_attr_add_integrity_str(server->ct, ioa_network_buffer_data(nbh), &len, ss->hmackey, ss->pwd,
  1689. SHATYPE_DEFAULT);
  1690. ioa_network_buffer_set_size(nbh, len);
  1691. }
  1692. write_client_connection(server, ss, nbh, TTL_IGNORE, TOS_IGNORE);
  1693. if (!success) {
  1694. delete_tcp_connection(tc);
  1695. }
  1696. /* test */
  1697. else if (0) {
  1698. int i = 0;
  1699. for (i = 0; i < 22; i++) {
  1700. ioa_network_buffer_handle nbh_test = ioa_network_buffer_allocate(server->e);
  1701. size_t len_test = ioa_network_buffer_get_size(nbh_test);
  1702. uint8_t *data = ioa_network_buffer_data(nbh_test);
  1703. const char *data_test = "111.111.111.111.111";
  1704. len_test = strlen(data_test);
  1705. memcpy(data, data_test, len_test);
  1706. ioa_network_buffer_set_size(nbh_test, len_test);
  1707. send_data_from_ioa_socket_nbh(tc->peer_s, NULL, nbh_test, TTL_IGNORE, TOS_IGNORE, NULL);
  1708. }
  1709. }
  1710. }
  1711. }
  1712. static void tcp_peer_conn_timeout_handler(ioa_engine_handle e, void *arg) {
  1713. UNUSED_ARG(e);
  1714. tcp_peer_connection_completed_callback(0, arg);
  1715. }
  1716. static int tcp_start_connection_to_peer(turn_turnserver *server, ts_ur_super_session *ss, stun_tid *tid, allocation *a,
  1717. ioa_addr *peer_addr, int *err_code, const uint8_t **reason) {
  1718. FUNCSTART;
  1719. if (!ss) {
  1720. *err_code = 500;
  1721. *reason = (const uint8_t *)"Server error: empty session";
  1722. FUNCEND;
  1723. return -1;
  1724. }
  1725. if (!peer_addr) {
  1726. *err_code = 500;
  1727. *reason = (const uint8_t *)"Server error: empty peer addr";
  1728. FUNCEND;
  1729. return -1;
  1730. }
  1731. if (!get_relay_socket(a, peer_addr->ss.sa_family)) {
  1732. *err_code = 500;
  1733. *reason = (const uint8_t *)"Server error: no relay connection created";
  1734. FUNCEND;
  1735. return -1;
  1736. }
  1737. tcp_connection *tc = get_tcp_connection_by_peer(a, peer_addr);
  1738. if (tc) {
  1739. *err_code = 446;
  1740. FUNCEND;
  1741. return -1;
  1742. }
  1743. tc = create_tcp_connection(server->id, a, tid, peer_addr, err_code);
  1744. if (!tc) {
  1745. if (!(*err_code)) {
  1746. *err_code = 500;
  1747. *reason = (const uint8_t *)"Server error: TCP connection object creation failed";
  1748. }
  1749. FUNCEND;
  1750. return -1;
  1751. } else if (*err_code) {
  1752. delete_tcp_connection(tc);
  1753. FUNCEND;
  1754. return -1;
  1755. }
  1756. IOA_EVENT_DEL(tc->peer_conn_timeout);
  1757. tc->peer_conn_timeout = set_ioa_timer(server->e, TCP_PEER_CONN_TIMEOUT, 0, tcp_peer_conn_timeout_handler, tc, 0,
  1758. "tcp_peer_conn_timeout_handler");
  1759. ioa_socket_handle tcs = ioa_create_connecting_tcp_relay_socket(get_relay_socket(a, peer_addr->ss.sa_family),
  1760. peer_addr, tcp_peer_connection_completed_callback, tc);
  1761. if (!tcs) {
  1762. delete_tcp_connection(tc);
  1763. *err_code = 500;
  1764. *reason = (const uint8_t *)"Server error: TCP relay socket for connection cannot be created";
  1765. FUNCEND;
  1766. return -1;
  1767. }
  1768. tc->state = TC_STATE_CLIENT_TO_PEER_CONNECTING;
  1769. if (tc->peer_s != tcs) {
  1770. IOA_CLOSE_SOCKET(tc->peer_s);
  1771. tc->peer_s = tcs;
  1772. }
  1773. set_ioa_socket_sub_session(tc->peer_s, tc);
  1774. FUNCEND;
  1775. return 0;
  1776. }
  1777. static void tcp_peer_accept_connection(ioa_socket_handle s, void *arg) {
  1778. if (s) {
  1779. if (!arg) {
  1780. close_ioa_socket(s);
  1781. return;
  1782. }
  1783. ts_ur_super_session *ss = (ts_ur_super_session *)arg;
  1784. turn_turnserver *server = (turn_turnserver *)(ss->server);
  1785. FUNCSTART;
  1786. allocation *a = &(ss->alloc);
  1787. ioa_addr *peer_addr = get_remote_addr_from_ioa_socket(s);
  1788. if (!peer_addr) {
  1789. close_ioa_socket(s);
  1790. FUNCEND;
  1791. return;
  1792. }
  1793. tcp_connection *tc = get_tcp_connection_by_peer(a, peer_addr);
  1794. if (tc) {
  1795. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "%s: peer data socket with this address already exist\n", __FUNCTION__);
  1796. if (tc->peer_s != s)
  1797. close_ioa_socket(s);
  1798. FUNCEND;
  1799. return;
  1800. }
  1801. if (!good_peer_addr(server, ss->realm_options.name, peer_addr, ss->id)) {
  1802. uint8_t saddr[256];
  1803. addr_to_string(peer_addr, saddr);
  1804. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "%s: an attempt to connect from a peer with forbidden address: %s\n",
  1805. __FUNCTION__, saddr);
  1806. close_ioa_socket(s);
  1807. FUNCEND;
  1808. return;
  1809. }
  1810. if (!can_accept_tcp_connection_from_peer(a, peer_addr, server->server_relay)) {
  1811. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "%s: peer has no permission to connect\n", __FUNCTION__);
  1812. close_ioa_socket(s);
  1813. FUNCEND;
  1814. return;
  1815. }
  1816. stun_tid tid;
  1817. memset(&tid, 0, sizeof(stun_tid));
  1818. int err_code = 0;
  1819. tc = create_tcp_connection(server->id, a, &tid, peer_addr, &err_code);
  1820. if (!tc) {
  1821. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "%s: cannot create TCP connection\n", __FUNCTION__);
  1822. close_ioa_socket(s);
  1823. FUNCEND;
  1824. return;
  1825. }
  1826. tc->state = TC_STATE_PEER_CONNECTED;
  1827. tc->peer_s = s;
  1828. set_ioa_socket_session(s, ss);
  1829. set_ioa_socket_sub_session(s, tc);
  1830. if (register_callback_on_ioa_socket(server->e, s, IOA_EV_READ, tcp_peer_input_handler, tc, 1) < 0) {
  1831. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "%s: cannot set TCP peer data input callback\n", __FUNCTION__);
  1832. IOA_CLOSE_SOCKET(tc->peer_s);
  1833. tc->state = TC_STATE_UNKNOWN;
  1834. FUNCEND;
  1835. return;
  1836. }
  1837. IOA_EVENT_DEL(tc->conn_bind_timeout);
  1838. tc->conn_bind_timeout = set_ioa_timer(server->e, TCP_CONN_BIND_TIMEOUT, 0, tcp_conn_bind_timeout_handler, tc, 0,
  1839. "tcp_conn_bind_timeout_handler");
  1840. ioa_network_buffer_handle nbh = ioa_network_buffer_allocate(server->e);
  1841. size_t len = ioa_network_buffer_get_size(nbh);
  1842. stun_init_indication_str(STUN_METHOD_CONNECTION_ATTEMPT, ioa_network_buffer_data(nbh), &len);
  1843. stun_attr_add_str(ioa_network_buffer_data(nbh), &len, STUN_ATTRIBUTE_CONNECTION_ID, (const uint8_t *)&(tc->id), 4);
  1844. stun_attr_add_addr_str(ioa_network_buffer_data(nbh), &len, STUN_ATTRIBUTE_XOR_PEER_ADDRESS, peer_addr);
  1845. ioa_network_buffer_set_size(nbh, len);
  1846. if (!(*server->no_software_attribute)) {
  1847. const uint8_t *field = (const uint8_t *)get_version(server);
  1848. size_t fsz = strlen(get_version(server));
  1849. size_t len = ioa_network_buffer_get_size(nbh);
  1850. stun_attr_add_str(ioa_network_buffer_data(nbh), &len, STUN_ATTRIBUTE_SOFTWARE, field, fsz);
  1851. ioa_network_buffer_set_size(nbh, len);
  1852. }
  1853. if ((server->fingerprint) || ss->enforce_fingerprints) {
  1854. size_t len = ioa_network_buffer_get_size(nbh);
  1855. stun_attr_add_fingerprint_str(ioa_network_buffer_data(nbh), &len);
  1856. ioa_network_buffer_set_size(nbh, len);
  1857. }
  1858. write_client_connection(server, ss, nbh, TTL_IGNORE, TOS_IGNORE);
  1859. FUNCEND;
  1860. }
  1861. }
  1862. static int handle_turn_connect(turn_turnserver *server, ts_ur_super_session *ss, stun_tid *tid, int *err_code,
  1863. const uint8_t **reason, uint16_t *unknown_attrs, uint16_t *ua_num,
  1864. ioa_net_data *in_buffer) {
  1865. FUNCSTART;
  1866. ioa_addr peer_addr;
  1867. int peer_found = 0;
  1868. addr_set_any(&peer_addr);
  1869. allocation *a = get_allocation_ss(ss);
  1870. if (!(ss->is_tcp_relay)) {
  1871. *err_code = 403;
  1872. *reason = (const uint8_t *)"Connect cannot be used with UDP relay";
  1873. } else if (!is_allocation_valid(a)) {
  1874. *err_code = 437;
  1875. } else {
  1876. stun_attr_ref sar =
  1877. stun_attr_get_first_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh));
  1878. while (sar && (!(*err_code)) && (*ua_num < MAX_NUMBER_OF_UNKNOWN_ATTRS)) {
  1879. int attr_type = stun_attr_get_type(sar);
  1880. switch (attr_type) {
  1881. SKIP_ATTRIBUTES;
  1882. case STUN_ATTRIBUTE_XOR_PEER_ADDRESS: {
  1883. if (stun_attr_get_addr_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh),
  1884. sar, &peer_addr, NULL) == -1) {
  1885. *err_code = 400;
  1886. *reason = (const uint8_t *)"Bad Peer Address";
  1887. } else {
  1888. if (!get_relay_socket(a, peer_addr.ss.sa_family)) {
  1889. *err_code = 443;
  1890. *reason = (const uint8_t *)"Peer Address Family Mismatch (2)";
  1891. }
  1892. peer_found = 1;
  1893. }
  1894. break;
  1895. }
  1896. default:
  1897. if (attr_type >= 0x0000 && attr_type <= 0x7FFF)
  1898. unknown_attrs[(*ua_num)++] = nswap16(attr_type);
  1899. };
  1900. sar = stun_attr_get_next_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh),
  1901. sar);
  1902. }
  1903. if (*ua_num > 0) {
  1904. *err_code = 420;
  1905. } else if (*err_code) {
  1906. ;
  1907. } else if (!peer_found) {
  1908. *err_code = 400;
  1909. *reason = (const uint8_t *)"Where is Peer Address ?";
  1910. } else {
  1911. if (!good_peer_addr(server, ss->realm_options.name, &peer_addr, ss->id)) {
  1912. *err_code = 403;
  1913. *reason = (const uint8_t *)"Forbidden IP";
  1914. } else {
  1915. tcp_start_connection_to_peer(server, ss, tid, a, &peer_addr, err_code, reason);
  1916. }
  1917. }
  1918. }
  1919. FUNCEND;
  1920. return 0;
  1921. }
  1922. static int handle_turn_connection_bind(turn_turnserver *server, ts_ur_super_session *ss, stun_tid *tid,
  1923. int *resp_constructed, int *err_code, const uint8_t **reason,
  1924. uint16_t *unknown_attrs, uint16_t *ua_num, ioa_net_data *in_buffer,
  1925. ioa_network_buffer_handle nbh, int message_integrity, int can_resume) {
  1926. allocation *a = get_allocation_ss(ss);
  1927. uint16_t method = STUN_METHOD_CONNECTION_BIND;
  1928. if (ss->to_be_closed) {
  1929. *err_code = 400;
  1930. } else if (is_allocation_valid(a)) {
  1931. *err_code = 400;
  1932. *reason = (const uint8_t *)"Bad request: CONNECTION_BIND cannot be issued after allocation";
  1933. } else if (!is_stream_socket(get_ioa_socket_type(ss->client_socket))) {
  1934. *err_code = 400;
  1935. *reason = (const uint8_t *)"Bad request: CONNECTION_BIND only possible with TCP/TLS";
  1936. } else {
  1937. tcp_connection_id id = 0;
  1938. stun_attr_ref sar =
  1939. stun_attr_get_first_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh));
  1940. while (sar && (!(*err_code)) && (*ua_num < MAX_NUMBER_OF_UNKNOWN_ATTRS)) {
  1941. int attr_type = stun_attr_get_type(sar);
  1942. switch (attr_type) {
  1943. SKIP_ATTRIBUTES;
  1944. case STUN_ATTRIBUTE_CONNECTION_ID: {
  1945. if (stun_attr_get_len(sar) != 4) {
  1946. *err_code = 400;
  1947. *reason = (const uint8_t *)"Wrong Connection ID field format";
  1948. } else {
  1949. const uint8_t *value = stun_attr_get_value(sar);
  1950. if (!value) {
  1951. *err_code = 400;
  1952. *reason = (const uint8_t *)"Wrong Connection ID field data";
  1953. } else {
  1954. id = *((const uint32_t *)value); // AS-IS encoding, no conversion to/from network byte order
  1955. }
  1956. }
  1957. } break;
  1958. default:
  1959. if (attr_type >= 0x0000 && attr_type <= 0x7FFF)
  1960. unknown_attrs[(*ua_num)++] = nswap16(attr_type);
  1961. };
  1962. sar = stun_attr_get_next_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh),
  1963. sar);
  1964. }
  1965. if (*ua_num > 0) {
  1966. *err_code = 420;
  1967. } else if (*err_code) {
  1968. ;
  1969. } else {
  1970. if (server->send_socket_to_relay) {
  1971. turnserver_id sid = (id & 0xFF000000) >> 24;
  1972. ioa_socket_handle s = ss->client_socket;
  1973. if (s && !ioa_socket_tobeclosed(s)) {
  1974. ioa_socket_handle new_s = detach_ioa_socket(s);
  1975. if (new_s) {
  1976. if (server->send_socket_to_relay(sid, id, tid, new_s, message_integrity, RMT_CB_SOCKET, in_buffer,
  1977. can_resume) < 0) {
  1978. *err_code = 400;
  1979. *reason = (const uint8_t *)"Wrong connection id";
  1980. }
  1981. } else {
  1982. *err_code = 500;
  1983. }
  1984. } else {
  1985. *err_code = 500;
  1986. }
  1987. } else {
  1988. *err_code = 500;
  1989. }
  1990. ss->to_be_closed = 1;
  1991. }
  1992. }
  1993. if (!(*resp_constructed) && ss->client_socket && !ioa_socket_tobeclosed(ss->client_socket)) {
  1994. if (!(*err_code)) {
  1995. *err_code = 437;
  1996. }
  1997. size_t len = ioa_network_buffer_get_size(nbh);
  1998. stun_init_error_response_str(method, ioa_network_buffer_data(nbh), &len, *err_code, *reason, tid);
  1999. ioa_network_buffer_set_size(nbh, len);
  2000. *resp_constructed = 1;
  2001. }
  2002. return 0;
  2003. }
  2004. int turnserver_accept_tcp_client_data_connection(turn_turnserver *server, tcp_connection_id tcid, stun_tid *tid,
  2005. ioa_socket_handle s, int message_integrity, ioa_net_data *in_buffer,
  2006. int can_resume) {
  2007. if (!server)
  2008. return -1;
  2009. FUNCSTART;
  2010. tcp_connection *tc = NULL;
  2011. ts_ur_super_session *ss = NULL;
  2012. int err_code = 0;
  2013. const uint8_t *reason = NULL;
  2014. ioa_socket_handle s_to_delete = s;
  2015. if (tcid && tid && s) {
  2016. tc = get_tcp_connection_by_id(server->tcp_relay_connections, tcid);
  2017. ioa_network_buffer_handle nbh = ioa_network_buffer_allocate(server->e);
  2018. int resp_constructed = 0;
  2019. if (!tc || (tc->state == TC_STATE_READY) || (tc->client_s)) {
  2020. err_code = 400;
  2021. } else {
  2022. allocation *a = (allocation *)(tc->owner);
  2023. if (!a || !(a->owner)) {
  2024. err_code = 500;
  2025. } else {
  2026. ss = (ts_ur_super_session *)(a->owner);
  2027. if (ss->to_be_closed || ioa_socket_tobeclosed(ss->client_socket)) {
  2028. err_code = 404;
  2029. } else {
  2030. // Check security:
  2031. int postpone_reply = 0;
  2032. check_stun_auth(server, ss, tid, &resp_constructed, &err_code, &reason, in_buffer, nbh,
  2033. STUN_METHOD_CONNECTION_BIND, &message_integrity, &postpone_reply, can_resume);
  2034. if (postpone_reply) {
  2035. ioa_network_buffer_delete(server->e, nbh);
  2036. return 0;
  2037. } else if (!err_code) {
  2038. tc->state = TC_STATE_READY;
  2039. tc->client_s = s;
  2040. s_to_delete = NULL;
  2041. set_ioa_socket_session(s, ss);
  2042. set_ioa_socket_sub_session(s, tc);
  2043. set_ioa_socket_app_type(s, TCP_CLIENT_DATA_SOCKET);
  2044. if (register_callback_on_ioa_socket(server->e, s, IOA_EV_READ, tcp_client_input_handler_rfc6062data, tc,
  2045. 1) < 0) {
  2046. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "%s: cannot set TCP client data input callback\n", __FUNCTION__);
  2047. err_code = 500;
  2048. } else {
  2049. IOA_EVENT_DEL(tc->conn_bind_timeout);
  2050. }
  2051. }
  2052. }
  2053. }
  2054. }
  2055. if (tc)
  2056. get_and_clean_tcp_connection_by_id(server->tcp_relay_connections, tcid);
  2057. if (!resp_constructed) {
  2058. if (!err_code) {
  2059. size_t len = ioa_network_buffer_get_size(nbh);
  2060. stun_init_success_response_str(STUN_METHOD_CONNECTION_BIND, ioa_network_buffer_data(nbh), &len, tid);
  2061. ioa_network_buffer_set_size(nbh, len);
  2062. } else {
  2063. size_t len = ioa_network_buffer_get_size(nbh);
  2064. stun_init_error_response_str(STUN_METHOD_CONNECTION_BIND, ioa_network_buffer_data(nbh), &len, err_code, NULL,
  2065. tid);
  2066. ioa_network_buffer_set_size(nbh, len);
  2067. }
  2068. }
  2069. if (!(*server->no_software_attribute)) {
  2070. size_t fsz = strlen(get_version(server));
  2071. const uint8_t *field = (const uint8_t *)get_version(server);
  2072. size_t len = ioa_network_buffer_get_size(nbh);
  2073. stun_attr_add_str(ioa_network_buffer_data(nbh), &len, STUN_ATTRIBUTE_SOFTWARE, field, fsz);
  2074. ioa_network_buffer_set_size(nbh, len);
  2075. }
  2076. if (message_integrity && ss) {
  2077. size_t len = ioa_network_buffer_get_size(nbh);
  2078. stun_attr_add_integrity_str(server->ct, ioa_network_buffer_data(nbh), &len, ss->hmackey, ss->pwd,
  2079. SHATYPE_DEFAULT);
  2080. ioa_network_buffer_set_size(nbh, len);
  2081. }
  2082. if ((server->fingerprint) || (ss && (ss->enforce_fingerprints))) {
  2083. size_t len = ioa_network_buffer_get_size(nbh);
  2084. stun_attr_add_fingerprint_str(ioa_network_buffer_data(nbh), &len);
  2085. ioa_network_buffer_set_size(nbh, len);
  2086. }
  2087. if (server->verbose) {
  2088. log_method(ss, "CONNECTION_BIND", err_code, reason);
  2089. }
  2090. if (ss && !err_code) {
  2091. send_data_from_ioa_socket_nbh(s, NULL, nbh, TTL_IGNORE, TOS_IGNORE, NULL);
  2092. tcp_deliver_delayed_buffer(&(tc->ub_to_client), s, ss);
  2093. IOA_CLOSE_SOCKET(s_to_delete);
  2094. FUNCEND;
  2095. return 0;
  2096. } else {
  2097. /* Just to set the necessary structures for the packet sending: */
  2098. if (register_callback_on_ioa_socket(server->e, s, IOA_EV_READ, NULL, NULL, 1) < 0) {
  2099. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "%s: cannot set TCP tmp client data input callback\n", __FUNCTION__);
  2100. ioa_network_buffer_delete(server->e, nbh);
  2101. } else {
  2102. send_data_from_ioa_socket_nbh(s, NULL, nbh, TTL_IGNORE, TOS_IGNORE, NULL);
  2103. }
  2104. }
  2105. }
  2106. IOA_CLOSE_SOCKET(s_to_delete);
  2107. FUNCEND;
  2108. return -1;
  2109. }
  2110. /* <<== RFC 6062 */
  2111. static int handle_turn_channel_bind(turn_turnserver *server, ts_ur_super_session *ss, stun_tid *tid,
  2112. int *resp_constructed, int *err_code, const uint8_t **reason,
  2113. uint16_t *unknown_attrs, uint16_t *ua_num, ioa_net_data *in_buffer,
  2114. ioa_network_buffer_handle nbh) {
  2115. FUNCSTART;
  2116. uint16_t chnum = 0;
  2117. ioa_addr peer_addr;
  2118. addr_set_any(&peer_addr);
  2119. allocation *a = get_allocation_ss(ss);
  2120. int addr_found = 0;
  2121. if (ss->is_tcp_relay) {
  2122. *err_code = 403;
  2123. *reason = (const uint8_t *)"Channel bind cannot be used with TCP relay";
  2124. } else if (is_allocation_valid(a)) {
  2125. stun_attr_ref sar =
  2126. stun_attr_get_first_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh));
  2127. while (sar && (!(*err_code)) && (*ua_num < MAX_NUMBER_OF_UNKNOWN_ATTRS)) {
  2128. int attr_type = stun_attr_get_type(sar);
  2129. switch (attr_type) {
  2130. SKIP_ATTRIBUTES;
  2131. case STUN_ATTRIBUTE_CHANNEL_NUMBER: {
  2132. if (chnum) {
  2133. chnum = 0;
  2134. *err_code = 400;
  2135. *reason = (const uint8_t *)"Channel number cannot be duplicated in this request";
  2136. break;
  2137. }
  2138. chnum = stun_attr_get_channel_number(sar);
  2139. if (!chnum) {
  2140. *err_code = 400;
  2141. *reason = (const uint8_t *)"Channel number cannot be zero in this request";
  2142. break;
  2143. }
  2144. } break;
  2145. case STUN_ATTRIBUTE_XOR_PEER_ADDRESS: {
  2146. stun_attr_get_addr_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh),
  2147. sar, &peer_addr, NULL);
  2148. if (!get_relay_socket(a, peer_addr.ss.sa_family)) {
  2149. *err_code = 443;
  2150. *reason = (const uint8_t *)"Peer Address Family Mismatch (3)";
  2151. }
  2152. if (addr_get_port(&peer_addr) < 1) {
  2153. *err_code = 400;
  2154. *reason = (const uint8_t *)"Empty port number in channel bind request";
  2155. } else {
  2156. addr_found = 1;
  2157. }
  2158. break;
  2159. }
  2160. default:
  2161. if (attr_type >= 0x0000 && attr_type <= 0x7FFF)
  2162. unknown_attrs[(*ua_num)++] = nswap16(attr_type);
  2163. };
  2164. sar = stun_attr_get_next_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh),
  2165. sar);
  2166. }
  2167. if (*ua_num > 0) {
  2168. *err_code = 420;
  2169. } else if (*err_code) {
  2170. ;
  2171. } else if (!chnum || addr_any(&peer_addr) || !addr_found) {
  2172. *err_code = 400;
  2173. *reason = (const uint8_t *)"Bad channel bind request";
  2174. } else if (!STUN_VALID_CHANNEL(chnum)) {
  2175. *err_code = 400;
  2176. *reason = (const uint8_t *)"Bad channel number";
  2177. } else {
  2178. ch_info *chn = allocation_get_ch_info(a, chnum);
  2179. turn_permission_info *tinfo = NULL;
  2180. if (chn) {
  2181. if (!addr_eq(&peer_addr, &(chn->peer_addr))) {
  2182. *err_code = 400;
  2183. *reason = (const uint8_t *)"You cannot use the same channel number with different peer";
  2184. } else {
  2185. tinfo = (turn_permission_info *)(chn->owner);
  2186. if (!tinfo) {
  2187. *err_code = 500;
  2188. *reason = (const uint8_t *)"Wrong permission info";
  2189. } else {
  2190. if (!addr_eq_no_port(&peer_addr, &(tinfo->addr))) {
  2191. *err_code = 500;
  2192. *reason = (const uint8_t *)"Wrong permission info and peer addr combination";
  2193. } else if (chn->port != addr_get_port(&peer_addr)) {
  2194. *err_code = 500;
  2195. *reason = (const uint8_t *)"Wrong port number";
  2196. }
  2197. }
  2198. }
  2199. } else {
  2200. chn = allocation_get_ch_info_by_peer_addr(a, &peer_addr);
  2201. if (chn) {
  2202. *err_code = 400;
  2203. *reason = (const uint8_t *)"You cannot use the same peer with different channel number";
  2204. } else {
  2205. if (!good_peer_addr(server, ss->realm_options.name, &peer_addr, ss->id)) {
  2206. *err_code = 403;
  2207. *reason = (const uint8_t *)"Forbidden IP";
  2208. } else {
  2209. chn = allocation_get_new_ch_info(a, chnum, &peer_addr);
  2210. if (!chn) {
  2211. *err_code = 500;
  2212. *reason = (const uint8_t *)"Cannot find channel data";
  2213. } else {
  2214. tinfo = (turn_permission_info *)(chn->owner);
  2215. if (!tinfo) {
  2216. *err_code = 500;
  2217. *reason = (const uint8_t *)"Wrong turn permission info";
  2218. }
  2219. }
  2220. }
  2221. }
  2222. }
  2223. if (!(*err_code) && chn && tinfo) {
  2224. if (update_channel_lifetime(ss, chn) < 0) {
  2225. *err_code = 500;
  2226. *reason = (const uint8_t *)"Cannot update channel lifetime (internal error)";
  2227. } else {
  2228. size_t len = ioa_network_buffer_get_size(nbh);
  2229. stun_set_channel_bind_response_str(ioa_network_buffer_data(nbh), &len, tid, 0, NULL);
  2230. ioa_network_buffer_set_size(nbh, len);
  2231. *resp_constructed = 1;
  2232. if (!(ss->is_mobile)) {
  2233. if (get_ioa_socket_type(ss->client_socket) == UDP_SOCKET ||
  2234. get_ioa_socket_type(ss->client_socket) == TCP_SOCKET ||
  2235. get_ioa_socket_type(ss->client_socket) == SCTP_SOCKET) {
  2236. if (get_ioa_socket_type(get_relay_socket(&(ss->alloc), peer_addr.ss.sa_family)) == UDP_SOCKET) {
  2237. chn->kernel_channel = CREATE_TURN_CHANNEL_KERNEL(
  2238. chn->chnum, get_ioa_socket_address_family(ss->client_socket), peer_addr.ss.sa_family,
  2239. (get_ioa_socket_type(ss->client_socket) == UDP_SOCKET ? IPPROTO_UDP : IPPROTO_TCP),
  2240. &(get_remote_addr_from_ioa_socket(ss->client_socket)->ss),
  2241. &(get_local_addr_from_ioa_socket(ss->client_socket)->ss),
  2242. &(get_local_addr_from_ioa_socket(get_relay_socket(&(ss->alloc), peer_addr.ss.sa_family))),
  2243. &(get_remote_addr_from_ioa_socket(get_relay_socket(&(ss->alloc), peer_addr.ss.sa_family))));
  2244. }
  2245. }
  2246. }
  2247. }
  2248. }
  2249. }
  2250. }
  2251. FUNCEND;
  2252. return 0;
  2253. }
  2254. static int handle_turn_binding(turn_turnserver *server, ts_ur_super_session *ss, stun_tid *tid, int *resp_constructed,
  2255. int *err_code, const uint8_t **reason, uint16_t *unknown_attrs, uint16_t *ua_num,
  2256. ioa_net_data *in_buffer, ioa_network_buffer_handle nbh, int *origin_changed,
  2257. ioa_addr *response_origin, int *dest_changed, ioa_addr *response_destination,
  2258. uint32_t cookie, int old_stun) {
  2259. FUNCSTART;
  2260. int change_ip = 0;
  2261. int change_port = 0;
  2262. int padding = 0;
  2263. int response_port_present = 0;
  2264. uint16_t response_port = 0;
  2265. SOCKET_TYPE st = get_ioa_socket_type(ss->client_socket);
  2266. int use_reflected_from = 0;
  2267. if (!(ss->client_socket))
  2268. return -1;
  2269. *origin_changed = 0;
  2270. *dest_changed = 0;
  2271. stun_attr_ref sar =
  2272. stun_attr_get_first_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh));
  2273. while (sar && (!(*err_code)) && (*ua_num < MAX_NUMBER_OF_UNKNOWN_ATTRS)) {
  2274. int attr_type = stun_attr_get_type(sar);
  2275. switch (attr_type) {
  2276. case OLD_STUN_ATTRIBUTE_PASSWORD:
  2277. SKIP_ATTRIBUTES;
  2278. case STUN_ATTRIBUTE_CHANGE_REQUEST:
  2279. /*
  2280. * This fix allows the client program from the Stuntman source to make STUN binding requests
  2281. * to this server.
  2282. *
  2283. * It was provided by John Selbie, from STUNTMAN project:
  2284. *
  2285. * "Here's the gist of the change. Stuntman comes with a STUN client library
  2286. * and client program. The client program displays the mapped IP address and
  2287. * port if it gets back a successful binding response.
  2288. * It also interops with JSTUN, a Java implementation of STUN.
  2289. * However, the JSTUN server refuses to respond to any binding request that
  2290. * doesn't have a CHANGE-REQUEST attribute in it.
  2291. * ... workaround is for the client to make a request with an empty CHANGE-REQUEST
  2292. * attribute (neither the ip or port bit are set)."
  2293. *
  2294. */
  2295. stun_attr_get_change_request_str(sar, &change_ip, &change_port);
  2296. if ((!is_rfc5780(server)) && (change_ip || change_port)) {
  2297. *err_code = 420;
  2298. *reason = (const uint8_t *)"Unknown attribute: TURN server was configured without RFC 5780 support";
  2299. break;
  2300. }
  2301. if (change_ip || change_port) {
  2302. if (st != UDP_SOCKET) {
  2303. *err_code = 400;
  2304. *reason = (const uint8_t *)"Wrong request: applicable only to UDP protocol";
  2305. }
  2306. }
  2307. break;
  2308. case STUN_ATTRIBUTE_PADDING:
  2309. if (response_port_present) {
  2310. *err_code = 400;
  2311. *reason = (const uint8_t *)"Wrong request format: you cannot use PADDING and RESPONSE_PORT together";
  2312. } else if ((st != UDP_SOCKET) && (st != DTLS_SOCKET)) {
  2313. *err_code = 400;
  2314. *reason = (const uint8_t *)"Wrong request: padding applicable only to UDP and DTLS protocols";
  2315. } else {
  2316. padding = 1;
  2317. }
  2318. break;
  2319. case STUN_ATTRIBUTE_RESPONSE_PORT:
  2320. if (padding) {
  2321. *err_code = 400;
  2322. *reason = (const uint8_t *)"Wrong request format: you cannot use PADDING and RESPONSE_PORT together";
  2323. } else if (st != UDP_SOCKET) {
  2324. *err_code = 400;
  2325. *reason = (const uint8_t *)"Wrong request: applicable only to UDP protocol";
  2326. } else {
  2327. int rp = stun_attr_get_response_port_str(sar);
  2328. if (rp >= 0) {
  2329. response_port_present = 1;
  2330. response_port = (uint16_t)rp;
  2331. } else {
  2332. *err_code = 400;
  2333. *reason = (const uint8_t *)"Wrong response port format";
  2334. }
  2335. }
  2336. break;
  2337. case OLD_STUN_ATTRIBUTE_RESPONSE_ADDRESS:
  2338. if (old_stun) {
  2339. use_reflected_from = 1;
  2340. stun_attr_get_addr_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh),
  2341. sar, response_destination, response_destination);
  2342. }
  2343. break;
  2344. default:
  2345. if (attr_type >= 0x0000 && attr_type <= 0x7FFF)
  2346. unknown_attrs[(*ua_num)++] = nswap16(attr_type);
  2347. };
  2348. sar = stun_attr_get_next_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh),
  2349. sar);
  2350. }
  2351. if (*ua_num > 0) {
  2352. *err_code = 420;
  2353. stun_report_binding(ss, STUN_PROMETHEUS_METRIC_TYPE_ERROR);
  2354. } else if (*err_code) {
  2355. stun_report_binding(ss, STUN_PROMETHEUS_METRIC_TYPE_ERROR);
  2356. } else if (ss->client_socket && get_remote_addr_from_ioa_socket(ss->client_socket)) {
  2357. stun_report_binding(ss, STUN_PROMETHEUS_METRIC_TYPE_REQUEST);
  2358. size_t len = ioa_network_buffer_get_size(nbh);
  2359. if (stun_set_binding_response_str(ioa_network_buffer_data(nbh), &len, tid,
  2360. get_remote_addr_from_ioa_socket(ss->client_socket), 0, NULL, cookie, old_stun,
  2361. *server->no_stun_backward_compatibility) >= 0) {
  2362. addr_cpy(response_origin, get_local_addr_from_ioa_socket(ss->client_socket));
  2363. *resp_constructed = 1;
  2364. if (old_stun && use_reflected_from) {
  2365. stun_attr_add_addr_str(ioa_network_buffer_data(nbh), &len, OLD_STUN_ATTRIBUTE_REFLECTED_FROM,
  2366. get_remote_addr_from_ioa_socket(ss->client_socket));
  2367. }
  2368. if (!is_rfc5780(server)) {
  2369. if (!(*server->response_origin_only_with_rfc5780)) {
  2370. if (old_stun) {
  2371. stun_attr_add_addr_str(ioa_network_buffer_data(nbh), &len, OLD_STUN_ATTRIBUTE_SOURCE_ADDRESS,
  2372. response_origin);
  2373. stun_attr_add_addr_str(ioa_network_buffer_data(nbh), &len, OLD_STUN_ATTRIBUTE_CHANGED_ADDRESS,
  2374. response_origin);
  2375. } else {
  2376. stun_attr_add_addr_str(ioa_network_buffer_data(nbh), &len, STUN_ATTRIBUTE_RESPONSE_ORIGIN, response_origin);
  2377. }
  2378. }
  2379. } else if (ss->client_socket) {
  2380. ioa_addr other_address;
  2381. if (get_other_address(server, ss, &other_address) == 0) {
  2382. addr_cpy(response_destination, get_remote_addr_from_ioa_socket(ss->client_socket));
  2383. if (change_ip) {
  2384. *origin_changed = 1;
  2385. if (change_port) {
  2386. addr_cpy(response_origin, &other_address);
  2387. } else {
  2388. int old_port = addr_get_port(response_origin);
  2389. addr_cpy(response_origin, &other_address);
  2390. addr_set_port(response_origin, old_port);
  2391. }
  2392. } else if (change_port) {
  2393. *origin_changed = 1;
  2394. addr_set_port(response_origin, addr_get_port(&other_address));
  2395. }
  2396. if (old_stun) {
  2397. stun_attr_add_addr_str(ioa_network_buffer_data(nbh), &len, OLD_STUN_ATTRIBUTE_SOURCE_ADDRESS,
  2398. response_origin);
  2399. stun_attr_add_addr_str(ioa_network_buffer_data(nbh), &len, OLD_STUN_ATTRIBUTE_CHANGED_ADDRESS,
  2400. &other_address);
  2401. } else {
  2402. stun_attr_add_addr_str(ioa_network_buffer_data(nbh), &len, STUN_ATTRIBUTE_RESPONSE_ORIGIN, response_origin);
  2403. stun_attr_add_addr_str(ioa_network_buffer_data(nbh), &len, STUN_ATTRIBUTE_OTHER_ADDRESS, &other_address);
  2404. }
  2405. if (response_port_present) {
  2406. *dest_changed = 1;
  2407. addr_set_port(response_destination, (int)response_port);
  2408. }
  2409. if (padding) {
  2410. int mtu = get_local_mtu_ioa_socket(ss->client_socket);
  2411. if (mtu < 68)
  2412. mtu = 1500;
  2413. mtu = (mtu >> 2) << 2;
  2414. stun_attr_add_padding_str(ioa_network_buffer_data(nbh), &len, (uint16_t)mtu);
  2415. }
  2416. }
  2417. }
  2418. }
  2419. ioa_network_buffer_set_size(nbh, len);
  2420. }
  2421. FUNCEND;
  2422. return 0;
  2423. }
  2424. static int handle_turn_send(turn_turnserver *server, ts_ur_super_session *ss, int *err_code, const uint8_t **reason,
  2425. uint16_t *unknown_attrs, uint16_t *ua_num, ioa_net_data *in_buffer) {
  2426. FUNCSTART;
  2427. ioa_addr peer_addr;
  2428. const uint8_t *value = NULL;
  2429. int len = -1;
  2430. int addr_found = 0;
  2431. int set_df = 0;
  2432. addr_set_any(&peer_addr);
  2433. allocation *a = get_allocation_ss(ss);
  2434. if (ss->is_tcp_relay) {
  2435. *err_code = 403;
  2436. *reason = (const uint8_t *)"Send cannot be used with TCP relay";
  2437. } else if (is_allocation_valid(a) && (in_buffer->recv_ttl != 0)) {
  2438. stun_attr_ref sar =
  2439. stun_attr_get_first_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh));
  2440. while (sar && (!(*err_code)) && (*ua_num < MAX_NUMBER_OF_UNKNOWN_ATTRS)) {
  2441. int attr_type = stun_attr_get_type(sar);
  2442. switch (attr_type) {
  2443. SKIP_ATTRIBUTES;
  2444. case STUN_ATTRIBUTE_DONT_FRAGMENT:
  2445. if (!(server->dont_fragment))
  2446. unknown_attrs[(*ua_num)++] = nswap16(attr_type);
  2447. else
  2448. set_df = 1;
  2449. break;
  2450. case STUN_ATTRIBUTE_XOR_PEER_ADDRESS: {
  2451. if (addr_found) {
  2452. *err_code = 400;
  2453. *reason = (const uint8_t *)"Address duplication";
  2454. } else {
  2455. stun_attr_get_addr_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh),
  2456. sar, &peer_addr, NULL);
  2457. }
  2458. } break;
  2459. case STUN_ATTRIBUTE_DATA: {
  2460. if (len >= 0) {
  2461. *err_code = 400;
  2462. *reason = (const uint8_t *)"Data duplication";
  2463. } else {
  2464. len = stun_attr_get_len(sar);
  2465. value = stun_attr_get_value(sar);
  2466. }
  2467. } break;
  2468. default:
  2469. if (attr_type >= 0x0000 && attr_type <= 0x7FFF)
  2470. unknown_attrs[(*ua_num)++] = nswap16(attr_type);
  2471. };
  2472. sar = stun_attr_get_next_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh),
  2473. sar);
  2474. }
  2475. if (*err_code) {
  2476. ;
  2477. } else if (*ua_num > 0) {
  2478. *err_code = 420;
  2479. } else if (!addr_any(&peer_addr) && len >= 0) {
  2480. turn_permission_info *tinfo = NULL;
  2481. if (!(server->server_relay))
  2482. tinfo = allocation_get_permission(a, &peer_addr);
  2483. if (tinfo || (server->server_relay)) {
  2484. set_df_on_ioa_socket(get_relay_socket_ss(ss, peer_addr.ss.sa_family), set_df);
  2485. ioa_network_buffer_handle nbh = in_buffer->nbh;
  2486. if (value && len > 0) {
  2487. uint16_t offset = (uint16_t)(value - ioa_network_buffer_data(nbh));
  2488. ioa_network_buffer_add_offset_size(nbh, offset, 0, len);
  2489. } else {
  2490. len = 0;
  2491. ioa_network_buffer_set_size(nbh, len);
  2492. }
  2493. ioa_network_buffer_header_init(nbh);
  2494. int skip = 0;
  2495. send_data_from_ioa_socket_nbh(get_relay_socket_ss(ss, peer_addr.ss.sa_family), &peer_addr, nbh,
  2496. in_buffer->recv_ttl - 1, in_buffer->recv_tos, &skip);
  2497. if (!skip) {
  2498. ++(ss->peer_sent_packets);
  2499. ss->peer_sent_bytes += len;
  2500. turn_report_session_usage(ss, 0);
  2501. }
  2502. in_buffer->nbh = NULL;
  2503. }
  2504. } else {
  2505. *err_code = 400;
  2506. *reason = (const uint8_t *)"No address found";
  2507. }
  2508. }
  2509. FUNCEND;
  2510. return 0;
  2511. }
  2512. static int update_permission(ts_ur_super_session *ss, ioa_addr *peer_addr) {
  2513. if (!ss || !peer_addr)
  2514. return -1;
  2515. allocation *a = get_allocation_ss(ss);
  2516. turn_permission_info *tinfo = allocation_get_permission(a, peer_addr);
  2517. if (!tinfo) {
  2518. tinfo = allocation_add_permission(a, peer_addr);
  2519. }
  2520. if (!tinfo)
  2521. return -1;
  2522. if (update_turn_permission_lifetime(ss, tinfo, 0) < 0)
  2523. return -1;
  2524. ch_info *chn = get_turn_channel(tinfo, peer_addr);
  2525. if (chn) {
  2526. if (update_channel_lifetime(ss, chn) < 0)
  2527. return -1;
  2528. }
  2529. return 0;
  2530. }
  2531. static int handle_turn_create_permission(turn_turnserver *server, ts_ur_super_session *ss, stun_tid *tid,
  2532. int *resp_constructed, int *err_code, const uint8_t **reason,
  2533. uint16_t *unknown_attrs, uint16_t *ua_num, ioa_net_data *in_buffer,
  2534. ioa_network_buffer_handle nbh) {
  2535. int ret = -1;
  2536. int addr_found = 0;
  2537. UNUSED_ARG(server);
  2538. allocation *a = get_allocation_ss(ss);
  2539. if (is_allocation_valid(a)) {
  2540. {
  2541. stun_attr_ref sar =
  2542. stun_attr_get_first_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh));
  2543. while (sar && (!(*err_code)) && (*ua_num < MAX_NUMBER_OF_UNKNOWN_ATTRS)) {
  2544. int attr_type = stun_attr_get_type(sar);
  2545. switch (attr_type) {
  2546. SKIP_ATTRIBUTES;
  2547. case STUN_ATTRIBUTE_XOR_PEER_ADDRESS: {
  2548. ioa_addr peer_addr;
  2549. addr_set_any(&peer_addr);
  2550. stun_attr_get_addr_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh),
  2551. sar, &peer_addr, NULL);
  2552. if (!get_relay_socket(a, peer_addr.ss.sa_family)) {
  2553. *err_code = 443;
  2554. *reason = (const uint8_t *)"Peer Address Family Mismatch (4)";
  2555. } else if (!good_peer_addr(server, ss->realm_options.name, &peer_addr, ss->id)) {
  2556. *err_code = 403;
  2557. *reason = (const uint8_t *)"Forbidden IP";
  2558. } else {
  2559. addr_found++;
  2560. }
  2561. } break;
  2562. default:
  2563. if (attr_type >= 0x0000 && attr_type <= 0x7FFF)
  2564. unknown_attrs[(*ua_num)++] = nswap16(attr_type);
  2565. };
  2566. sar = stun_attr_get_next_str(ioa_network_buffer_data(in_buffer->nbh),
  2567. ioa_network_buffer_get_size(in_buffer->nbh), sar);
  2568. }
  2569. }
  2570. if (*ua_num > 0) {
  2571. *err_code = 420;
  2572. } else if (*err_code) {
  2573. ;
  2574. } else if (!addr_found) {
  2575. *err_code = 400;
  2576. *reason = (const uint8_t *)"No address found";
  2577. } else {
  2578. stun_attr_ref sar =
  2579. stun_attr_get_first_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh));
  2580. while (sar) {
  2581. int attr_type = stun_attr_get_type(sar);
  2582. switch (attr_type) {
  2583. SKIP_ATTRIBUTES;
  2584. case STUN_ATTRIBUTE_XOR_PEER_ADDRESS: {
  2585. ioa_addr peer_addr;
  2586. addr_set_any(&peer_addr);
  2587. stun_attr_get_addr_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh),
  2588. sar, &peer_addr, NULL);
  2589. addr_set_port(&peer_addr, 0);
  2590. if (update_permission(ss, &peer_addr) < 0) {
  2591. *err_code = 500;
  2592. *reason = (const uint8_t *)"Cannot update some permissions (critical server software error)";
  2593. }
  2594. } break;
  2595. default:;
  2596. }
  2597. sar = stun_attr_get_next_str(ioa_network_buffer_data(in_buffer->nbh),
  2598. ioa_network_buffer_get_size(in_buffer->nbh), sar);
  2599. }
  2600. if (*err_code == 0) {
  2601. size_t len = ioa_network_buffer_get_size(nbh);
  2602. stun_init_success_response_str(STUN_METHOD_CREATE_PERMISSION, ioa_network_buffer_data(nbh), &len, tid);
  2603. ioa_network_buffer_set_size(nbh, len);
  2604. ret = 0;
  2605. *resp_constructed = 1;
  2606. }
  2607. }
  2608. }
  2609. return ret;
  2610. }
  2611. // AUTH ==>>
  2612. static int need_stun_authentication(turn_turnserver *server, ts_ur_super_session *ss) {
  2613. UNUSED_ARG(ss);
  2614. if (server) {
  2615. switch (server->ct) {
  2616. case TURN_CREDENTIALS_LONG_TERM:
  2617. return 1;
  2618. default:;
  2619. };
  2620. }
  2621. return 0;
  2622. }
  2623. static int create_challenge_response(ts_ur_super_session *ss, stun_tid *tid, int *resp_constructed, int *err_code,
  2624. const uint8_t **reason, ioa_network_buffer_handle nbh, uint16_t method) {
  2625. size_t len = ioa_network_buffer_get_size(nbh);
  2626. stun_init_error_response_str(method, ioa_network_buffer_data(nbh), &len, *err_code, *reason, tid);
  2627. *resp_constructed = 1;
  2628. stun_attr_add_str(ioa_network_buffer_data(nbh), &len, STUN_ATTRIBUTE_NONCE, ss->nonce, (int)(NONCE_MAX_SIZE - 1));
  2629. char *realm = ss->realm_options.name;
  2630. stun_attr_add_str(ioa_network_buffer_data(nbh), &len, STUN_ATTRIBUTE_REALM, (uint8_t *)realm,
  2631. (int)(strlen((char *)(realm))));
  2632. if (ss->server) {
  2633. turn_turnserver *server = (turn_turnserver *)ss->server;
  2634. if (server->oauth) {
  2635. const char *server_name = server->oauth_server_name;
  2636. if (!(server_name && server_name[0])) {
  2637. server_name = realm;
  2638. }
  2639. stun_attr_add_str(ioa_network_buffer_data(nbh), &len, STUN_ATTRIBUTE_THIRD_PARTY_AUTHORIZATION,
  2640. (const uint8_t *)(server_name), strlen(server_name));
  2641. }
  2642. }
  2643. ioa_network_buffer_set_size(nbh, len);
  2644. return 0;
  2645. }
  2646. static void resume_processing_after_username_check(int success, int oauth, int max_session_time, hmackey_t hmackey,
  2647. password_t pwd, turn_turnserver *server, uint64_t ctxkey,
  2648. ioa_net_data *in_buffer, uint8_t *realm) {
  2649. if (server && in_buffer && in_buffer->nbh) {
  2650. ts_ur_super_session *ss = get_session_from_map(server, (turnsession_id)ctxkey);
  2651. if (ss && ss->client_socket) {
  2652. turn_turnserver *server = (turn_turnserver *)ss->server;
  2653. if (success) {
  2654. memcpy(ss->hmackey, hmackey, sizeof(hmackey_t));
  2655. ss->hmackey_set = 1;
  2656. ss->oauth = oauth;
  2657. ss->max_session_time_auth = (turn_time_t)max_session_time;
  2658. memcpy(ss->pwd, pwd, sizeof(password_t));
  2659. if (realm && realm[0] && strcmp((char *)realm, ss->realm_options.name)) {
  2660. dec_quota(ss);
  2661. get_realm_options_by_name((char *)realm, &(ss->realm_options));
  2662. inc_quota(ss, ss->username);
  2663. }
  2664. }
  2665. read_client_connection(server, ss, in_buffer, 0, 0);
  2666. close_ioa_socket_after_processing_if_necessary(ss->client_socket);
  2667. ioa_network_buffer_delete(server->e, in_buffer->nbh);
  2668. in_buffer->nbh = NULL;
  2669. }
  2670. }
  2671. }
  2672. static int check_stun_auth(turn_turnserver *server, ts_ur_super_session *ss, stun_tid *tid, int *resp_constructed,
  2673. int *err_code, const uint8_t **reason, ioa_net_data *in_buffer,
  2674. ioa_network_buffer_handle nbh, uint16_t method, int *message_integrity, int *postpone_reply,
  2675. int can_resume) {
  2676. uint8_t usname[STUN_MAX_USERNAME_SIZE + 1];
  2677. uint8_t nonce[STUN_MAX_NONCE_SIZE + 1];
  2678. uint8_t realm[STUN_MAX_REALM_SIZE + 1];
  2679. size_t alen = 0;
  2680. if (!need_stun_authentication(server, ss))
  2681. return 0;
  2682. int new_nonce = 0;
  2683. {
  2684. int generate_new_nonce = 0;
  2685. if (ss->nonce[0] == 0) {
  2686. generate_new_nonce = 1;
  2687. new_nonce = 1;
  2688. }
  2689. if (*(server->stale_nonce)) {
  2690. if (turn_time_before(ss->nonce_expiration_time, server->ctime)) {
  2691. generate_new_nonce = 1;
  2692. }
  2693. }
  2694. if (generate_new_nonce) {
  2695. int i = 0;
  2696. if (TURN_RANDOM_SIZE == 8) {
  2697. for (i = 0; i < (NONCE_LENGTH_32BITS >> 1); i++) {
  2698. uint8_t *s = ss->nonce + 8 * i;
  2699. uint64_t rand = (uint64_t)turn_random();
  2700. snprintf((char *)s, NONCE_MAX_SIZE - 8 * i, "%08lx", (unsigned long)rand);
  2701. }
  2702. } else {
  2703. for (i = 0; i < NONCE_LENGTH_32BITS; i++) {
  2704. uint8_t *s = ss->nonce + 4 * i;
  2705. uint32_t rand = (uint32_t)turn_random();
  2706. snprintf((char *)s, NONCE_MAX_SIZE - 4 * i, "%04x", (unsigned int)rand);
  2707. }
  2708. }
  2709. ss->nonce_expiration_time = server->ctime + *(server->stale_nonce);
  2710. }
  2711. }
  2712. /* MESSAGE_INTEGRITY ATTR: */
  2713. stun_attr_ref sar =
  2714. stun_attr_get_first_by_type_str(ioa_network_buffer_data(in_buffer->nbh),
  2715. ioa_network_buffer_get_size(in_buffer->nbh), STUN_ATTRIBUTE_MESSAGE_INTEGRITY);
  2716. if (!sar) {
  2717. *err_code = 401;
  2718. return create_challenge_response(ss, tid, resp_constructed, err_code, reason, nbh, method);
  2719. }
  2720. {
  2721. int sarlen = stun_attr_get_len(sar);
  2722. switch (sarlen) {
  2723. case SHA1SIZEBYTES:
  2724. break;
  2725. case SHA256SIZEBYTES:
  2726. case SHA384SIZEBYTES:
  2727. case SHA512SIZEBYTES:
  2728. default:
  2729. *err_code = 401;
  2730. return create_challenge_response(ss, tid, resp_constructed, err_code, reason, nbh, method);
  2731. };
  2732. }
  2733. {
  2734. /* REALM ATTR: */
  2735. sar = stun_attr_get_first_by_type_str(ioa_network_buffer_data(in_buffer->nbh),
  2736. ioa_network_buffer_get_size(in_buffer->nbh), STUN_ATTRIBUTE_REALM);
  2737. if (!sar) {
  2738. *err_code = 400;
  2739. return -1;
  2740. }
  2741. alen = min((size_t)stun_attr_get_len(sar), sizeof(realm) - 1);
  2742. memcpy(realm, stun_attr_get_value(sar), alen);
  2743. realm[alen] = 0;
  2744. if (!is_secure_string(realm, 0)) {
  2745. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "%s: wrong realm: %s\n", __FUNCTION__, (char *)realm);
  2746. realm[0] = 0;
  2747. *err_code = 400;
  2748. return -1;
  2749. }
  2750. if (method == STUN_METHOD_CONNECTION_BIND) {
  2751. get_realm_options_by_name((char *)realm, &(ss->realm_options));
  2752. } else if (strcmp((char *)realm, (char *)(ss->realm_options.name))) {
  2753. if (!(ss->oauth)) {
  2754. if (method == STUN_METHOD_ALLOCATE) {
  2755. *err_code = 437;
  2756. *reason = (const uint8_t *)"Allocation mismatch: wrong credentials: the realm value is incorrect";
  2757. } else {
  2758. *err_code = 441;
  2759. *reason = (const uint8_t *)"Wrong credentials: the realm value is incorrect";
  2760. }
  2761. return -1;
  2762. } else {
  2763. memcpy(realm, ss->realm_options.name, sizeof(ss->realm_options.name));
  2764. }
  2765. }
  2766. }
  2767. /* USERNAME ATTR: */
  2768. sar = stun_attr_get_first_by_type_str(ioa_network_buffer_data(in_buffer->nbh),
  2769. ioa_network_buffer_get_size(in_buffer->nbh), STUN_ATTRIBUTE_USERNAME);
  2770. if (!sar) {
  2771. *err_code = 400;
  2772. return -1;
  2773. }
  2774. alen = min((size_t)stun_attr_get_len(sar), sizeof(usname) - 1);
  2775. memcpy(usname, stun_attr_get_value(sar), alen);
  2776. usname[alen] = 0;
  2777. if (!is_secure_string(usname, 1)) {
  2778. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "%s: wrong username: %s\n", __FUNCTION__, (char *)usname);
  2779. usname[0] = 0;
  2780. *err_code = 400;
  2781. return -1;
  2782. } else if (ss->username[0]) {
  2783. if (strcmp((char *)ss->username, (char *)usname)) {
  2784. if (ss->oauth) {
  2785. ss->hmackey_set = 0;
  2786. STRCPY(ss->username, usname);
  2787. } else {
  2788. if (method == STUN_METHOD_ALLOCATE) {
  2789. *err_code = 437;
  2790. *reason = (const uint8_t *)"Allocation mismatch: wrong credentials";
  2791. } else {
  2792. *err_code = 441;
  2793. }
  2794. return -1;
  2795. }
  2796. }
  2797. } else {
  2798. STRCPY(ss->username, usname);
  2799. }
  2800. {
  2801. /* NONCE ATTR: */
  2802. sar = stun_attr_get_first_by_type_str(ioa_network_buffer_data(in_buffer->nbh),
  2803. ioa_network_buffer_get_size(in_buffer->nbh), STUN_ATTRIBUTE_NONCE);
  2804. if (!sar) {
  2805. *err_code = 400;
  2806. return -1;
  2807. }
  2808. alen = min((size_t)stun_attr_get_len(sar), sizeof(nonce) - 1);
  2809. memcpy(nonce, stun_attr_get_value(sar), alen);
  2810. nonce[alen] = 0;
  2811. /* Stale Nonce check: */
  2812. if (new_nonce) {
  2813. *err_code = 438;
  2814. *reason = (const uint8_t *)"Wrong nonce";
  2815. return create_challenge_response(ss, tid, resp_constructed, err_code, reason, nbh, method);
  2816. }
  2817. if (strcmp((char *)ss->nonce, (char *)nonce)) {
  2818. *err_code = 438;
  2819. *reason = (const uint8_t *)"Stale nonce";
  2820. return create_challenge_response(ss, tid, resp_constructed, err_code, reason, nbh, method);
  2821. }
  2822. }
  2823. /* Password */
  2824. if (!(ss->hmackey_set) && (ss->pwd[0] == 0)) {
  2825. if (can_resume) {
  2826. (server->userkeycb)(server->id, server->ct, server->oauth, &(ss->oauth), usname, realm,
  2827. resume_processing_after_username_check, in_buffer, ss->id, postpone_reply);
  2828. if (*postpone_reply) {
  2829. return 0;
  2830. }
  2831. }
  2832. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "%s: Cannot find credentials of user <%s>\n", __FUNCTION__, (char *)usname);
  2833. *err_code = 401;
  2834. return create_challenge_response(ss, tid, resp_constructed, err_code, reason, nbh, method);
  2835. }
  2836. /* Check integrity */
  2837. if (stun_check_message_integrity_by_key_str(server->ct, ioa_network_buffer_data(in_buffer->nbh),
  2838. ioa_network_buffer_get_size(in_buffer->nbh), ss->hmackey, ss->pwd,
  2839. SHATYPE_DEFAULT) < 1) {
  2840. if (can_resume) {
  2841. (server->userkeycb)(server->id, server->ct, server->oauth, &(ss->oauth), usname, realm,
  2842. resume_processing_after_username_check, in_buffer, ss->id, postpone_reply);
  2843. if (*postpone_reply) {
  2844. return 0;
  2845. }
  2846. }
  2847. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "%s: user %s credentials are incorrect\n", __FUNCTION__, (char *)usname);
  2848. *err_code = 401;
  2849. return create_challenge_response(ss, tid, resp_constructed, err_code, reason, nbh, method);
  2850. }
  2851. *message_integrity = 1;
  2852. return 0;
  2853. }
  2854. //<<== AUTH
  2855. static void set_alternate_server(turn_server_addrs_list_t *asl, const ioa_addr *local_addr, size_t *counter,
  2856. uint16_t method, stun_tid *tid, int *resp_constructed, int *err_code,
  2857. const uint8_t **reason, ioa_network_buffer_handle nbh) {
  2858. if (asl && asl->size && local_addr) {
  2859. size_t i;
  2860. /* to prevent indefinite cycle: */
  2861. for (i = 0; i < asl->size; ++i) {
  2862. ioa_addr *addr = &(asl->addrs[i]);
  2863. if (addr_eq(addr, local_addr))
  2864. return;
  2865. }
  2866. for (i = 0; i < asl->size; ++i) {
  2867. if (*counter >= asl->size)
  2868. *counter = 0;
  2869. ioa_addr *addr = &(asl->addrs[*counter]);
  2870. *counter += 1;
  2871. if (addr->ss.sa_family == local_addr->ss.sa_family) {
  2872. *err_code = 300;
  2873. size_t len = ioa_network_buffer_get_size(nbh);
  2874. stun_init_error_response_str(method, ioa_network_buffer_data(nbh), &len, *err_code, *reason, tid);
  2875. *resp_constructed = 1;
  2876. stun_attr_add_addr_str(ioa_network_buffer_data(nbh), &len, STUN_ATTRIBUTE_ALTERNATE_SERVER, addr);
  2877. ioa_network_buffer_set_size(nbh, len);
  2878. return;
  2879. }
  2880. }
  2881. }
  2882. }
  2883. static int handle_turn_command(turn_turnserver *server, ts_ur_super_session *ss, ioa_net_data *in_buffer,
  2884. ioa_network_buffer_handle nbh, int *resp_constructed, int can_resume) {
  2885. stun_tid tid;
  2886. int err_code = 0;
  2887. const uint8_t *reason = NULL;
  2888. int no_response = 0;
  2889. int message_integrity = 0;
  2890. if (!(ss->client_socket))
  2891. return -1;
  2892. uint16_t unknown_attrs[MAX_NUMBER_OF_UNKNOWN_ATTRS];
  2893. uint16_t ua_num = 0;
  2894. uint16_t method =
  2895. stun_get_method_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh));
  2896. *resp_constructed = 0;
  2897. stun_tid_from_message_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh), &tid);
  2898. if (stun_is_request_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh))) {
  2899. if ((method == STUN_METHOD_BINDING) && (*(server->no_stun))) {
  2900. no_response = 1;
  2901. if (server->verbose) {
  2902. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: STUN method 0x%x ignored\n", __FUNCTION__, (unsigned int)method);
  2903. }
  2904. } else if ((method != STUN_METHOD_BINDING) && (*(server->stun_only))) {
  2905. no_response = 1;
  2906. if (server->verbose) {
  2907. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: STUN method 0x%x ignored\n", __FUNCTION__, (unsigned int)method);
  2908. }
  2909. } else if ((method != STUN_METHOD_BINDING) || (*(server->secure_stun))) {
  2910. if (method == STUN_METHOD_ALLOCATE) {
  2911. allocation *a = get_allocation_ss(ss);
  2912. if (is_allocation_valid(a)) {
  2913. if (!stun_tid_equals(&(a->tid), &tid)) {
  2914. err_code = 437;
  2915. reason = (const uint8_t *)"Mismatched allocation: wrong transaction ID";
  2916. }
  2917. }
  2918. if (!err_code) {
  2919. SOCKET_TYPE cst = get_ioa_socket_type(ss->client_socket);
  2920. turn_server_addrs_list_t *asl = server->alternate_servers_list;
  2921. if (((cst == UDP_SOCKET) || (cst == DTLS_SOCKET)) && server->self_udp_balance && server->aux_servers_list &&
  2922. server->aux_servers_list->size) {
  2923. asl = server->aux_servers_list;
  2924. } else if (((cst == TLS_SOCKET) || (cst == DTLS_SOCKET) || (cst == TLS_SCTP_SOCKET)) &&
  2925. server->tls_alternate_servers_list && server->tls_alternate_servers_list->size) {
  2926. asl = server->tls_alternate_servers_list;
  2927. }
  2928. if (asl && asl->size) {
  2929. TURN_MUTEX_LOCK(&(asl->m));
  2930. set_alternate_server(asl, get_local_addr_from_ioa_socket(ss->client_socket), &(server->as_counter), method,
  2931. &tid, resp_constructed, &err_code, &reason, nbh);
  2932. TURN_MUTEX_UNLOCK(&(asl->m));
  2933. }
  2934. }
  2935. }
  2936. /* check that the realm is the same as in the original request */
  2937. if (ss->origin_set) {
  2938. stun_attr_ref sar = stun_attr_get_first_str(ioa_network_buffer_data(in_buffer->nbh),
  2939. ioa_network_buffer_get_size(in_buffer->nbh));
  2940. int origin_found = 0;
  2941. int norigins = 0;
  2942. while (sar && !origin_found) {
  2943. if (stun_attr_get_type(sar) == STUN_ATTRIBUTE_ORIGIN) {
  2944. int sarlen = stun_attr_get_len(sar);
  2945. if (sarlen > 0) {
  2946. ++norigins;
  2947. char *o = (char *)malloc(sarlen + 1);
  2948. memcpy(o, stun_attr_get_value(sar), sarlen);
  2949. o[sarlen] = 0;
  2950. char *corigin = (char *)malloc(STUN_MAX_ORIGIN_SIZE + 1);
  2951. corigin[0] = 0;
  2952. if (get_canonic_origin(o, corigin, STUN_MAX_ORIGIN_SIZE) < 0) {
  2953. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "%s: Wrong origin format: %s\n", __FUNCTION__, o);
  2954. }
  2955. if (!strncmp(ss->origin, corigin, STUN_MAX_ORIGIN_SIZE)) {
  2956. origin_found = 1;
  2957. }
  2958. free(corigin);
  2959. free(o);
  2960. }
  2961. }
  2962. sar = stun_attr_get_next_str(ioa_network_buffer_data(in_buffer->nbh),
  2963. ioa_network_buffer_get_size(in_buffer->nbh), sar);
  2964. }
  2965. if (server->check_origin && *(server->check_origin)) {
  2966. if (ss->origin[0]) {
  2967. if (!origin_found) {
  2968. err_code = 441;
  2969. reason = (const uint8_t *)"The origin attribute does not match the initial session origin value";
  2970. if (server->verbose) {
  2971. char smethod[129];
  2972. stun_method_str(method, smethod);
  2973. log_method(ss, smethod, err_code, reason);
  2974. }
  2975. }
  2976. } else if (norigins > 0) {
  2977. err_code = 441;
  2978. reason = (const uint8_t *)"The origin attribute is empty, does not match the initial session origin value";
  2979. if (server->verbose) {
  2980. char smethod[129];
  2981. stun_method_str(method, smethod);
  2982. log_method(ss, smethod, err_code, reason);
  2983. }
  2984. }
  2985. }
  2986. }
  2987. /* get the initial origin value */
  2988. if (!err_code && !(ss->origin_set) && (method == STUN_METHOD_ALLOCATE)) {
  2989. stun_attr_ref sar = stun_attr_get_first_str(ioa_network_buffer_data(in_buffer->nbh),
  2990. ioa_network_buffer_get_size(in_buffer->nbh));
  2991. int origin_found = 0;
  2992. while (sar && !origin_found) {
  2993. if (stun_attr_get_type(sar) == STUN_ATTRIBUTE_ORIGIN) {
  2994. int sarlen = stun_attr_get_len(sar);
  2995. if (sarlen > 0) {
  2996. char *o = (char *)malloc(sarlen + 1);
  2997. memcpy(o, stun_attr_get_value(sar), sarlen);
  2998. o[sarlen] = 0;
  2999. char *corigin = (char *)malloc(STUN_MAX_ORIGIN_SIZE + 1);
  3000. corigin[0] = 0;
  3001. if (get_canonic_origin(o, corigin, STUN_MAX_ORIGIN_SIZE) < 0) {
  3002. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "%s: Wrong origin format: %s\n", __FUNCTION__, o);
  3003. }
  3004. strncpy(ss->origin, corigin, STUN_MAX_ORIGIN_SIZE);
  3005. free(corigin);
  3006. free(o);
  3007. origin_found = get_realm_options_by_origin(ss->origin, &(ss->realm_options));
  3008. }
  3009. }
  3010. sar = stun_attr_get_next_str(ioa_network_buffer_data(in_buffer->nbh),
  3011. ioa_network_buffer_get_size(in_buffer->nbh), sar);
  3012. }
  3013. ss->origin_set = 1;
  3014. }
  3015. if (!err_code && !(*resp_constructed) && !no_response) {
  3016. if (method == STUN_METHOD_CONNECTION_BIND) {
  3017. ;
  3018. } else if (!(*(server->mobility)) || (method != STUN_METHOD_REFRESH) ||
  3019. is_allocation_valid(get_allocation_ss(ss))) {
  3020. int postpone_reply = 0;
  3021. check_stun_auth(server, ss, &tid, resp_constructed, &err_code, &reason, in_buffer, nbh, method,
  3022. &message_integrity, &postpone_reply, can_resume);
  3023. if (postpone_reply)
  3024. no_response = 1;
  3025. }
  3026. }
  3027. }
  3028. if (!err_code && !(*resp_constructed) && !no_response) {
  3029. switch (method) {
  3030. case STUN_METHOD_ALLOCATE:
  3031. {
  3032. handle_turn_allocate(server, ss, &tid, resp_constructed, &err_code, &reason, unknown_attrs, &ua_num, in_buffer,
  3033. nbh);
  3034. if (server->verbose) {
  3035. log_method(ss, "ALLOCATE", err_code, reason);
  3036. }
  3037. break;
  3038. }
  3039. case STUN_METHOD_CONNECT:
  3040. handle_turn_connect(server, ss, &tid, &err_code, &reason, unknown_attrs, &ua_num, in_buffer);
  3041. if (server->verbose) {
  3042. log_method(ss, "CONNECT", err_code, reason);
  3043. }
  3044. if (!err_code)
  3045. no_response = 1;
  3046. break;
  3047. case STUN_METHOD_CONNECTION_BIND:
  3048. handle_turn_connection_bind(server, ss, &tid, resp_constructed, &err_code, &reason, unknown_attrs, &ua_num,
  3049. in_buffer, nbh, message_integrity, can_resume);
  3050. if (server->verbose && err_code) {
  3051. log_method(ss, "CONNECTION_BIND", err_code, reason);
  3052. }
  3053. break;
  3054. case STUN_METHOD_REFRESH:
  3055. handle_turn_refresh(server, ss, &tid, resp_constructed, &err_code, &reason, unknown_attrs, &ua_num, in_buffer,
  3056. nbh, message_integrity, &no_response, can_resume);
  3057. if (server->verbose) {
  3058. log_method(ss, "REFRESH", err_code, reason);
  3059. }
  3060. break;
  3061. case STUN_METHOD_CHANNEL_BIND:
  3062. handle_turn_channel_bind(server, ss, &tid, resp_constructed, &err_code, &reason, unknown_attrs, &ua_num,
  3063. in_buffer, nbh);
  3064. if (server->verbose) {
  3065. log_method(ss, "CHANNEL_BIND", err_code, reason);
  3066. }
  3067. break;
  3068. case STUN_METHOD_CREATE_PERMISSION:
  3069. handle_turn_create_permission(server, ss, &tid, resp_constructed, &err_code, &reason, unknown_attrs, &ua_num,
  3070. in_buffer, nbh);
  3071. if (server->verbose) {
  3072. log_method(ss, "CREATE_PERMISSION", err_code, reason);
  3073. }
  3074. break;
  3075. case STUN_METHOD_BINDING:
  3076. {
  3077. int origin_changed = 0;
  3078. ioa_addr response_origin;
  3079. int dest_changed = 0;
  3080. ioa_addr response_destination;
  3081. handle_turn_binding(server, ss, &tid, resp_constructed, &err_code, &reason, unknown_attrs, &ua_num, in_buffer,
  3082. nbh, &origin_changed, &response_origin, &dest_changed, &response_destination, 0, 0);
  3083. if (server->verbose && *(server->log_binding)) {
  3084. log_method(ss, "BINDING", err_code, reason);
  3085. }
  3086. if (*resp_constructed && !err_code && (origin_changed || dest_changed)) {
  3087. if (server->verbose && *(server->log_binding)) {
  3088. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "RFC 5780 request successfully processed\n");
  3089. }
  3090. if (!(*server->no_software_attribute)) {
  3091. const uint8_t *field = (const uint8_t *)get_version(server);
  3092. size_t fsz = strlen(get_version(server));
  3093. size_t len = ioa_network_buffer_get_size(nbh);
  3094. stun_attr_add_str(ioa_network_buffer_data(nbh), &len, STUN_ATTRIBUTE_SOFTWARE, field, fsz);
  3095. ioa_network_buffer_set_size(nbh, len);
  3096. }
  3097. send_turn_message_to(server, nbh, &response_origin, &response_destination);
  3098. stun_report_binding(ss, STUN_PROMETHEUS_METRIC_TYPE_RESPONSE);
  3099. no_response = 1;
  3100. }
  3101. break;
  3102. }
  3103. default:
  3104. TURN_LOG_FUNC(TURN_LOG_LEVEL_ERROR, "Unsupported STUN request received, method 0x%x\n", (unsigned int)method);
  3105. };
  3106. }
  3107. } else if (stun_is_indication_str(ioa_network_buffer_data(in_buffer->nbh),
  3108. ioa_network_buffer_get_size(in_buffer->nbh))) {
  3109. no_response = 1;
  3110. int postpone = 0;
  3111. if (!postpone && !err_code) {
  3112. switch (method) {
  3113. case STUN_METHOD_BINDING:
  3114. // ICE ?
  3115. break;
  3116. case STUN_METHOD_SEND:
  3117. handle_turn_send(server, ss, &err_code, &reason, unknown_attrs, &ua_num, in_buffer);
  3118. if (eve(server->verbose)) {
  3119. log_method(ss, "SEND", err_code, reason);
  3120. }
  3121. break;
  3122. case STUN_METHOD_DATA:
  3123. err_code = 403;
  3124. if (eve(server->verbose)) {
  3125. log_method(ss, "DATA", err_code, reason);
  3126. }
  3127. break;
  3128. default:
  3129. if (server->verbose) {
  3130. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "Unsupported STUN indication received: method 0x%x\n",
  3131. (unsigned int)method);
  3132. }
  3133. }
  3134. };
  3135. } else {
  3136. no_response = 1;
  3137. if (server->verbose) {
  3138. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "Wrong STUN message received\n");
  3139. }
  3140. }
  3141. if (ss->to_be_closed || !(ss->client_socket) || ioa_socket_tobeclosed(ss->client_socket))
  3142. return 0;
  3143. if (ua_num > 0) {
  3144. err_code = 420;
  3145. size_t len = ioa_network_buffer_get_size(nbh);
  3146. stun_init_error_response_str(method, ioa_network_buffer_data(nbh), &len, err_code, NULL, &tid);
  3147. stun_attr_add_str(ioa_network_buffer_data(nbh), &len, STUN_ATTRIBUTE_UNKNOWN_ATTRIBUTES,
  3148. (const uint8_t *)unknown_attrs, (ua_num * 2));
  3149. ioa_network_buffer_set_size(nbh, len);
  3150. *resp_constructed = 1;
  3151. }
  3152. if (!no_response) {
  3153. if (!(*resp_constructed)) {
  3154. if (!err_code)
  3155. err_code = 400;
  3156. size_t len = ioa_network_buffer_get_size(nbh);
  3157. stun_init_error_response_str(method, ioa_network_buffer_data(nbh), &len, err_code, reason, &tid);
  3158. ioa_network_buffer_set_size(nbh, len);
  3159. *resp_constructed = 1;
  3160. }
  3161. if (!(*server->no_software_attribute)) {
  3162. const uint8_t *field = (const uint8_t *)get_version(server);
  3163. size_t fsz = strlen(get_version(server));
  3164. size_t len = ioa_network_buffer_get_size(nbh);
  3165. stun_attr_add_str(ioa_network_buffer_data(nbh), &len, STUN_ATTRIBUTE_SOFTWARE, field, fsz);
  3166. ioa_network_buffer_set_size(nbh, len);
  3167. }
  3168. if (message_integrity) {
  3169. size_t len = ioa_network_buffer_get_size(nbh);
  3170. stun_attr_add_integrity_str(server->ct, ioa_network_buffer_data(nbh), &len, ss->hmackey, ss->pwd,
  3171. SHATYPE_DEFAULT);
  3172. ioa_network_buffer_set_size(nbh, len);
  3173. }
  3174. if (err_code) {
  3175. if (server->verbose) {
  3176. log_method(ss, "message", err_code, reason);
  3177. }
  3178. }
  3179. } else {
  3180. *resp_constructed = 0;
  3181. }
  3182. return 0;
  3183. }
  3184. static int handle_old_stun_command(turn_turnserver *server, ts_ur_super_session *ss, ioa_net_data *in_buffer,
  3185. ioa_network_buffer_handle nbh, int *resp_constructed, uint32_t cookie) {
  3186. stun_tid tid;
  3187. int err_code = 0;
  3188. const uint8_t *reason = NULL;
  3189. int no_response = 0;
  3190. uint16_t unknown_attrs[MAX_NUMBER_OF_UNKNOWN_ATTRS];
  3191. uint16_t ua_num = 0;
  3192. uint16_t method =
  3193. stun_get_method_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh));
  3194. *resp_constructed = 0;
  3195. stun_tid_from_message_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh), &tid);
  3196. if (stun_is_request_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh))) {
  3197. if (method != STUN_METHOD_BINDING) {
  3198. no_response = 1;
  3199. if (server->verbose) {
  3200. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: OLD STUN method 0x%x ignored\n", __FUNCTION__, (unsigned int)method);
  3201. }
  3202. }
  3203. if (!err_code && !(*resp_constructed) && !no_response) {
  3204. int origin_changed = 0;
  3205. ioa_addr response_origin;
  3206. int dest_changed = 0;
  3207. ioa_addr response_destination;
  3208. handle_turn_binding(server, ss, &tid, resp_constructed, &err_code, &reason, unknown_attrs, &ua_num, in_buffer,
  3209. nbh, &origin_changed, &response_origin, &dest_changed, &response_destination, cookie, 1);
  3210. if (server->verbose && *(server->log_binding)) {
  3211. log_method(ss, "OLD BINDING", err_code, reason);
  3212. }
  3213. if (*resp_constructed && !err_code && (origin_changed || dest_changed)) {
  3214. if (server->verbose) {
  3215. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "RFC3489 CHANGE request successfully processed\n");
  3216. }
  3217. {
  3218. size_t oldsz = strlen(get_version(server));
  3219. size_t newsz = (((oldsz) >> 2) + 1) << 2;
  3220. uint8_t software[120];
  3221. memset(software, 0, sizeof(software));
  3222. if (newsz > sizeof(software))
  3223. newsz = sizeof(software);
  3224. memcpy(software, get_version(server), oldsz);
  3225. size_t len = ioa_network_buffer_get_size(nbh);
  3226. stun_attr_add_str(ioa_network_buffer_data(nbh), &len, OLD_STUN_ATTRIBUTE_SERVER, software, newsz);
  3227. ioa_network_buffer_set_size(nbh, len);
  3228. }
  3229. send_turn_message_to(server, nbh, &response_origin, &response_destination);
  3230. no_response = 1;
  3231. }
  3232. }
  3233. } else {
  3234. no_response = 1;
  3235. if (server->verbose) {
  3236. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "Wrong OLD STUN message received\n");
  3237. }
  3238. }
  3239. if (ua_num > 0) {
  3240. err_code = 420;
  3241. size_t len = ioa_network_buffer_get_size(nbh);
  3242. old_stun_init_error_response_str(method, ioa_network_buffer_data(nbh), &len, err_code, NULL, &tid, cookie);
  3243. stun_attr_add_str(ioa_network_buffer_data(nbh), &len, STUN_ATTRIBUTE_UNKNOWN_ATTRIBUTES,
  3244. (const uint8_t *)unknown_attrs, (ua_num * 2));
  3245. ioa_network_buffer_set_size(nbh, len);
  3246. *resp_constructed = 1;
  3247. }
  3248. if (!no_response) {
  3249. if (!(*resp_constructed)) {
  3250. if (!err_code)
  3251. err_code = 400;
  3252. size_t len = ioa_network_buffer_get_size(nbh);
  3253. old_stun_init_error_response_str(method, ioa_network_buffer_data(nbh), &len, err_code, reason, &tid, cookie);
  3254. ioa_network_buffer_set_size(nbh, len);
  3255. *resp_constructed = 1;
  3256. }
  3257. {
  3258. size_t oldsz = strlen(get_version(server));
  3259. size_t newsz = (((oldsz) >> 2) + 1) << 2;
  3260. uint8_t software[120];
  3261. memset(software, 0, sizeof(software));
  3262. if (newsz > sizeof(software))
  3263. newsz = sizeof(software);
  3264. memcpy(software, get_version(server), oldsz);
  3265. size_t len = ioa_network_buffer_get_size(nbh);
  3266. stun_attr_add_str(ioa_network_buffer_data(nbh), &len, OLD_STUN_ATTRIBUTE_SERVER, software, newsz);
  3267. ioa_network_buffer_set_size(nbh, len);
  3268. }
  3269. if (err_code) {
  3270. if (server->verbose) {
  3271. log_method(ss, "OLD STUN message", err_code, reason);
  3272. }
  3273. }
  3274. } else {
  3275. *resp_constructed = 0;
  3276. }
  3277. return 0;
  3278. }
  3279. //////////////////////////////////////////////////////////////////
  3280. static int write_to_peerchannel(ts_ur_super_session *ss, uint16_t chnum, ioa_net_data *in_buffer) {
  3281. int rc = 0;
  3282. if (ss && (in_buffer->recv_ttl != 0)) {
  3283. allocation *a = get_allocation_ss(ss);
  3284. if (is_allocation_valid(a)) {
  3285. ch_info *chn = allocation_get_ch_info(a, chnum);
  3286. if (!chn)
  3287. return -1;
  3288. /* Channel packets are always sent with DF=0: */
  3289. set_df_on_ioa_socket(get_relay_socket_ss(ss, chn->peer_addr.ss.sa_family), 0);
  3290. ioa_network_buffer_handle nbh = in_buffer->nbh;
  3291. ioa_network_buffer_add_offset_size(in_buffer->nbh, STUN_CHANNEL_HEADER_LENGTH, 0,
  3292. ioa_network_buffer_get_size(in_buffer->nbh) - STUN_CHANNEL_HEADER_LENGTH);
  3293. ioa_network_buffer_header_init(nbh);
  3294. int skip = 0;
  3295. rc = send_data_from_ioa_socket_nbh(get_relay_socket_ss(ss, chn->peer_addr.ss.sa_family), &(chn->peer_addr), nbh,
  3296. in_buffer->recv_ttl - 1, in_buffer->recv_tos, &skip);
  3297. if (!skip && rc > -1) {
  3298. ++(ss->peer_sent_packets);
  3299. ss->peer_sent_bytes += (uint32_t)ioa_network_buffer_get_size(in_buffer->nbh);
  3300. turn_report_session_usage(ss, 0);
  3301. }
  3302. in_buffer->nbh = NULL;
  3303. }
  3304. }
  3305. return rc;
  3306. }
  3307. static void client_input_handler(ioa_socket_handle s, int event_type, ioa_net_data *data, void *arg, int can_resume);
  3308. static void peer_input_handler(ioa_socket_handle s, int event_type, ioa_net_data *data, void *arg, int can_resume);
  3309. /////////////// Client actions /////////////////
  3310. int shutdown_client_connection(turn_turnserver *server, ts_ur_super_session *ss, int force, const char *reason) {
  3311. FUNCSTART;
  3312. if (!ss)
  3313. return -1;
  3314. SOCKET_TYPE socket_type = get_ioa_socket_type(ss->client_socket);
  3315. turn_report_session_usage(ss, 1);
  3316. dec_quota(ss);
  3317. dec_bps(ss);
  3318. allocation *alloc = get_allocation_ss(ss);
  3319. if (!is_allocation_valid(alloc)) {
  3320. force = 1;
  3321. }
  3322. if (!force && ss->is_mobile) {
  3323. if (ss->client_socket && server->verbose) {
  3324. char sraddr[129] = "\0";
  3325. char sladdr[129] = "\0";
  3326. addr_to_string(get_remote_addr_from_ioa_socket(ss->client_socket), (uint8_t *)sraddr);
  3327. addr_to_string(get_local_addr_from_ioa_socket(ss->client_socket), (uint8_t *)sladdr);
  3328. TURN_LOG_FUNC(
  3329. TURN_LOG_LEVEL_INFO,
  3330. "session %018llu: closed (1st stage), user <%s> realm <%s> origin <%s>, local %s, remote %s, reason: %s\n",
  3331. (unsigned long long)(ss->id), (char *)ss->username, (char *)ss->realm_options.name, (char *)ss->origin,
  3332. sladdr, sraddr, reason);
  3333. }
  3334. IOA_CLOSE_SOCKET(ss->client_socket);
  3335. FUNCEND;
  3336. return 0;
  3337. }
  3338. if (eve(server->verbose)) {
  3339. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "closing session 0x%lx, client socket 0x%lx (socket session=0x%lx)\n", (long)ss,
  3340. (long)ss->client_socket, (long)get_ioa_socket_session(ss->client_socket));
  3341. }
  3342. if (server->disconnect)
  3343. server->disconnect(ss);
  3344. if (server->verbose) {
  3345. char sraddr[129] = "\0";
  3346. char sladdr[129] = "\0";
  3347. addr_to_string(get_remote_addr_from_ioa_socket(ss->client_socket), (uint8_t *)sraddr);
  3348. addr_to_string(get_local_addr_from_ioa_socket(ss->client_socket), (uint8_t *)sladdr);
  3349. TURN_LOG_FUNC(
  3350. TURN_LOG_LEVEL_INFO,
  3351. "session %018llu: closed (2nd stage), user <%s> realm <%s> origin <%s>, local %s, remote %s, reason: %s\n",
  3352. (unsigned long long)(ss->id), (char *)ss->username, (char *)ss->realm_options.name, (char *)ss->origin, sladdr,
  3353. sraddr, reason);
  3354. }
  3355. IOA_CLOSE_SOCKET(ss->client_socket);
  3356. {
  3357. int i;
  3358. for (i = 0; i < ALLOC_PROTOCOLS_NUMBER; ++i) {
  3359. IOA_CLOSE_SOCKET(ss->alloc.relay_sessions[i].s);
  3360. }
  3361. }
  3362. turn_server_remove_all_from_ur_map_ss(ss, socket_type);
  3363. FUNCEND;
  3364. return 0;
  3365. }
  3366. static void client_to_be_allocated_timeout_handler(ioa_engine_handle e, void *arg) {
  3367. if (!arg)
  3368. return;
  3369. UNUSED_ARG(e);
  3370. ts_ur_super_session *ss = (ts_ur_super_session *)arg;
  3371. turn_turnserver *server = (turn_turnserver *)(ss->server);
  3372. if (!server)
  3373. return;
  3374. FUNCSTART;
  3375. int to_close = 0;
  3376. ioa_socket_handle s = ss->client_socket;
  3377. if (!s || ioa_socket_tobeclosed(s)) {
  3378. to_close = 1;
  3379. } else if (get_ioa_socket_app_type(s) == HTTPS_CLIENT_SOCKET) {
  3380. ;
  3381. } else {
  3382. ioa_socket_handle rs4 = ss->alloc.relay_sessions[ALLOC_IPV4_INDEX].s;
  3383. ioa_socket_handle rs6 = ss->alloc.relay_sessions[ALLOC_IPV6_INDEX].s;
  3384. if ((!rs4 || ioa_socket_tobeclosed(rs4)) && (!rs6 || ioa_socket_tobeclosed(rs6))) {
  3385. to_close = 1;
  3386. } else if (ss->client_socket == NULL) {
  3387. to_close = 1;
  3388. } else if (!(ss->alloc.relay_sessions[ALLOC_IPV4_INDEX].lifetime_ev) &&
  3389. !(ss->alloc.relay_sessions[ALLOC_IPV6_INDEX].lifetime_ev)) {
  3390. to_close = 1;
  3391. } else if (!(ss->to_be_allocated_timeout_ev)) {
  3392. to_close = 1;
  3393. }
  3394. }
  3395. if (to_close) {
  3396. IOA_EVENT_DEL(ss->to_be_allocated_timeout_ev);
  3397. shutdown_client_connection(server, ss, 1, "allocation watchdog determined stale session state");
  3398. }
  3399. FUNCEND;
  3400. }
  3401. static int write_client_connection(turn_turnserver *server, ts_ur_super_session *ss, ioa_network_buffer_handle nbh,
  3402. int ttl, int tos) {
  3403. FUNCSTART;
  3404. if (!(ss->client_socket)) {
  3405. ioa_network_buffer_delete(server->e, nbh);
  3406. FUNCEND;
  3407. return -1;
  3408. } else {
  3409. if (eve(server->verbose)) {
  3410. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: prepare to write to s 0x%lx\n", __FUNCTION__, (long)(ss->client_socket));
  3411. }
  3412. int skip = 0;
  3413. int ret = send_data_from_ioa_socket_nbh(ss->client_socket, NULL, nbh, ttl, tos, &skip);
  3414. if (!skip && ret > -1) {
  3415. ++(ss->sent_packets);
  3416. ss->sent_bytes += (uint32_t)ioa_network_buffer_get_size(nbh);
  3417. turn_report_session_usage(ss, 0);
  3418. }
  3419. FUNCEND;
  3420. return ret;
  3421. }
  3422. }
  3423. static void client_ss_allocation_timeout_handler(ioa_engine_handle e, void *arg) {
  3424. UNUSED_ARG(e);
  3425. if (!arg)
  3426. return;
  3427. relay_endpoint_session *rsession = (relay_endpoint_session *)arg;
  3428. if (!(rsession->s))
  3429. return;
  3430. ts_ur_super_session *ss = get_ioa_socket_session(rsession->s);
  3431. if (!ss)
  3432. return;
  3433. allocation *a = get_allocation_ss(ss);
  3434. turn_turnserver *server = (turn_turnserver *)(ss->server);
  3435. if (!server) {
  3436. clear_allocation(a, get_ioa_socket_type(ss->client_socket));
  3437. return;
  3438. }
  3439. FUNCSTART;
  3440. int family = get_ioa_socket_address_family(rsession->s);
  3441. set_allocation_family_invalid(a, family);
  3442. if (!get_relay_socket(a, AF_INET) && !get_relay_socket(a, AF_INET6)) {
  3443. shutdown_client_connection(server, ss, 0, "allocation timeout");
  3444. }
  3445. FUNCEND;
  3446. }
  3447. static int create_relay_connection(turn_turnserver *server, ts_ur_super_session *ss, uint32_t lifetime,
  3448. int address_family, uint8_t transport, int even_port, uint64_t in_reservation_token,
  3449. uint64_t *out_reservation_token, int *err_code, const uint8_t **reason,
  3450. accept_cb acb) {
  3451. if (server && ss && ss->client_socket && !ioa_socket_tobeclosed(ss->client_socket)) {
  3452. allocation *a = get_allocation_ss(ss);
  3453. relay_endpoint_session *newelem = NULL;
  3454. ioa_socket_handle rtcp_s = NULL;
  3455. if (in_reservation_token) {
  3456. ioa_socket_handle s = NULL;
  3457. if ((get_ioa_socket_from_reservation(server->e, in_reservation_token, &s) < 0) || !s ||
  3458. ioa_socket_tobeclosed(s)) {
  3459. IOA_CLOSE_SOCKET(s);
  3460. *err_code = 508;
  3461. *reason = (const uint8_t *)"Cannot find reserved socket";
  3462. return -1;
  3463. }
  3464. int family = get_ioa_socket_address_family(s);
  3465. newelem = get_relay_session_ss(ss, family);
  3466. if (newelem->s != s) {
  3467. IOA_CLOSE_SOCKET(newelem->s);
  3468. memset(newelem, 0, sizeof(relay_endpoint_session));
  3469. newelem->s = s;
  3470. }
  3471. addr_debug_print(server->verbose, get_local_addr_from_ioa_socket(newelem->s), "Local relay addr (RTCP)");
  3472. } else {
  3473. int family = get_family(address_family, server->e, ss->client_socket);
  3474. newelem = get_relay_session_ss(ss, family);
  3475. IOA_CLOSE_SOCKET(newelem->s);
  3476. memset(newelem, 0, sizeof(relay_endpoint_session));
  3477. newelem->s = NULL;
  3478. int res = create_relay_ioa_sockets(server->e, ss->client_socket, address_family, transport, even_port,
  3479. &(newelem->s), &rtcp_s, out_reservation_token, err_code, reason, acb, ss);
  3480. if (res < 0) {
  3481. if (!(*err_code))
  3482. *err_code = 508;
  3483. if (!(*reason))
  3484. *reason = (const uint8_t *)"Cannot create socket";
  3485. IOA_CLOSE_SOCKET(newelem->s);
  3486. IOA_CLOSE_SOCKET(rtcp_s);
  3487. return -1;
  3488. }
  3489. }
  3490. if (newelem->s == NULL) {
  3491. IOA_CLOSE_SOCKET(rtcp_s);
  3492. *err_code = 508;
  3493. *reason = (const uint8_t *)"Cannot create relay socket";
  3494. return -1;
  3495. }
  3496. if (rtcp_s) {
  3497. if (out_reservation_token && *out_reservation_token) {
  3498. /* OK */
  3499. } else {
  3500. IOA_CLOSE_SOCKET(newelem->s);
  3501. IOA_CLOSE_SOCKET(rtcp_s);
  3502. *err_code = 500;
  3503. *reason = (const uint8_t *)"Wrong reservation tokens (internal error)";
  3504. return -1;
  3505. }
  3506. }
  3507. /* RFC6156: do not use DF when IPv6 is involved: */
  3508. if ((get_ioa_socket_address_family(newelem->s) == AF_INET6) ||
  3509. (get_ioa_socket_address_family(ss->client_socket) == AF_INET6))
  3510. set_do_not_use_df(newelem->s);
  3511. if (get_ioa_socket_type(newelem->s) != TCP_SOCKET) {
  3512. if (register_callback_on_ioa_socket(server->e, newelem->s, IOA_EV_READ, peer_input_handler, ss, 0) < 0) {
  3513. return -1;
  3514. }
  3515. }
  3516. if (lifetime < 1)
  3517. lifetime = STUN_DEFAULT_ALLOCATE_LIFETIME;
  3518. else if (lifetime > (uint32_t) * (server->max_allocate_lifetime))
  3519. lifetime = (uint32_t) * (server->max_allocate_lifetime);
  3520. ioa_timer_handle ev = set_ioa_timer(server->e, lifetime, 0, client_ss_allocation_timeout_handler, newelem, 0,
  3521. "client_ss_allocation_timeout_handler");
  3522. set_allocation_lifetime_ev(a, server->ctime + lifetime, ev, get_ioa_socket_address_family(newelem->s));
  3523. set_ioa_socket_session(newelem->s, ss);
  3524. }
  3525. return 0;
  3526. }
  3527. static int refresh_relay_connection(turn_turnserver *server, ts_ur_super_session *ss, uint32_t lifetime, int even_port,
  3528. uint64_t in_reservation_token, uint64_t *out_reservation_token, int *err_code,
  3529. int family) {
  3530. UNUSED_ARG(even_port);
  3531. UNUSED_ARG(in_reservation_token);
  3532. UNUSED_ARG(out_reservation_token);
  3533. UNUSED_ARG(err_code);
  3534. allocation *a = get_allocation_ss(ss);
  3535. if (server && ss && is_allocation_valid(a)) {
  3536. if (lifetime < 1) {
  3537. lifetime = 1;
  3538. }
  3539. ioa_timer_handle ev =
  3540. set_ioa_timer(server->e, lifetime, 0, client_ss_allocation_timeout_handler, get_relay_session(a, family), 0,
  3541. "refresh_client_ss_allocation_timeout_handler");
  3542. set_allocation_lifetime_ev(a, server->ctime + lifetime, ev, family);
  3543. return 0;
  3544. } else {
  3545. return -1;
  3546. }
  3547. }
  3548. static int read_client_connection(turn_turnserver *server, ts_ur_super_session *ss, ioa_net_data *in_buffer,
  3549. int can_resume, int count_usage) {
  3550. FUNCSTART;
  3551. if (!server || !ss || !in_buffer || !(ss->client_socket) || ss->to_be_closed ||
  3552. ioa_socket_tobeclosed(ss->client_socket)) {
  3553. FUNCEND;
  3554. return -1;
  3555. }
  3556. int ret = (int)ioa_network_buffer_get_size(in_buffer->nbh);
  3557. if (ret < 0) {
  3558. FUNCEND;
  3559. return -1;
  3560. }
  3561. if (count_usage) {
  3562. ++(ss->received_packets);
  3563. ss->received_bytes += (uint32_t)ioa_network_buffer_get_size(in_buffer->nbh);
  3564. turn_report_session_usage(ss, 0);
  3565. }
  3566. if (eve(server->verbose)) {
  3567. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: data.buffer=0x%lx, data.len=%ld\n", __FUNCTION__,
  3568. (long)ioa_network_buffer_data(in_buffer->nbh), (long)ioa_network_buffer_get_size(in_buffer->nbh));
  3569. }
  3570. uint16_t chnum = 0;
  3571. uint32_t old_stun_cookie = 0;
  3572. size_t blen = ioa_network_buffer_get_size(in_buffer->nbh);
  3573. size_t orig_blen = blen;
  3574. SOCKET_TYPE st = get_ioa_socket_type(ss->client_socket);
  3575. SOCKET_APP_TYPE sat = get_ioa_socket_app_type(ss->client_socket);
  3576. int is_padding_mandatory = is_stream_socket(st);
  3577. if (sat == HTTP_CLIENT_SOCKET) {
  3578. if (server->verbose) {
  3579. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: HTTP connection input: %s\n", __FUNCTION__,
  3580. (char *)ioa_network_buffer_data(in_buffer->nbh));
  3581. }
  3582. handle_http_echo(ss->client_socket);
  3583. } else if (sat == HTTPS_CLIENT_SOCKET) {
  3584. //???
  3585. } else if (stun_is_channel_message_str(ioa_network_buffer_data(in_buffer->nbh), &blen, &chnum,
  3586. is_padding_mandatory)) {
  3587. if (ss->is_tcp_relay) {
  3588. // Forbidden
  3589. FUNCEND;
  3590. return -1;
  3591. }
  3592. int rc = 0;
  3593. if (blen <= orig_blen) {
  3594. ioa_network_buffer_set_size(in_buffer->nbh, blen);
  3595. rc = write_to_peerchannel(ss, chnum, in_buffer);
  3596. }
  3597. if (eve(server->verbose)) {
  3598. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: wrote to peer %d bytes\n", __FUNCTION__, (int)rc);
  3599. }
  3600. FUNCEND;
  3601. return 0;
  3602. } else if (stun_is_command_message_full_check_str(ioa_network_buffer_data(in_buffer->nbh),
  3603. ioa_network_buffer_get_size(in_buffer->nbh), 0,
  3604. &(ss->enforce_fingerprints))) {
  3605. ioa_network_buffer_handle nbh = ioa_network_buffer_allocate(server->e);
  3606. int resp_constructed = 0;
  3607. uint16_t method =
  3608. stun_get_method_str(ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh));
  3609. handle_turn_command(server, ss, in_buffer, nbh, &resp_constructed, can_resume);
  3610. if ((method != STUN_METHOD_BINDING) && (method != STUN_METHOD_SEND))
  3611. report_turn_session_info(server, ss, 0);
  3612. if (ss->to_be_closed || ioa_socket_tobeclosed(ss->client_socket)) {
  3613. FUNCEND;
  3614. ioa_network_buffer_delete(server->e, nbh);
  3615. return 0;
  3616. }
  3617. if (resp_constructed) {
  3618. if ((server->fingerprint) || ss->enforce_fingerprints) {
  3619. size_t len = ioa_network_buffer_get_size(nbh);
  3620. if (stun_attr_add_fingerprint_str(ioa_network_buffer_data(nbh), &len) < 0) {
  3621. FUNCEND;
  3622. ioa_network_buffer_delete(server->e, nbh);
  3623. return -1;
  3624. }
  3625. ioa_network_buffer_set_size(nbh, len);
  3626. }
  3627. int ret = write_client_connection(server, ss, nbh, TTL_IGNORE, TOS_IGNORE);
  3628. FUNCEND;
  3629. return ret;
  3630. } else {
  3631. ioa_network_buffer_delete(server->e, nbh);
  3632. return 0;
  3633. }
  3634. } else if (old_stun_is_command_message_str(ioa_network_buffer_data(in_buffer->nbh),
  3635. ioa_network_buffer_get_size(in_buffer->nbh), &old_stun_cookie) &&
  3636. !(*(server->no_stun)) && !(*(server->no_stun_backward_compatibility))) {
  3637. ioa_network_buffer_handle nbh = ioa_network_buffer_allocate(server->e);
  3638. int resp_constructed = 0;
  3639. handle_old_stun_command(server, ss, in_buffer, nbh, &resp_constructed, old_stun_cookie);
  3640. if (resp_constructed) {
  3641. int ret = write_client_connection(server, ss, nbh, TTL_IGNORE, TOS_IGNORE);
  3642. FUNCEND;
  3643. return ret;
  3644. } else {
  3645. ioa_network_buffer_delete(server->e, nbh);
  3646. return 0;
  3647. }
  3648. } else {
  3649. SOCKET_TYPE st = get_ioa_socket_type(ss->client_socket);
  3650. if (is_stream_socket(st)) {
  3651. if (is_http((char *)ioa_network_buffer_data(in_buffer->nbh), ioa_network_buffer_get_size(in_buffer->nbh))) {
  3652. const char *proto = st == TLS_SOCKET ? "HTTPS" : "HTTP";
  3653. if ((st == TCP_SOCKET) && (try_acme_redirect((char *)ioa_network_buffer_data(in_buffer->nbh),
  3654. ioa_network_buffer_get_size(in_buffer->nbh), server->acme_redirect,
  3655. ss->client_socket) == 0)) {
  3656. ss->to_be_closed = 1;
  3657. return 0;
  3658. } else if (*server->web_admin_listen_on_workers) {
  3659. if (st == TLS_SOCKET) {
  3660. set_ioa_socket_app_type(ss->client_socket, HTTPS_CLIENT_SOCKET);
  3661. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: %s (%s %s) request: %zu\n", __FUNCTION__, proto,
  3662. get_ioa_socket_cipher(ss->client_socket), get_ioa_socket_ssl_method(ss->client_socket),
  3663. ioa_network_buffer_get_size(in_buffer->nbh));
  3664. if (server->send_https_socket) {
  3665. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s socket to be detached: 0x%lx, st=%d, sat=%d\n", __FUNCTION__,
  3666. (long)ss->client_socket, get_ioa_socket_type(ss->client_socket),
  3667. get_ioa_socket_app_type(ss->client_socket));
  3668. ioa_socket_handle new_s = detach_ioa_socket(ss->client_socket);
  3669. if (new_s) {
  3670. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s new detached socket: 0x%lx, st=%d, sat=%d\n", __FUNCTION__,
  3671. (long)new_s, get_ioa_socket_type(new_s), get_ioa_socket_app_type(new_s));
  3672. server->send_https_socket(new_s);
  3673. }
  3674. ss->to_be_closed = 1;
  3675. }
  3676. } else {
  3677. set_ioa_socket_app_type(ss->client_socket, HTTP_CLIENT_SOCKET);
  3678. if (server->verbose) {
  3679. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: %s request: %zu\n", __FUNCTION__, proto,
  3680. ioa_network_buffer_get_size(in_buffer->nbh));
  3681. }
  3682. handle_http_echo(ss->client_socket);
  3683. }
  3684. return 0;
  3685. } else if (*server->respond_http_unsupported) {
  3686. /* Our incoming connection is HTTP, but we are not serving the
  3687. * admin site. Return a 400 response. */
  3688. if (st == TLS_SOCKET) {
  3689. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: %s (%s %s) returning 400 response: %zu\n", __FUNCTION__, proto,
  3690. get_ioa_socket_cipher(ss->client_socket), get_ioa_socket_ssl_method(ss->client_socket),
  3691. ioa_network_buffer_get_size(in_buffer->nbh));
  3692. set_ioa_socket_app_type(ss->client_socket, HTTPS_CLIENT_SOCKET);
  3693. } else {
  3694. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: %s returning 400 response", __FUNCTION__, proto);
  3695. }
  3696. ioa_network_buffer_handle nbh_http = ioa_network_buffer_allocate(ss->client_socket->e);
  3697. /* HTTP content */
  3698. char *content = "HTTP not supported.\n";
  3699. /* Measure length of content */
  3700. int content_length = strlen(content);
  3701. /* Construct full response */
  3702. char buffer[1024];
  3703. snprintf(buffer, sizeof(buffer),
  3704. "HTTP/1.1 400 %s Not supported\r\nConnection: close\r\nContent-Type: "
  3705. "text/plain\r\nContent-Length: %d\r\n\r\n%s",
  3706. proto, content_length, content);
  3707. ioa_network_buffer_set_size(nbh_http, strlen(buffer));
  3708. memcpy(ioa_network_buffer_data(nbh_http), buffer, strlen(buffer));
  3709. send_data_from_ioa_socket_nbh(ss->client_socket, NULL, nbh_http, TTL_IGNORE, TOS_IGNORE, NULL);
  3710. } else {
  3711. ss->to_be_closed = 1;
  3712. return 0;
  3713. }
  3714. }
  3715. }
  3716. }
  3717. // Unrecognized message received, ignore it
  3718. FUNCEND;
  3719. return -1;
  3720. }
  3721. static int attach_socket_to_session(turn_turnserver *server, ioa_socket_handle s, ts_ur_super_session *ss) {
  3722. int ret = -1;
  3723. FUNCSTART;
  3724. if (s && server && ss && !ioa_socket_tobeclosed(s)) {
  3725. if (ss->client_socket != s) {
  3726. IOA_CLOSE_SOCKET(ss->client_socket);
  3727. ss->client_socket = s;
  3728. if (register_callback_on_ioa_socket(server->e, s, IOA_EV_READ, client_input_handler, ss, 0) < 0) {
  3729. return -1;
  3730. }
  3731. set_ioa_socket_session(s, ss);
  3732. }
  3733. ret = 0;
  3734. }
  3735. FUNCEND;
  3736. return ret;
  3737. }
  3738. int open_client_connection_session(turn_turnserver *server, struct socket_message *sm) {
  3739. int ret = 0;
  3740. FUNCSTART;
  3741. if (!server)
  3742. return -1;
  3743. if (!(sm->s))
  3744. return -1;
  3745. ts_ur_super_session *ss = create_new_ss(server);
  3746. ss->client_socket = sm->s;
  3747. if (register_callback_on_ioa_socket(server->e, ss->client_socket, IOA_EV_READ, client_input_handler, ss, 0) < 0) {
  3748. ret = -1;
  3749. }
  3750. set_ioa_socket_session(ss->client_socket, ss);
  3751. int at = TURN_MAX_ALLOCATE_TIMEOUT;
  3752. if (*(server->stun_only))
  3753. at = TURN_MAX_ALLOCATE_TIMEOUT_STUN_ONLY;
  3754. IOA_EVENT_DEL(ss->to_be_allocated_timeout_ev);
  3755. ss->to_be_allocated_timeout_ev = set_ioa_timer(server->e, at, 0, client_to_be_allocated_timeout_handler, ss, 1,
  3756. "client_to_be_allocated_timeout_handler");
  3757. if (sm->nd.nbh) {
  3758. client_input_handler(ss->client_socket, IOA_EV_READ, &(sm->nd), ss, sm->can_resume);
  3759. ioa_network_buffer_delete(server->e, sm->nd.nbh);
  3760. sm->nd.nbh = NULL;
  3761. }
  3762. FUNCEND;
  3763. return ret;
  3764. }
  3765. /////////////// io handlers ///////////////////
  3766. static void peer_input_handler(ioa_socket_handle s, int event_type, ioa_net_data *in_buffer, void *arg,
  3767. int can_resume) {
  3768. if (!(event_type & IOA_EV_READ) || !arg)
  3769. return;
  3770. if (in_buffer->recv_ttl == 0)
  3771. return;
  3772. UNUSED_ARG(can_resume);
  3773. if (!s || ioa_socket_tobeclosed(s))
  3774. return;
  3775. ts_ur_super_session *ss = (ts_ur_super_session *)arg;
  3776. if (!ss)
  3777. return;
  3778. if (ss->to_be_closed)
  3779. return;
  3780. if (!(ss->client_socket) || ioa_socket_tobeclosed(ss->client_socket))
  3781. return;
  3782. turn_turnserver *server = (turn_turnserver *)(ss->server);
  3783. if (!server)
  3784. return;
  3785. relay_endpoint_session *elem = get_relay_session_ss(ss, get_ioa_socket_address_family(s));
  3786. if (elem->s == NULL) {
  3787. return;
  3788. }
  3789. int offset = STUN_CHANNEL_HEADER_LENGTH;
  3790. int ilen =
  3791. min((int)ioa_network_buffer_get_size(in_buffer->nbh), (int)(ioa_network_buffer_get_capacity_udp() - offset));
  3792. if (ilen >= 0) {
  3793. ++(ss->peer_received_packets);
  3794. ss->peer_received_bytes += ilen;
  3795. turn_report_session_usage(ss, 0);
  3796. allocation *a = get_allocation_ss(ss);
  3797. if (is_allocation_valid(a)) {
  3798. uint16_t chnum = 0;
  3799. ioa_network_buffer_handle nbh = NULL;
  3800. turn_permission_info *tinfo = allocation_get_permission(a, &(in_buffer->src_addr));
  3801. if (tinfo) {
  3802. chnum = get_turn_channel_number(tinfo, &(in_buffer->src_addr));
  3803. } else if (!(server->server_relay)) {
  3804. return;
  3805. }
  3806. if (chnum) {
  3807. size_t len = (size_t)(ilen);
  3808. nbh = in_buffer->nbh;
  3809. ioa_network_buffer_add_offset_size(nbh, 0, STUN_CHANNEL_HEADER_LENGTH,
  3810. ioa_network_buffer_get_size(nbh) + STUN_CHANNEL_HEADER_LENGTH);
  3811. ioa_network_buffer_header_init(nbh);
  3812. SOCKET_TYPE st = get_ioa_socket_type(ss->client_socket);
  3813. int do_padding = is_stream_socket(st);
  3814. stun_init_channel_message_str(chnum, ioa_network_buffer_data(nbh), &len, len, do_padding);
  3815. ioa_network_buffer_set_size(nbh, len);
  3816. in_buffer->nbh = NULL;
  3817. if (eve(server->verbose)) {
  3818. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "%s: send channel 0x%x\n", __FUNCTION__, (int)(chnum));
  3819. }
  3820. } else {
  3821. size_t len = 0;
  3822. nbh = ioa_network_buffer_allocate(server->e);
  3823. stun_init_indication_str(STUN_METHOD_DATA, ioa_network_buffer_data(nbh), &len);
  3824. stun_attr_add_str(ioa_network_buffer_data(nbh), &len, STUN_ATTRIBUTE_DATA,
  3825. ioa_network_buffer_data(in_buffer->nbh), (size_t)ilen);
  3826. stun_attr_add_addr_str(ioa_network_buffer_data(nbh), &len, STUN_ATTRIBUTE_XOR_PEER_ADDRESS,
  3827. &(in_buffer->src_addr));
  3828. ioa_network_buffer_set_size(nbh, len);
  3829. if (!(*server->no_software_attribute)) {
  3830. const uint8_t *field = (const uint8_t *)get_version(server);
  3831. size_t fsz = strlen(get_version(server));
  3832. size_t len = ioa_network_buffer_get_size(nbh);
  3833. stun_attr_add_str(ioa_network_buffer_data(nbh), &len, STUN_ATTRIBUTE_SOFTWARE, field, fsz);
  3834. ioa_network_buffer_set_size(nbh, len);
  3835. }
  3836. if ((server->fingerprint) || ss->enforce_fingerprints) {
  3837. size_t len = ioa_network_buffer_get_size(nbh);
  3838. stun_attr_add_fingerprint_str(ioa_network_buffer_data(nbh), &len);
  3839. ioa_network_buffer_set_size(nbh, len);
  3840. }
  3841. }
  3842. if (eve(server->verbose)) {
  3843. uint16_t *t = (uint16_t *)ioa_network_buffer_data(nbh);
  3844. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "Send data: 0x%x\n", (int)(nswap16(t[0])));
  3845. }
  3846. write_client_connection(server, ss, nbh, in_buffer->recv_ttl - 1, in_buffer->recv_tos);
  3847. }
  3848. }
  3849. }
  3850. static void client_input_handler(ioa_socket_handle s, int event_type, ioa_net_data *data, void *arg, int can_resume) {
  3851. if (!arg)
  3852. return;
  3853. UNUSED_ARG(s);
  3854. UNUSED_ARG(event_type);
  3855. ts_ur_super_session *ss = (ts_ur_super_session *)arg;
  3856. turn_turnserver *server = (turn_turnserver *)ss->server;
  3857. if (!server) {
  3858. return;
  3859. }
  3860. if (ss->client_socket != s) {
  3861. return;
  3862. }
  3863. read_client_connection(server, ss, data, can_resume, 1);
  3864. if (ss->to_be_closed) {
  3865. if (server->verbose) {
  3866. TURN_LOG_FUNC(TURN_LOG_LEVEL_INFO, "session %018llu: client socket to be closed in client handler: ss=0x%lx\n",
  3867. (unsigned long long)(ss->id), (long)ss);
  3868. }
  3869. set_ioa_socket_tobeclosed(s);
  3870. }
  3871. }
  3872. ///////////////////////////////////////////////////////////
  3873. void init_turn_server(turn_turnserver *server, turnserver_id id, int verbose, ioa_engine_handle e,
  3874. turn_credential_type ct, int stun_port, int fingerprint, dont_fragment_option_t dont_fragment,
  3875. get_user_key_cb userkeycb, check_new_allocation_quota_cb chquotacb,
  3876. release_allocation_quota_cb raqcb, ioa_addr *external_ip, vintp check_origin, vintp no_tcp_relay,
  3877. vintp no_udp_relay, vintp stale_nonce, vintp max_allocate_lifetime, vintp channel_lifetime,
  3878. vintp permission_lifetime, vintp stun_only, vintp no_stun, vintp no_software_attribute,
  3879. vintp web_admin_listen_on_workers, turn_server_addrs_list_t *alternate_servers_list,
  3880. turn_server_addrs_list_t *tls_alternate_servers_list, turn_server_addrs_list_t *aux_servers_list,
  3881. int self_udp_balance, vintp no_multicast_peers, vintp allow_loopback_peers,
  3882. ip_range_list_t *ip_whitelist, ip_range_list_t *ip_blacklist,
  3883. send_socket_to_relay_cb send_socket_to_relay, vintp secure_stun, vintp mobility, int server_relay,
  3884. send_turn_session_info_cb send_turn_session_info, send_https_socket_cb send_https_socket,
  3885. allocate_bps_cb allocate_bps_func, int oauth, const char *oauth_server_name,
  3886. const char *acme_redirect, ALLOCATION_DEFAULT_ADDRESS_FAMILY allocation_default_address_family,
  3887. vintp log_binding, vintp no_stun_backward_compatibility, vintp response_origin_only_with_rfc5780,
  3888. vintp respond_http_unsupported) {
  3889. if (!server)
  3890. return;
  3891. memset(server, 0, sizeof(turn_turnserver));
  3892. server->e = e;
  3893. server->id = id;
  3894. server->ctime = turn_time();
  3895. server->session_id_counter = 0;
  3896. server->sessions_map = ur_map_create();
  3897. server->tcp_relay_connections = ur_map_create();
  3898. server->ct = ct;
  3899. server->userkeycb = userkeycb;
  3900. server->chquotacb = chquotacb;
  3901. server->raqcb = raqcb;
  3902. server->no_multicast_peers = no_multicast_peers;
  3903. server->allow_loopback_peers = allow_loopback_peers;
  3904. server->secure_stun = secure_stun;
  3905. server->mobility = mobility;
  3906. server->server_relay = server_relay;
  3907. server->send_turn_session_info = send_turn_session_info;
  3908. server->send_https_socket = send_https_socket;
  3909. server->oauth = oauth;
  3910. if (oauth)
  3911. server->oauth_server_name = oauth_server_name;
  3912. if (mobility)
  3913. server->mobile_connections_map = ur_map_create();
  3914. server->acme_redirect = acme_redirect;
  3915. TURN_LOG_FUNC(TURN_LOG_LEVEL_DEBUG, "turn server id=%d created\n", (int)id);
  3916. server->check_origin = check_origin;
  3917. server->no_tcp_relay = no_tcp_relay;
  3918. server->no_udp_relay = no_udp_relay;
  3919. server->alternate_servers_list = alternate_servers_list;
  3920. server->tls_alternate_servers_list = tls_alternate_servers_list;
  3921. server->aux_servers_list = aux_servers_list;
  3922. server->self_udp_balance = self_udp_balance;
  3923. server->stale_nonce = stale_nonce;
  3924. server->max_allocate_lifetime = max_allocate_lifetime;
  3925. server->channel_lifetime = channel_lifetime;
  3926. server->permission_lifetime = permission_lifetime;
  3927. server->stun_only = stun_only;
  3928. server->no_stun = no_stun;
  3929. server->no_software_attribute = no_software_attribute;
  3930. server->web_admin_listen_on_workers = web_admin_listen_on_workers;
  3931. server->dont_fragment = dont_fragment;
  3932. server->fingerprint = fingerprint;
  3933. if (external_ip) {
  3934. addr_cpy(&(server->external_ip), external_ip);
  3935. server->external_ip_set = 1;
  3936. }
  3937. if (stun_port < 1)
  3938. stun_port = DEFAULT_STUN_PORT;
  3939. server->verbose = verbose;
  3940. server->ip_whitelist = ip_whitelist;
  3941. server->ip_blacklist = ip_blacklist;
  3942. server->send_socket_to_relay = send_socket_to_relay;
  3943. server->allocate_bps_func = allocate_bps_func;
  3944. server->allocation_default_address_family = allocation_default_address_family;
  3945. set_ioa_timer(server->e, 1, 0, timer_timeout_handler, server, 1, "timer_timeout_handler");
  3946. server->log_binding = log_binding;
  3947. server->no_stun_backward_compatibility = no_stun_backward_compatibility;
  3948. server->response_origin_only_with_rfc5780 = response_origin_only_with_rfc5780;
  3949. server->respond_http_unsupported = respond_http_unsupported;
  3950. }
  3951. ioa_engine_handle turn_server_get_engine(turn_turnserver *s) {
  3952. if (s)
  3953. return s->e;
  3954. return NULL;
  3955. }
  3956. void set_disconnect_cb(turn_turnserver *server, int (*disconnect)(ts_ur_super_session *)) {
  3957. server->disconnect = disconnect;
  3958. }
  3959. //////////////////////////////////////////////////////////////////