/* * libretroshare/src/chat: distantchat.cc * * Services for RetroShare. * * Copyright 2014 by Cyril Soler * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Library General Public * License Version 2 as published by the Free Software Foundation. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Library General Public License for more details. * * You should have received a copy of the GNU Library General Public * License along with this library; if not, write to the Free Software * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 * USA. * * Please report all bugs and problems to "csoler@users.sourceforge.net". * */ #include #include #include "openssl/rand.h" #include "openssl/dh.h" #include "openssl/err.h" #include "util/rsaes.h" #include "util/rsmemory.h" #include "util/rsprint.h" #include #include #include #include #include #include #include #include #include #include "distantchat.h" //#define DEBUG_DISTANT_CHAT static const uint32_t DISTANT_CHAT_KEEP_ALIVE_TIMEOUT = 6 ; // send keep alive packet so as to avoid tunnel breaks. static const uint32_t RS_DISTANT_CHAT_DH_STATUS_UNINITIALIZED = 0x0000 ; static const uint32_t RS_DISTANT_CHAT_DH_STATUS_HALF_KEY_DONE = 0x0001 ; static const uint32_t RS_DISTANT_CHAT_DH_STATUS_KEY_AVAILABLE = 0x0002 ; static const uint32_t DISTANT_CHAT_GXS_TUNNEL_SERVICE_ID = 0xa0001 ; typedef RsGxsTunnelService::RsGxsTunnelId RsGxsTunnelId; DistantChatService::DistantChatService() : mDistantChatMtx("distant chat") { mGxsTunnels = NULL ; mDistantChatPermissions = RS_DISTANT_CHAT_CONTACT_PERMISSION_FLAG_FILTER_NONE ; // default: accept everyone } void DistantChatService::connectToGxsTunnelService(RsGxsTunnelService *tr) { mGxsTunnels = tr ; tr->registerClientService(DISTANT_CHAT_GXS_TUNNEL_SERVICE_ID,this) ; } bool DistantChatService::handleOutgoingItem(RsChatItem *item) { RsGxsTunnelId tunnel_id ; { RS_STACK_MUTEX(mDistantChatMtx) ; std::map::const_iterator it=mDistantChatContacts.find(DistantChatPeerId(item->PeerId())); if(it == mDistantChatContacts.end()) return false ; } #ifdef CHAT_DEBUG std::cerr << "p3ChatService::handleOutgoingItem(): sending to " << item->PeerId() << ": interpreted as a distant chat virtual peer id." << std::endl; #endif uint32_t size = item->serial_size() ; RsTemporaryMemory mem(size) ; if(!item->serialise(mem,size)) { std::cerr << "(EE) serialisation error. Something's really wrong!" << std::endl; return false; } #ifdef DEBUG_DISTANT_CHAT std::cerr << " sending: " << RsUtil::BinToHex(mem,size) << std::endl; #endif mGxsTunnels->sendData( RsGxsTunnelId(item->PeerId()),DISTANT_CHAT_GXS_TUNNEL_SERVICE_ID,mem,size); return true; } void DistantChatService::handleRecvChatStatusItem(RsChatStatusItem *cs) { if(cs->flags & RS_CHAT_FLAG_CONNEXION_REFUSED) { #ifdef DEBUG_DISTANT_CHAT std::cerr << "(II) Distant chat: received notification that peer refuses conversation." << std::endl; #endif RsServer::notify()->notifyChatStatus(ChatId(DistantChatPeerId(cs->PeerId())),"Connexion refused by distant peer!") ; } if(cs->flags & RS_CHAT_FLAG_CLOSING_DISTANT_CONNECTION) markDistantChatAsClosed(DistantChatPeerId(cs->PeerId())) ; // nothing more to do, because the decryption routing will update the last_contact time when decrypting. if(cs->flags & RS_CHAT_FLAG_KEEP_ALIVE) std::cerr << "DistantChatService::handleRecvChatStatusItem(): received keep alive packet for inactive chat! peerId=" << cs->PeerId() << std::endl; } bool DistantChatService::acceptDataFromPeer(const RsGxsId& gxs_id,const RsGxsTunnelId& tunnel_id,bool is_client_side) { bool res = true ; if(is_client_side) // always accept distant chat when we're the client side. return true ; if(mDistantChatPermissions & RS_DISTANT_CHAT_CONTACT_PERMISSION_FLAG_FILTER_NON_CONTACTS) res = (rsIdentity!=NULL) && rsIdentity->isARegularContact(gxs_id) ; if(mDistantChatPermissions & RS_DISTANT_CHAT_CONTACT_PERMISSION_FLAG_FILTER_EVERYBODY) res = false ; if(!res) { #ifdef DEBUG_DISTANT_CHAT std::cerr << "(II) refusing distant chat from peer " << gxs_id << ". Sending a notification back to tunnel " << tunnel_id << std::endl; #endif RsChatStatusItem *item = new RsChatStatusItem ; item->flags = RS_CHAT_FLAG_CONNEXION_REFUSED ; item->status_string.clear() ; // is not used yet! But could be set in GUI to some message (??). item->PeerId(RsPeerId(tunnel_id)) ; // we do not use handleOutGoingItem() because there's no distant chat contact, as the chat is refused. uint32_t size = item->serial_size() ; RsTemporaryMemory mem(size) ; if(!item->serialise(mem,size)) { std::cerr << "(EE) serialisation error. Something's really wrong!" << std::endl; return false; } std::cerr << " sending: " << RsUtil::BinToHex(mem,size) << std::endl; mGxsTunnels->sendData( RsGxsTunnelId(item->PeerId()),DISTANT_CHAT_GXS_TUNNEL_SERVICE_ID,mem,size); } return res ; } void DistantChatService::notifyTunnelStatus(const RsGxsTunnelService::RsGxsTunnelId &tunnel_id, uint32_t tunnel_status) { #ifdef DEBUG_DISTANT_CHAT std::cerr << "DistantChatService::notifyTunnelStatus(): got notification " << std::hex << tunnel_status << std::dec << " for tunnel " << tunnel_id << std::endl; #endif switch(tunnel_status) { default: case RsGxsTunnelService::RS_GXS_TUNNEL_STATUS_UNKNOWN: std::cerr << "(EE) don't know how to handle RS_GXS_TUNNEL_STATUS_UNKNOWN !" << std::endl; break ; case RsGxsTunnelService::RS_GXS_TUNNEL_STATUS_CAN_TALK: RsServer::notify()->notifyChatStatus(ChatId(DistantChatPeerId(tunnel_id)),"Tunnel is secured. You can talk!") ; RsServer::notify()->notifyPeerStatusChanged(tunnel_id.toStdString(),RS_STATUS_ONLINE) ; break ; case RsGxsTunnelService::RS_GXS_TUNNEL_STATUS_TUNNEL_DN: RsServer::notify()->notifyChatStatus(ChatId(DistantChatPeerId(tunnel_id)),"tunnel is down...") ; RsServer::notify()->notifyPeerStatusChanged(tunnel_id.toStdString(),RS_STATUS_OFFLINE) ; break ; case RsGxsTunnelService::RS_GXS_TUNNEL_STATUS_REMOTELY_CLOSED: RsServer::notify()->notifyChatStatus(ChatId(DistantChatPeerId(tunnel_id)),"tunnel is down...") ; RsServer::notify()->notifyPeerStatusChanged(tunnel_id.toStdString(),RS_STATUS_OFFLINE) ; break ; } } void DistantChatService::receiveData(const RsGxsTunnelService::RsGxsTunnelId &tunnel_id, unsigned char *data, uint32_t data_size) { #ifdef DEBUG_DISTANT_CHAT std::cerr << "DistantChatService::receiveData(): got data of size " << data_size << " for tunnel " << tunnel_id << std::endl; std::cerr << " received: " << RsUtil::BinToHex(data,data_size) << std::endl; std::cerr << " deserialising..." << std::endl; #endif // always make the contact up to date. This is useful for server side, which doesn't know about the chat until it // receives the first item. { RS_STACK_MUTEX(mDistantChatMtx) ; RsGxsTunnelService::GxsTunnelInfo tinfo; if(!mGxsTunnels->getTunnelInfo(tunnel_id,tinfo)) return ; // Check if the data is accepted. We cannot prevent the creation of tunnels at the level of p3GxsTunnels, since tunnels are shared between services. // however, DistantChatContact& contact(mDistantChatContacts[DistantChatPeerId(tunnel_id)]) ; contact.to_id = tinfo.destination_gxs_id ; contact.from_id = tinfo.source_gxs_id ; } RsItem *item = RsChatSerialiser().deserialise(data,&data_size) ; if(item != NULL) { item->PeerId(RsPeerId(tunnel_id)) ; // just in case, but normally this is already done. handleIncomingItem(item) ; RsServer::notify()->notifyListChange(NOTIFY_LIST_PRIVATE_INCOMING_CHAT, NOTIFY_TYPE_ADD); } else std::cerr << " (EE) item could not be deserialised!" << std::endl; } void DistantChatService::markDistantChatAsClosed(const DistantChatPeerId& dcpid) { mGxsTunnels->closeExistingTunnel(RsGxsTunnelService::RsGxsTunnelId(dcpid),DISTANT_CHAT_GXS_TUNNEL_SERVICE_ID) ; RS_STACK_MUTEX(mDistantChatMtx) ; std::map::iterator it = mDistantChatContacts.find(dcpid) ; if(it != mDistantChatContacts.end()) mDistantChatContacts.erase(it) ; } bool DistantChatService::initiateDistantChatConnexion( const RsGxsId& to_gxs_id, const RsGxsId& from_gxs_id, DistantChatPeerId& dcpid, uint32_t& error_code, bool notify ) { RsGxsTunnelId tunnel_id ; if(!mGxsTunnels->requestSecuredTunnel(to_gxs_id,from_gxs_id,tunnel_id,DISTANT_CHAT_GXS_TUNNEL_SERVICE_ID,error_code)) return false ; dcpid = DistantChatPeerId(tunnel_id) ; DistantChatContact& dc_contact(mDistantChatContacts[dcpid]) ; dc_contact.from_id = from_gxs_id ; dc_contact.to_id = to_gxs_id ; error_code = RS_DISTANT_CHAT_ERROR_NO_ERROR ; if(notify) { // Make a self message to raise the chat window RsChatMsgItem *item = new RsChatMsgItem; item->message = "[Starting distant chat. Please wait for secure tunnel"; item->message += " to be established]"; item->chatFlags = RS_CHAT_FLAG_PRIVATE; item->sendTime = time(NULL); item->PeerId(RsPeerId(tunnel_id)); handleRecvChatMsgItem(item); delete item ; } return true ; } bool DistantChatService::getDistantChatStatus(const DistantChatPeerId& tunnel_id, DistantChatPeerInfo& cinfo) { RS_STACK_MUTEX(mDistantChatMtx); RsGxsTunnelService::GxsTunnelInfo tinfo; if(!mGxsTunnels->getTunnelInfo(RsGxsTunnelId(tunnel_id),tinfo)) return false; cinfo.to_id = tinfo.destination_gxs_id; cinfo.own_id = tinfo.source_gxs_id; cinfo.peer_id = tunnel_id; switch(tinfo.tunnel_status) { case RsGxsTunnelService::RS_GXS_TUNNEL_STATUS_CAN_TALK : cinfo.status = RS_DISTANT_CHAT_STATUS_CAN_TALK; break; case RsGxsTunnelService::RS_GXS_TUNNEL_STATUS_TUNNEL_DN: cinfo.status = RS_DISTANT_CHAT_STATUS_TUNNEL_DN; break; case RsGxsTunnelService::RS_GXS_TUNNEL_STATUS_REMOTELY_CLOSED: cinfo.status = RS_DISTANT_CHAT_STATUS_REMOTELY_CLOSED; break; case RsGxsTunnelService::RS_GXS_TUNNEL_STATUS_UNKNOWN: default: cinfo.status = RS_DISTANT_CHAT_STATUS_UNKNOWN; break; } return true; } bool DistantChatService::closeDistantChatConnexion(const DistantChatPeerId &tunnel_id) { mGxsTunnels->closeExistingTunnel(RsGxsTunnelId(tunnel_id), DISTANT_CHAT_GXS_TUNNEL_SERVICE_ID) ; // also remove contact. Or do we wait for the notification? return true ; } uint32_t DistantChatService::getDistantChatPermissionFlags() { return mDistantChatPermissions ; } bool DistantChatService::setDistantChatPermissionFlags(uint32_t flags) { if(mDistantChatPermissions != flags) { mDistantChatPermissions = flags ; #ifdef DEBUG_DISTANT_CHAT std::cerr << "(II) Changing distant chat permissions to " << flags << ". Existing openned chats will however remain active until closed" << std::endl; #endif triggerConfigSave() ; } return true ; } void DistantChatService::addToSaveList(std::list& list) const { /* Save permission flags */ RsConfigKeyValueSet *vitem = new RsConfigKeyValueSet ; RsTlvKeyValue kv; kv.key = "DISTANT_CHAT_PERMISSION_FLAGS" ; kv.value = RsUtil::NumberToString(mDistantChatPermissions) ; vitem->tlvkvs.pairs.push_back(kv) ; list.push_back(vitem) ; } bool DistantChatService::processLoadListItem(const RsItem *item) { const RsConfigKeyValueSet *vitem = NULL ; if(NULL != (vitem = dynamic_cast(item))) for(std::list::const_iterator kit = vitem->tlvkvs.pairs.begin(); kit != vitem->tlvkvs.pairs.end(); ++kit) if(kit->key == "DISTANT_CHAT_PERMISSION_FLAGS") { #ifdef DEBUG_DISTANT_CHAT std::cerr << "Loaded distant chat permission flags: " << kit->value << std::endl ; #endif if (!kit->value.empty()) { std::istringstream is(kit->value) ; uint32_t tmp ; is >> tmp ; if(tmp < 3) mDistantChatPermissions = tmp ; else std::cerr << "(EE) Invalid value read for DistantChatPermission flags in config: " << tmp << std::endl; } return true; } return false ; }