506 lines
19 KiB
C#
506 lines
19 KiB
C#
using System;
|
|
using System.Collections.Generic;
|
|
using System.Diagnostics;
|
|
using System.Net;
|
|
using System.Net.Sockets;
|
|
using System.Numerics;
|
|
using System.Runtime.CompilerServices;
|
|
using System.Text;
|
|
using System.Threading;
|
|
using System.Threading.Tasks;
|
|
|
|
namespace Tofvesson.Crypto
|
|
{
|
|
public delegate string OnMessageRecieved(string request, Dictionary<string, string> associations, ref bool stayAlive);
|
|
public delegate void OnClientConnectStateChanged(NetClient client, bool connect);
|
|
public sealed class NetServer
|
|
{
|
|
private readonly short port;
|
|
private readonly object state_lock = new object();
|
|
private readonly List<ClientStateObject> clients = new List<ClientStateObject>();
|
|
private readonly OnMessageRecieved callback;
|
|
private readonly OnClientConnectStateChanged onConn;
|
|
private readonly IPAddress ipAddress;
|
|
private Socket listener;
|
|
private readonly RSA crypto;
|
|
private readonly byte[] ser_cache;
|
|
private readonly int bufSize;
|
|
|
|
private bool state_running = false;
|
|
private Thread listenerThread;
|
|
|
|
|
|
public int Count
|
|
{
|
|
get
|
|
{
|
|
return clients.Count;
|
|
}
|
|
}
|
|
|
|
public bool Running
|
|
{
|
|
get
|
|
{
|
|
lock (state_lock) return state_running;
|
|
}
|
|
|
|
private set
|
|
{
|
|
lock (state_lock) state_running = value;
|
|
}
|
|
}
|
|
|
|
public NetServer(RSA crypto, short port, OnMessageRecieved callback, OnClientConnectStateChanged onConn, int bufSize = 16384)
|
|
{
|
|
this.callback = callback;
|
|
this.onConn = onConn;
|
|
this.bufSize = bufSize;
|
|
this.crypto = crypto;
|
|
this.port = port;
|
|
this.ser_cache = crypto.Serialize(); // Keep this here so we don't wastefully re-serialize every time we get a new client
|
|
|
|
IPHostEntry ipHostInfo = Dns.GetHostEntry(Dns.GetHostName());
|
|
this.ipAddress = ipHostInfo.GetIPV4();
|
|
if (ipAddress == null)
|
|
ipAddress = IPAddress.Parse("127.0.0.1"); // If there was no IPv4 result in dns lookup, use loopback address
|
|
}
|
|
|
|
public void StartListening()
|
|
{
|
|
bool isAlive = false;
|
|
object lock_await = new object();
|
|
if(!Running && (listenerThread==null || !listenerThread.IsAlive))
|
|
{
|
|
Running = true;
|
|
listenerThread = new Thread(() =>
|
|
{
|
|
|
|
this.listener = new Socket(ipAddress.AddressFamily, SocketType.Stream, ProtocolType.Tcp)
|
|
{
|
|
Blocking = false // When calling Accept() with no queued sockets, listener throws an exception
|
|
};
|
|
IPEndPoint localEndPoint = new IPEndPoint(ipAddress, port);
|
|
listener.Bind(localEndPoint);
|
|
listener.Listen(100);
|
|
|
|
byte[] buffer = new byte[bufSize];
|
|
lock (lock_await) isAlive = true;
|
|
Stopwatch limiter = new Stopwatch();
|
|
while (Running)
|
|
{
|
|
limiter.Start();
|
|
// Accept clients
|
|
try
|
|
{
|
|
Socket s = listener.Accept();
|
|
s.Blocking = false;
|
|
clients.Add(new ClientStateObject(new NetClient(s, crypto, callback, onConn), buffer));
|
|
}
|
|
catch (Exception)
|
|
{
|
|
if(clients.Count==0)
|
|
Thread.Sleep(25); // Wait a bit before trying to accept another client
|
|
}
|
|
|
|
// Update clients
|
|
foreach (ClientStateObject cli in clients.ToArray())
|
|
// Ensure we are still connected to client
|
|
if (!(cli.IsConnected() && !cli.Update()))
|
|
{
|
|
cli.client.onConn(cli.client, false);
|
|
clients.Remove(cli);
|
|
continue;
|
|
}
|
|
limiter.Stop();
|
|
if (limiter.ElapsedMilliseconds < 125) Thread.Sleep(250); // If loading data wasn't heavy, take a break
|
|
limiter.Reset();
|
|
}
|
|
})
|
|
{
|
|
Priority = ThreadPriority.Highest,
|
|
Name = $"NetServer-${port}"
|
|
};
|
|
listenerThread.Start();
|
|
}
|
|
|
|
bool rd;
|
|
do
|
|
{
|
|
Thread.Sleep(25);
|
|
lock (lock_await) rd = isAlive;
|
|
} while (!rd);
|
|
}
|
|
|
|
public Task<object> StopRunning()
|
|
{
|
|
Running = false;
|
|
|
|
return new TaskFactory().StartNew<object>(() =>
|
|
{
|
|
listenerThread.Join();
|
|
return null;
|
|
});
|
|
}
|
|
|
|
private class ClientStateObject
|
|
{
|
|
internal NetClient client;
|
|
private bool hasCrypto = false; // Whether or not encrypted communication has been etablished
|
|
private Queue<byte> buffer = new Queue<byte>(); // Incoming data buffer
|
|
private int expectedSize = 0; // Expected size of next message
|
|
private readonly byte[] buf;
|
|
|
|
public ClientStateObject(NetClient client, byte[] buf)
|
|
{
|
|
this.client = client;
|
|
this.buf = buf;
|
|
}
|
|
|
|
public bool Update()
|
|
{
|
|
bool stop = client.SyncListener(ref hasCrypto, ref expectedSize, out bool read, buffer, buf);
|
|
return stop;
|
|
}
|
|
public bool IsConnected() => client.IsConnected;
|
|
}
|
|
}
|
|
|
|
public class NetClient
|
|
{
|
|
private static readonly RandomProvider rp = new CryptoRandomProvider();
|
|
|
|
// Thread state lock for primitive values
|
|
private readonly object state_lock = new object();
|
|
|
|
// Primitive state values
|
|
private bool state_running = false;
|
|
|
|
// Socket event listener
|
|
private Thread eventListener;
|
|
|
|
// Communication parameters
|
|
protected readonly Queue<byte[]> messageBuffer = new Queue<byte[]>();
|
|
public readonly Dictionary<string, string> assignedValues = new Dictionary<string, string>();
|
|
protected readonly OnMessageRecieved handler;
|
|
protected internal readonly OnClientConnectStateChanged onConn;
|
|
protected readonly IPAddress target;
|
|
protected readonly int bufSize;
|
|
protected readonly RSA decrypt;
|
|
protected internal long lastComm = DateTime.Now.Ticks; // Latest comunication event (in ticks)
|
|
public RSA RemoteCrypto { get => decrypt; }
|
|
|
|
// Connection to peer
|
|
protected Socket Connection { get; private set; }
|
|
|
|
// State/connection parameters
|
|
protected Rijndael128 Crypto { get; private set; }
|
|
protected GenericCBC CBC { get; private set; }
|
|
public short Port { get; }
|
|
protected bool Running
|
|
{
|
|
get
|
|
{
|
|
lock (state_lock) return state_running;
|
|
}
|
|
private set
|
|
{
|
|
lock (state_lock) state_running = value;
|
|
}
|
|
}
|
|
|
|
protected internal bool IsConnected
|
|
{
|
|
get
|
|
{
|
|
return Connection != null && Connection.Connected && !(Connection.Poll(1, SelectMode.SelectRead) && Connection.Available == 0);
|
|
}
|
|
}
|
|
|
|
public bool IsAlive
|
|
{
|
|
get
|
|
{
|
|
return Running || (Connection != null && Connection.Connected) || (eventListener != null && eventListener.IsAlive);
|
|
}
|
|
}
|
|
|
|
protected bool ServerSide { get; private set; }
|
|
|
|
|
|
public NetClient(Rijndael128 crypto, IPAddress target, short port, OnMessageRecieved handler, OnClientConnectStateChanged onConn, int bufSize = 16384)
|
|
{
|
|
#pragma warning disable CS0618 // Type or member is obsolete
|
|
if (target.AddressFamily==AddressFamily.InterNetwork && target.Address == 16777343)
|
|
#pragma warning restore CS0618 // Type or member is obsolete
|
|
{
|
|
IPAddress addr = Dns.GetHostEntry(Dns.GetHostName()).GetIPV4();
|
|
if (addr != null) target = addr;
|
|
}
|
|
this.target = target;
|
|
Crypto = crypto;
|
|
if(crypto!=null) CBC = new PCBC(crypto, rp);
|
|
this.bufSize = bufSize;
|
|
this.handler = handler;
|
|
this.onConn = onConn;
|
|
Port = port;
|
|
ServerSide = false;
|
|
}
|
|
|
|
internal NetClient(Socket sock, RSA crypto, OnMessageRecieved handler, OnClientConnectStateChanged onConn)
|
|
: this(null, ((IPEndPoint)sock.RemoteEndPoint).Address, (short) ((IPEndPoint)sock.RemoteEndPoint).Port, handler, onConn, -1)
|
|
{
|
|
decrypt = crypto;
|
|
Connection = sock;
|
|
Running = true;
|
|
ServerSide = true;
|
|
|
|
// Initiate crypto-handshake by sending public keys
|
|
Connection.Send(NetSupport.WithHeader(crypto.Serialize()));
|
|
}
|
|
|
|
public virtual void Connect()
|
|
{
|
|
if (ServerSide) throw new SystemException("Serverside socket cannot connect to a remote peer!");
|
|
NetSupport.DoStateCheck(IsAlive || (eventListener != null && eventListener.IsAlive), false);
|
|
Connection = new Socket(SocketType.Stream, ProtocolType.Tcp);
|
|
Connection.Connect(target, Port);
|
|
Running = true;
|
|
eventListener = new Thread(() =>
|
|
{
|
|
bool cryptoEstablished = false;
|
|
int mLen = 0;
|
|
Queue<byte> ibuf = new Queue<byte>();
|
|
byte[] buffer = new byte[bufSize];
|
|
Stopwatch limiter = new Stopwatch();
|
|
while (Running)
|
|
{
|
|
limiter.Start();
|
|
if (SyncListener(ref cryptoEstablished, ref mLen, out bool _, ibuf, buffer))
|
|
break;
|
|
if (cryptoEstablished && DateTime.Now.Ticks >= lastComm + (5 * TimeSpan.TicksPerSecond))
|
|
try
|
|
{
|
|
Connection.Send(NetSupport.WithHeader(new byte[0])); // Send a test packet. (Will just send an empty header to the peer)
|
|
lastComm = DateTime.Now.Ticks;
|
|
}
|
|
catch
|
|
{
|
|
break; // Connection died
|
|
}
|
|
limiter.Stop();
|
|
if (limiter.ElapsedMilliseconds < 125) Thread.Sleep(250); // If loading data wasn't heavy, take a break
|
|
limiter.Reset();
|
|
}
|
|
if (ibuf.Count != 0) Debug.WriteLine("Client socket closed with unread data!");
|
|
onConn(this, false);
|
|
})
|
|
{
|
|
Priority = ThreadPriority.Highest,
|
|
Name = $"NetClient-${target}:${Port}"
|
|
};
|
|
eventListener.Start();
|
|
}
|
|
|
|
protected internal bool SyncListener(ref bool cryptoEstablished, ref int mLen, out bool acceptedData, Queue<byte> ibuf, byte[] buffer)
|
|
{
|
|
if (cryptoEstablished)
|
|
{
|
|
lock (messageBuffer)
|
|
{
|
|
foreach (byte[] message in messageBuffer) Connection.Send(NetSupport.WithHeader(message));
|
|
if(messageBuffer.Count > 0) lastComm = DateTime.Now.Ticks;
|
|
messageBuffer.Clear();
|
|
}
|
|
}
|
|
if (acceptedData = Connection.Available > 0)
|
|
{
|
|
int read = Connection.Receive(buffer);
|
|
ibuf.EnqueueAll(buffer, 0, read);
|
|
if (read > 0) lastComm = DateTime.Now.Ticks;
|
|
}
|
|
if (mLen == 0 && ibuf.Count >= 4)
|
|
mLen = Support.ReadInt(ibuf.Dequeue(4), 0);
|
|
if (mLen != 0 && ibuf.Count >= mLen)
|
|
{
|
|
// Got a full message. Parse!
|
|
byte[] message = ibuf.Dequeue(mLen);
|
|
lastComm = DateTime.Now.Ticks;
|
|
|
|
if (!cryptoEstablished)
|
|
{
|
|
if (ServerSide)
|
|
{
|
|
var nonceText = new string(Encoding.UTF8.GetChars(message));
|
|
byte[] sign;
|
|
if(nonceText.StartsWith("Nonce:") && BigInteger.TryParse(nonceText.Substring(6), out BigInteger parse) && (sign=parse.ToByteArray()).Length <= 512)
|
|
{
|
|
Connection.Send(NetSupport.WithHeader(decrypt.Encrypt(parse.ToByteArray(), null, true)));
|
|
Disconnect();
|
|
return true;
|
|
}
|
|
|
|
if (Crypto == null)
|
|
{
|
|
byte[] m = decrypt.Decrypt(message);
|
|
if (m.Length == 0) return false;
|
|
Crypto = Rijndael128.Deserialize(m, out int _);
|
|
}
|
|
else
|
|
{
|
|
byte[] m = decrypt.Decrypt(message);
|
|
if (m.Length == 0) return false;
|
|
CBC = new PCBC(Crypto, m);
|
|
onConn(this, true);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// Reconstruct RSA object from remote public keys and use it to encrypt our serialized AES key/iv
|
|
RSA asymm = RSA.Deserialize(message, out int _);
|
|
Connection.Send(NetSupport.WithHeader(asymm.Encrypt(Crypto.Serialize())));
|
|
Connection.Send(NetSupport.WithHeader(asymm.Encrypt(CBC.IV)));
|
|
onConn(this, true);
|
|
}
|
|
if (CBC != null)
|
|
cryptoEstablished = true;
|
|
}
|
|
else
|
|
{
|
|
// Decrypt the incoming message
|
|
byte[] read = Crypto.Decrypt(message);
|
|
|
|
// Read the decrypted message length
|
|
int mlenInner = Support.ReadInt(read, 0);
|
|
if (mlenInner == 0) return false; // Got a ping packet
|
|
|
|
// Send the message to the handler and get a response
|
|
bool live = true;
|
|
string response = handler(read.SubArray(4, 4+mlenInner).ToUTF8String(), assignedValues, ref live);
|
|
|
|
// Send the response (if given one) and drop the connection if the handler tells us to
|
|
if (response != null) Connection.Send(NetSupport.WithHeader(Crypto.Encrypt(NetSupport.WithHeader(response.ToUTF8Bytes()))));
|
|
if (!live)
|
|
{
|
|
Running = false;
|
|
try
|
|
{
|
|
Connection.Close();
|
|
}
|
|
catch (Exception) { }
|
|
return true;
|
|
}
|
|
}
|
|
|
|
// Reset expexted message length
|
|
mLen = 0;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
/// <summary>
|
|
/// Disconnect from server
|
|
/// </summary>
|
|
/// <returns></returns>
|
|
public virtual async Task<object> Disconnect()
|
|
{
|
|
NetSupport.DoStateCheck(IsAlive, true);
|
|
Running = false;
|
|
|
|
|
|
return await new TaskFactory().StartNew<object>(() => { eventListener.Join(); return null; });
|
|
}
|
|
|
|
// Methods for sending data to the server
|
|
public bool TrySend(string message) => TrySend(Encoding.UTF8.GetBytes(message));
|
|
public bool TrySend(byte[] message)
|
|
{
|
|
try
|
|
{
|
|
Send(message);
|
|
return true;
|
|
}
|
|
catch (InvalidOperationException) { return false; }
|
|
}
|
|
public virtual void Send(string message) => Send(Encoding.UTF8.GetBytes(message));
|
|
public virtual void Send(byte[] message) {
|
|
NetSupport.DoStateCheck(IsAlive, true);
|
|
lock (messageBuffer) messageBuffer.Enqueue(Crypto.Encrypt(NetSupport.WithHeader(message)));
|
|
}
|
|
|
|
public static RSA CheckServerIdentity(string host, short port, RandomProvider provider, long timeout = 10000)
|
|
{
|
|
Socket sock = new Socket(SocketType.Stream, ProtocolType.Tcp)
|
|
{
|
|
ReceiveTimeout = 5000,
|
|
SendTimeout = 5000
|
|
};
|
|
sock.Blocking = false;
|
|
sock.Connect(host, port);
|
|
List<byte> read = new List<byte>();
|
|
byte[] buf = new byte[1024];
|
|
|
|
if (!Read(sock, read, buf, timeout)) return null;
|
|
read.RemoveRange(0, 4);
|
|
RSA remote;
|
|
try
|
|
{
|
|
remote = RSA.Deserialize(read.ToArray(), out int _);
|
|
}
|
|
catch { return null; }
|
|
BigInteger cmp;
|
|
sock.Send(NetSupport.WithHeader(Encoding.UTF8.GetBytes("Nonce:"+(cmp=BigInteger.Abs(new BigInteger(provider.GetBytes(128)))))));
|
|
Thread.Sleep(250); // Give the server ample time to compute the signature
|
|
read.Clear();
|
|
if (!Read(sock, read, buf, timeout)) return null;
|
|
read.RemoveRange(0, 4);
|
|
try
|
|
{
|
|
if (!cmp.Equals(new BigInteger(remote.Encrypt(read.ToArray())))) return null;
|
|
}
|
|
catch { return null; }
|
|
return remote; // Passed signature check
|
|
}
|
|
|
|
private static bool Read(Socket sock, List<byte> read, byte[] buf, long timeout)
|
|
{
|
|
Stopwatch sw = new Stopwatch();
|
|
int len = -1;
|
|
sw.Start();
|
|
while ((len == -1 || read.Count < 4) && (sw.ElapsedTicks / 10000) < timeout)
|
|
{
|
|
if (len == -1 && read.Count > 4)
|
|
len = Support.ReadInt(read, 0);
|
|
|
|
try
|
|
{
|
|
int r = sock.Receive(buf);
|
|
read.AddRange(buf.SubArray(0, r));
|
|
}
|
|
catch { }
|
|
}
|
|
sw.Stop();
|
|
return read.Count - 4 == len && len>0;
|
|
}
|
|
}
|
|
|
|
// Helper methods. WithHeader() should really just be in Support.cs
|
|
public static class NetSupport
|
|
{
|
|
public static byte[] WithHeader(string message) => WithHeader(Encoding.UTF8.GetBytes(message));
|
|
public static byte[] WithHeader(byte[] message)
|
|
{
|
|
byte[] nmsg = new byte[message.Length + 4];
|
|
Support.WriteToArray(nmsg, message.Length, 0);
|
|
Array.Copy(message, 0, nmsg, 4, message.Length);
|
|
return nmsg;
|
|
}
|
|
|
|
public static byte[] FromHeaded(byte[] msg, int offset) => msg.SubArray(offset + 4, offset + 4 + Support.ReadInt(msg, offset));
|
|
|
|
internal static void DoStateCheck(bool state, bool target) {
|
|
if (state != target) throw new InvalidOperationException("Bad state!");
|
|
}
|
|
}
|
|
}
|