mirror of
https://github.com/bjc/prosody.git
synced 2025-04-03 21:27:38 +03:00
Merge config-updates+check-turn from timber
This commit is contained in:
commit
b47c7951d5
29 changed files with 1120 additions and 113 deletions
2
CHANGES
2
CHANGES
|
@ -33,6 +33,8 @@ TRUNK
|
|||
- Pluggable authorization providers (mod_authz_)
|
||||
- Easy use of Mozilla TLS recommendations presets
|
||||
- Unencrypted HTTP port (5280) restricted to loopback by default
|
||||
- require_encryption options default to 'true' if unspecified
|
||||
- Authentication module defaults to 'internal_hashed' if unspecified
|
||||
|
||||
### HTTP
|
||||
|
||||
|
|
28
COPYING
28
COPYING
|
@ -1,5 +1,12 @@
|
|||
Copyright (c) 2008-2011 Matthew Wild
|
||||
Copyright (c) 2008-2011 Waqas Hussain
|
||||
All source code in this project is released under the below MIT license. Some
|
||||
components are not authored by the Prosody maintainers, but such code is
|
||||
itself either released under a MIT license or declared public domain.
|
||||
|
||||
---
|
||||
|
||||
Copyright (C) 2008-2022 Matthew Wild
|
||||
Copyright (C) 2008-2020 Waqas Hussain
|
||||
Copyright (C) 2010-2022 Kim Alvefur
|
||||
|
||||
Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||
of this software and associated documentation files (the "Software"), to deal
|
||||
|
@ -18,3 +25,20 @@ IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
|
|||
CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
|
||||
TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
|
||||
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||
|
||||
---
|
||||
|
||||
util-src/encodings.c:
|
||||
Parts included from Lua 5.3. Copyright (C) 1994-2015 Lua.org, PUC-Rio.
|
||||
|
||||
util-src/signal.c:
|
||||
Copyright (C) 2007 Patrick J. Donnelly (batrick@batbytes.com)
|
||||
See full copyright notice in the source file.
|
||||
|
||||
util-src/struct.c:
|
||||
Copyright (C) 2010-2018 Lua.org, PUC-Rio. All rights reserved.
|
||||
See full copyright notice in the source file.
|
||||
|
||||
net/dns.lua:
|
||||
public domain 20080404 lua@ztact.com
|
||||
|
||||
|
|
|
@ -56,7 +56,7 @@ install-net:
|
|||
$(INSTALL_DATA) net/resolvers/*.lua $(SOURCE)/net/resolvers
|
||||
$(INSTALL_DATA) net/websocket/*.lua $(SOURCE)/net/websocket
|
||||
|
||||
install-util: util/encodings.so util/encodings.so util/pposix.so util/signal.so
|
||||
install-util: util/encodings.so util/encodings.so util/pposix.so util/signal.so util/struct.so
|
||||
$(MKDIR) $(SOURCE)
|
||||
$(MKDIR) $(SOURCE)/util
|
||||
$(INSTALL_DATA) util/*.lua $(SOURCE)/util
|
||||
|
|
|
@ -6,20 +6,10 @@
|
|||
-- COPYING file in the source package for more information.
|
||||
--
|
||||
|
||||
local softreq = require"util.dependencies".softreq;
|
||||
local ssl = softreq"ssl";
|
||||
if not ssl then
|
||||
return {
|
||||
create_context = function ()
|
||||
return nil, "LuaSec (required for encryption) was not found";
|
||||
end;
|
||||
reload_ssl_config = function () end;
|
||||
}
|
||||
end
|
||||
|
||||
local ssl = require "ssl";
|
||||
local configmanager = require "core.configmanager";
|
||||
local log = require "util.logger".init("certmanager");
|
||||
local ssl_context = ssl.context or softreq"ssl.context";
|
||||
local ssl_context = ssl.context or require "ssl.context";
|
||||
local ssl_newcontext = ssl.newcontext;
|
||||
local new_config = require"util.sslconfig".new;
|
||||
local stat = require "lfs".attributes;
|
||||
|
@ -48,7 +38,7 @@ end
|
|||
|
||||
local luasec_major, luasec_minor = ssl._VERSION:match("^(%d+)%.(%d+)");
|
||||
local luasec_version = tonumber(luasec_major) * 100 + tonumber(luasec_minor);
|
||||
local luasec_has = ssl.config or softreq"ssl.config" or {
|
||||
local luasec_has = ssl.config or {
|
||||
algorithms = {
|
||||
ec = luasec_version >= 5;
|
||||
};
|
||||
|
|
|
@ -23,7 +23,7 @@ local hosts = prosody.hosts;
|
|||
|
||||
local setmetatable = setmetatable;
|
||||
|
||||
local default_provider = "internal_plain";
|
||||
local default_provider = "internal_hashed";
|
||||
|
||||
local _ENV = nil;
|
||||
-- luacheck: std none
|
||||
|
|
|
@ -68,8 +68,7 @@ local default_config = { __index = {
|
|||
min_wait = 0.001;
|
||||
|
||||
-- Enable extra noisy debug logging
|
||||
-- TODO disable once considered stable
|
||||
verbose = true;
|
||||
verbose = false;
|
||||
|
||||
-- EXPERIMENTAL
|
||||
-- Whether to kill connections in case of callback errors.
|
||||
|
|
283
net/stun.lua
Normal file
283
net/stun.lua
Normal file
|
@ -0,0 +1,283 @@
|
|||
local base64 = require "util.encodings".base64;
|
||||
local hashes = require "util.hashes";
|
||||
local net = require "util.net";
|
||||
local random = require "util.random";
|
||||
local struct = require "util.struct";
|
||||
local bit32 = require"util.bitcompat";
|
||||
local sxor = require"util.strbitop".sxor;
|
||||
|
||||
--- Public helpers
|
||||
|
||||
-- Following draft-uberti-behave-turn-rest-00, convert a 'secret' string
|
||||
-- into a username/password pair that can be used to auth to a TURN server
|
||||
local function get_user_pass_from_secret(secret, ttl, opt_username)
|
||||
ttl = ttl or 86400;
|
||||
local username;
|
||||
if opt_username then
|
||||
username = ("%d:%s"):format(os.time() + ttl, opt_username);
|
||||
else
|
||||
username = ("%d"):format(os.time() + ttl);
|
||||
end
|
||||
local password = base64.encode(hashes.hmac_sha1(secret, username));
|
||||
return username, password, ttl;
|
||||
end
|
||||
|
||||
-- Following RFC 8489 9.2, convert credentials to a HMAC key for signing
|
||||
local function get_long_term_auth_key(realm, username, password)
|
||||
return hashes.md5(username..":"..realm..":"..password);
|
||||
end
|
||||
|
||||
--- Packet building/parsing
|
||||
|
||||
local packet_methods = {};
|
||||
local packet_mt = { __index = packet_methods };
|
||||
|
||||
local magic_cookie = string.char(0x21, 0x12, 0xA4, 0x42);
|
||||
|
||||
local methods = {
|
||||
binding = 0x001;
|
||||
-- TURN
|
||||
allocate = 0x003;
|
||||
refresh = 0x004;
|
||||
send = 0x006;
|
||||
data = 0x007;
|
||||
create_permission = 0x008;
|
||||
channel_bind = 0x009;
|
||||
};
|
||||
local method_lookup = {};
|
||||
for name, value in pairs(methods) do
|
||||
method_lookup[name] = value;
|
||||
method_lookup[value] = name;
|
||||
end
|
||||
|
||||
local classes = {
|
||||
request = 0;
|
||||
indication = 1;
|
||||
success = 2;
|
||||
error = 3;
|
||||
};
|
||||
local class_lookup = {};
|
||||
for name, value in pairs(classes) do
|
||||
class_lookup[name] = value;
|
||||
class_lookup[value] = name;
|
||||
end
|
||||
|
||||
local attributes = {
|
||||
["mapped-address"] = 0x0001;
|
||||
["username"] = 0x0006;
|
||||
["message-integrity"] = 0x0008;
|
||||
["error-code"] = 0x0009;
|
||||
["unknown-attributes"] = 0x000A;
|
||||
["realm"] = 0x0014;
|
||||
["nonce"] = 0x0015;
|
||||
["xor-mapped-address"] = 0x0020;
|
||||
["software"] = 0x8022;
|
||||
["alternate-server"] = 0x8023;
|
||||
["fingerprint"] = 0x8028;
|
||||
["message-integrity-sha256"] = 0x001C;
|
||||
["password-algorithm"] = 0x001D;
|
||||
["userhash"] = 0x001E;
|
||||
["password-algorithms"] = 0x8002;
|
||||
["alternate-domains"] = 0x8003;
|
||||
|
||||
-- TURN
|
||||
["requested-transport"] = 0x0019;
|
||||
};
|
||||
local attribute_lookup = {};
|
||||
for name, value in pairs(attributes) do
|
||||
attribute_lookup[name] = value;
|
||||
attribute_lookup[value] = name;
|
||||
end
|
||||
|
||||
function packet_methods:serialize_header(length)
|
||||
assert(#self.transaction_id == 12, "invalid transaction id length");
|
||||
local header = struct.pack(">I2I2",
|
||||
self.type,
|
||||
length
|
||||
)..magic_cookie..self.transaction_id;
|
||||
return header;
|
||||
end
|
||||
|
||||
function packet_methods:serialize()
|
||||
local payload = table.concat(self.attributes);
|
||||
return self:serialize_header(#payload)..payload;
|
||||
end
|
||||
|
||||
function packet_methods:is_request()
|
||||
return bit32.band(self.type, 0x0110) == 0x0000;
|
||||
end
|
||||
|
||||
function packet_methods:is_indication()
|
||||
return bit32.band(self.type, 0x0110) == 0x0010;
|
||||
end
|
||||
|
||||
function packet_methods:is_success_resp()
|
||||
return bit32.band(self.type, 0x0110) == 0x0100;
|
||||
end
|
||||
|
||||
function packet_methods:is_err_resp()
|
||||
return bit32.band(self.type, 0x0110) == 0x0110;
|
||||
end
|
||||
|
||||
function packet_methods:get_method()
|
||||
local method = bit32.bor(
|
||||
bit32.rshift(bit32.band(self.type, 0x3E00), 2),
|
||||
bit32.rshift(bit32.band(self.type, 0x00E0), 1),
|
||||
bit32.band(self.type, 0x000F)
|
||||
);
|
||||
return method, method_lookup[method];
|
||||
end
|
||||
|
||||
function packet_methods:get_class()
|
||||
local class = bit32.bor(
|
||||
bit32.rshift(bit32.band(self.type, 0x0100), 7),
|
||||
bit32.rshift(bit32.band(self.type, 0x0010), 4)
|
||||
);
|
||||
return class, class_lookup[class];
|
||||
end
|
||||
|
||||
function packet_methods:set_type(method, class)
|
||||
if type(method) == "string" then
|
||||
method = assert(method_lookup[method:lower()], "unknown method: "..method);
|
||||
end
|
||||
if type(class) == "string" then
|
||||
class = assert(classes[class], "unknown class: "..class);
|
||||
end
|
||||
self.type = bit32.bor(
|
||||
bit32.lshift(bit32.band(method, 0x1F80), 2),
|
||||
bit32.lshift(bit32.band(method, 0x0070), 1),
|
||||
bit32.band(method, 0x000F),
|
||||
bit32.lshift(bit32.band(class, 0x0002), 7),
|
||||
bit32.lshift(bit32.band(class, 0x0001), 4)
|
||||
);
|
||||
end
|
||||
|
||||
local function _serialize_attribute(attr_type, value)
|
||||
local len = #value;
|
||||
local padding = string.rep("\0", (4 - len)%4);
|
||||
return struct.pack(">I2I2",
|
||||
attr_type, len
|
||||
)..value..padding;
|
||||
end
|
||||
|
||||
function packet_methods:add_attribute(attr_type, value)
|
||||
if type(attr_type) == "string" then
|
||||
attr_type = assert(attributes[attr_type], "unknown attribute: "..attr_type);
|
||||
end
|
||||
table.insert(self.attributes, _serialize_attribute(attr_type, value));
|
||||
end
|
||||
|
||||
function packet_methods:deserialize(bytes)
|
||||
local type, len, cookie = struct.unpack(">I2I2I4", bytes);
|
||||
assert(#bytes == (len + 20), "incorrect packet length");
|
||||
assert(cookie == 0x2112A442, "invalid magic cookie");
|
||||
self.type = type;
|
||||
self.transaction_id = bytes:sub(9, 20);
|
||||
self.attributes = {};
|
||||
local pos = 21;
|
||||
while pos < #bytes do
|
||||
local attr_hdr = bytes:sub(pos, pos+3);
|
||||
assert(#attr_hdr == 4, "packet truncated in attribute header");
|
||||
local attr_type, attr_len = struct.unpack(">I2I2", attr_hdr); --luacheck: ignore 211/attr_type
|
||||
if attr_len == 0 then
|
||||
table.insert(self.attributes, attr_hdr);
|
||||
pos = pos + 20;
|
||||
else
|
||||
local data = bytes:sub(pos + 4, pos + 3 + attr_len);
|
||||
assert(#data == attr_len, "packet truncated in attribute value");
|
||||
table.insert(self.attributes, attr_hdr..data);
|
||||
local n_padding = (4 - attr_len)%4;
|
||||
pos = pos + 4 + attr_len + n_padding;
|
||||
end
|
||||
end
|
||||
return self;
|
||||
end
|
||||
|
||||
function packet_methods:get_attribute(attr_type)
|
||||
if type(attr_type) == "string" then
|
||||
attr_type = assert(attribute_lookup[attr_type:lower()], "unknown attribute: "..attr_type);
|
||||
end
|
||||
for _, attribute in ipairs(self.attributes) do
|
||||
if struct.unpack(">I2", attribute) == attr_type then
|
||||
return attribute:sub(5);
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
local addr_families = { "IPv4", "IPv6" };
|
||||
function packet_methods:get_mapped_address()
|
||||
local data = self:get_attribute("mapped-address");
|
||||
if not data then return; end
|
||||
local family, port = struct.unpack("x>BI2", data);
|
||||
local addr = data:sub(5);
|
||||
return {
|
||||
family = addr_families[family] or "unknown";
|
||||
port = port;
|
||||
address = net.ntop(addr);
|
||||
};
|
||||
end
|
||||
|
||||
function packet_methods:get_xor_mapped_address()
|
||||
local data = self:get_attribute("xor-mapped-address");
|
||||
if not data then return; end
|
||||
local family, port = struct.unpack("x>BI2", data);
|
||||
local addr = sxor(data:sub(5), magic_cookie..self.transaction_id);
|
||||
return {
|
||||
family = addr_families[family] or "unknown";
|
||||
port = bit32.bxor(port, 0x2112);
|
||||
address = net.ntop(addr);
|
||||
address_raw = data:sub(5);
|
||||
};
|
||||
end
|
||||
|
||||
function packet_methods:add_message_integrity(key)
|
||||
-- Add attribute with a dummy value so we can artificially increase
|
||||
-- the packet 'length'
|
||||
self:add_attribute("message-integrity", string.rep("\0", 20));
|
||||
-- Get the packet data, minus the message-integrity attribute itself
|
||||
local pkt = self:serialize():sub(1, -25);
|
||||
local hash = hashes.hmac_sha1(key, pkt, false);
|
||||
self.attributes[#self.attributes] = nil;
|
||||
assert(#hash == 20, "invalid hash length");
|
||||
self:add_attribute("message-integrity", hash);
|
||||
end
|
||||
|
||||
do
|
||||
local transports = {
|
||||
udp = 0x11;
|
||||
};
|
||||
function packet_methods:add_requested_transport(transport)
|
||||
local transport_code = transports[transport];
|
||||
assert(transport_code, "unsupported transport: "..tostring(transport));
|
||||
self:add_attribute("requested-transport", string.char(
|
||||
transport_code, 0x00, 0x00, 0x00
|
||||
));
|
||||
end
|
||||
end
|
||||
|
||||
function packet_methods:get_error()
|
||||
local err_attr = self:get_attribute("error-code");
|
||||
if not err_attr then
|
||||
return nil;
|
||||
end
|
||||
local number = err_attr:byte(4);
|
||||
local class = bit32.band(0x07, err_attr:byte(3));
|
||||
local msg = err_attr:sub(5);
|
||||
return (class*100)+number, msg;
|
||||
end
|
||||
|
||||
local function new_packet(method, class)
|
||||
local p = setmetatable({
|
||||
transaction_id = random.bytes(12);
|
||||
length = 0;
|
||||
attributes = {};
|
||||
}, packet_mt);
|
||||
p:set_type(method or "binding", class or "request");
|
||||
return p;
|
||||
end
|
||||
|
||||
return {
|
||||
new_packet = new_packet;
|
||||
get_user_pass_from_secret = get_user_pass_from_secret;
|
||||
get_long_term_auth_key = get_long_term_auth_key;
|
||||
};
|
|
@ -14,7 +14,7 @@ local usermanager = require "core.usermanager";
|
|||
local generate_uuid = require "util.uuid".generate;
|
||||
local new_sasl = require "util.sasl".new;
|
||||
local hex = require"util.hex";
|
||||
local to_hex, from_hex = hex.to, hex.from;
|
||||
local to_hex, from_hex = hex.encode, hex.decode;
|
||||
local saslprep = require "util.encodings".stringprep.saslprep;
|
||||
local secure_equals = require "util.hashes".equals;
|
||||
|
||||
|
|
|
@ -4,7 +4,7 @@ local jid_bare = require "util.jid".bare;
|
|||
local rostermanager = require "core.rostermanager";
|
||||
|
||||
local require_encryption = module:get_option_boolean("c2s_require_encryption",
|
||||
module:get_option_boolean("require_encryption", false));
|
||||
module:get_option_boolean("require_encryption", true));
|
||||
local invite_only = module:get_option_boolean("registration_invite_only", true);
|
||||
|
||||
local invites;
|
||||
|
|
|
@ -12,7 +12,7 @@ local st = require "util.stanza";
|
|||
local t_concat = table.concat;
|
||||
|
||||
local secure_auth_only = module:get_option("c2s_require_encryption",
|
||||
module:get_option("require_encryption"))
|
||||
module:get_option("require_encryption", true))
|
||||
or not(module:get_option("allow_unencrypted_plain_auth"));
|
||||
|
||||
local sessionmanager = require "core.sessionmanager";
|
||||
|
|
|
@ -18,7 +18,7 @@ local util_error = require "util.error";
|
|||
|
||||
local additional_fields = module:get_option("additional_registration_fields", {});
|
||||
local require_encryption = module:get_option_boolean("c2s_require_encryption",
|
||||
module:get_option_boolean("require_encryption", false));
|
||||
module:get_option_boolean("require_encryption", true));
|
||||
|
||||
pcall(function ()
|
||||
module:depends("register_limits");
|
||||
|
|
|
@ -40,7 +40,7 @@ local opt_keepalives = module:get_option_boolean("s2s_tcp_keepalives", module:ge
|
|||
local secure_auth = module:get_option_boolean("s2s_secure_auth", false); -- One day...
|
||||
local secure_domains, insecure_domains =
|
||||
module:get_option_set("s2s_secure_domains", {})._items, module:get_option_set("s2s_insecure_domains", {})._items;
|
||||
local require_encryption = module:get_option_boolean("s2s_require_encryption", false);
|
||||
local require_encryption = module:get_option_boolean("s2s_require_encryption", true);
|
||||
local stanza_size_limit = module:get_option_number("s2s_stanza_size_limit", 1024*512);
|
||||
|
||||
local measure_connections_inbound = module:metric(
|
||||
|
|
|
@ -10,7 +10,7 @@ local st = require "util.stanza";
|
|||
local xmlns_bidi_feature = "urn:xmpp:features:bidi"
|
||||
local xmlns_bidi = "urn:xmpp:bidi";
|
||||
|
||||
local require_encryption = module:get_option_boolean("s2s_require_encryption", false);
|
||||
local require_encryption = module:get_option_boolean("s2s_require_encryption", true);
|
||||
|
||||
module:hook("s2s-stream-features", function(event)
|
||||
local origin, features = event.origin, event.features;
|
||||
|
|
|
@ -17,7 +17,7 @@ local errors = require "util.error";
|
|||
|
||||
local usermanager_get_sasl_handler = require "core.usermanager".get_sasl_handler;
|
||||
|
||||
local secure_auth_only = module:get_option_boolean("c2s_require_encryption", module:get_option_boolean("require_encryption", false));
|
||||
local secure_auth_only = module:get_option_boolean("c2s_require_encryption", module:get_option_boolean("require_encryption", true));
|
||||
local allow_unencrypted_plain_auth = module:get_option_boolean("allow_unencrypted_plain_auth", false)
|
||||
local insecure_mechanisms = module:get_option_set("insecure_sasl_mechanisms", allow_unencrypted_plain_auth and {} or {"PLAIN", "LOGIN"});
|
||||
local disabled_mechanisms = module:get_option_set("disable_sasl_mechanisms", { "DIGEST-MD5" });
|
||||
|
@ -309,7 +309,7 @@ module:hook("stream-features", function(event)
|
|||
return;
|
||||
end
|
||||
|
||||
local authmod = module:get_option_string("authentication", "internal_plain");
|
||||
local authmod = module:get_option_string("authentication", "internal_hashed");
|
||||
if available_mechanisms:empty() then
|
||||
log("warn", "No available SASL mechanisms, verify that the configured authentication module '%s' is loaded and configured correctly", authmod);
|
||||
return;
|
||||
|
|
|
@ -68,11 +68,11 @@ local function createOuterXml(user, host)
|
|||
end
|
||||
|
||||
local function hex_to_base64(s)
|
||||
return base64.encode(hex.from(s));
|
||||
return base64.encode(hex.decode(s));
|
||||
end
|
||||
|
||||
local function base64_to_hex(s)
|
||||
return base64.encode(hex.from(s));
|
||||
return base64.encode(hex.decode(s));
|
||||
end
|
||||
|
||||
local handlers = {};
|
||||
|
|
|
@ -10,8 +10,8 @@ local create_context = require "core.certmanager".create_context;
|
|||
local rawgetopt = require"core.configmanager".rawget;
|
||||
local st = require "util.stanza";
|
||||
|
||||
local c2s_require_encryption = module:get_option("c2s_require_encryption", module:get_option("require_encryption"));
|
||||
local s2s_require_encryption = module:get_option("s2s_require_encryption");
|
||||
local c2s_require_encryption = module:get_option("c2s_require_encryption", module:get_option("require_encryption", true));
|
||||
local s2s_require_encryption = module:get_option("s2s_require_encryption", true);
|
||||
local allow_s2s_tls = module:get_option("s2s_allow_encryption") ~= false;
|
||||
local s2s_secure_auth = module:get_option("s2s_secure_auth");
|
||||
|
||||
|
|
|
@ -23,67 +23,67 @@
|
|||
-- Example: admins = { "user1@example.com", "user2@example.net" }
|
||||
admins = { }
|
||||
|
||||
-- Prosody includes several alternative modules for keeping track of network connections.
|
||||
-- For more information see: https://prosody.im/doc/network_backend
|
||||
--network_backend = "epoll"
|
||||
|
||||
-- Prosody will always look in its source directory for modules, but
|
||||
-- this option allows you to specify additional locations where Prosody
|
||||
-- will look for modules first. For community modules, see https://modules.prosody.im/
|
||||
-- This option allows you to specify additional locations where Prosody
|
||||
-- will search first for modules. For additional modules you can install, see
|
||||
-- the community module repository at https://modules.prosody.im/
|
||||
--plugin_paths = {}
|
||||
|
||||
-- Single directory for custom prosody plugins and/or Lua libraries installation
|
||||
-- This path takes priority over plugin_paths, when prosody is searching for modules
|
||||
--installer_plugin_path = ""
|
||||
|
||||
-- This is the list of modules Prosody will load on startup.
|
||||
-- It looks for mod_modulename.lua in the plugins folder, so make sure that exists too.
|
||||
-- Documentation for bundled modules can be found at: https://prosody.im/doc/modules
|
||||
modules_enabled = {
|
||||
|
||||
-- Generally required
|
||||
"disco"; -- Service discovery
|
||||
"roster"; -- Allow users to have a roster. Recommended ;)
|
||||
"saslauth"; -- Authentication for clients and servers. Recommended if you want to log in.
|
||||
"tls"; -- Add support for secure TLS on c2s/s2s connections
|
||||
"dialback"; -- s2s dialback support
|
||||
"disco"; -- Service discovery
|
||||
|
||||
-- Not essential, but recommended
|
||||
"carbons"; -- Keep multiple clients in sync
|
||||
"pep"; -- Enables users to publish their avatar, mood, activity, playing music and more
|
||||
"private"; -- Private XML storage (for room bookmarks, etc.)
|
||||
"blocklist"; -- Allow users to block communications with other users
|
||||
"bookmarks"; -- Synchronise the list of open rooms between clients
|
||||
"carbons"; -- Keep multiple online clients in sync
|
||||
"dialback"; -- Support for verifying remote servers using DNS
|
||||
"limits"; -- Enable bandwidth limiting for XMPP connections
|
||||
"pep"; -- Allow users to store public and private data in their account
|
||||
"private"; -- Legacy account storage mechanism (XEP-0049)
|
||||
"smacks"; -- Stream management and resumption (XEP-0198)
|
||||
"vcard4"; -- User profiles (stored in PEP)
|
||||
"vcard_legacy"; -- Conversion between legacy vCard and PEP Avatar, vcard
|
||||
"limits"; -- Enable bandwidth limiting for XMPP connections
|
||||
|
||||
-- Nice to have
|
||||
"version"; -- Replies to server version requests
|
||||
"uptime"; -- Report how long server has been running
|
||||
"time"; -- Let others know the time here on this server
|
||||
"csi_simple"; -- Simple but effective traffic optimizations for mobile devices
|
||||
"invites"; -- Create and manage invites
|
||||
"invites_adhoc"; -- Allow admins/users to create invitations via their client
|
||||
"invites_register"; -- Allows invited users to create accounts
|
||||
"ping"; -- Replies to XMPP pings with pongs
|
||||
"register"; -- Allow users to register on this server using a client and change passwords
|
||||
--"mam"; -- Store messages in an archive and allow users to access it
|
||||
--"csi_simple"; -- Simple Mobile optimizations
|
||||
"time"; -- Let others know the time here on this server
|
||||
"uptime"; -- Report how long server has been running
|
||||
"version"; -- Replies to server version requests
|
||||
--"mam"; -- Store recent messages to allow multi-device synchronization
|
||||
--"turn_external"; -- Provide external STUN/TURN service for e.g. audio/video calls
|
||||
|
||||
-- Admin interfaces
|
||||
"admin_adhoc"; -- Allows administration via an XMPP client that supports ad-hoc commands
|
||||
--"admin_telnet"; -- Opens telnet console interface on localhost port 5582
|
||||
"admin_shell"; -- Allow secure administration via 'prosodyctl shell'
|
||||
|
||||
-- HTTP modules
|
||||
--"bosh"; -- Enable BOSH clients, aka "Jabber over HTTP"
|
||||
--"http_openmetrics"; -- for exposing metrics to stats collectors
|
||||
--"websocket"; -- XMPP over WebSockets
|
||||
--"http_files"; -- Serve static files from a directory over HTTP
|
||||
|
||||
-- Other specific functionality
|
||||
--"groups"; -- Shared roster support
|
||||
--"server_contact_info"; -- Publish contact information for this service
|
||||
--"announce"; -- Send announcement to all online users
|
||||
--"welcome"; -- Welcome users who register accounts
|
||||
--"watchregistrations"; -- Alert admins of registrations
|
||||
--"motd"; -- Send a message to users when they log in
|
||||
--"groups"; -- Shared roster support
|
||||
--"legacyauth"; -- Legacy authentication. Only used by some old clients and bots.
|
||||
--"mimicking"; -- Prevent address spoofing
|
||||
--"motd"; -- Send a message to users when they log in
|
||||
--"proxy65"; -- Enables a file transfer proxy service which clients behind NAT can use
|
||||
--"s2s_bidi"; -- Bi-directional server-to-server (XEP-0288)
|
||||
--"server_contact_info"; -- Publish contact information for this service
|
||||
--"tombstones"; -- Prevent registration of deleted accounts
|
||||
--"watchregistrations"; -- Alert admins of registrations
|
||||
--"welcome"; -- Welcome users who register accounts
|
||||
}
|
||||
|
||||
-- These modules are auto-loaded, but should you want
|
||||
|
@ -95,28 +95,17 @@ modules_disabled = {
|
|||
-- "posix"; -- POSIX functionality, sends server to background, etc.
|
||||
}
|
||||
|
||||
-- Disable account creation by default, for security
|
||||
-- For more information see https://prosody.im/doc/creating_accounts
|
||||
allow_registration = false
|
||||
|
||||
-- Force clients to use encrypted connections? This option will
|
||||
-- prevent clients from authenticating unless they are using encryption.
|
||||
-- Server-to-server authentication
|
||||
-- Require valid certificates for server-to-server connections?
|
||||
-- If false, other methods such as dialback (DNS) may be used instead.
|
||||
|
||||
c2s_require_encryption = true
|
||||
|
||||
-- Force servers to use encrypted connections? This option will
|
||||
-- prevent servers from authenticating unless they are using encryption.
|
||||
|
||||
s2s_require_encryption = true
|
||||
|
||||
-- Force certificate authentication for server-to-server connections?
|
||||
|
||||
s2s_secure_auth = false
|
||||
s2s_secure_auth = true
|
||||
|
||||
-- Some servers have invalid or self-signed certificates. You can list
|
||||
-- remote domains here that will not be required to authenticate using
|
||||
-- certificates. They will be authenticated using DNS instead, even
|
||||
-- when s2s_secure_auth is enabled.
|
||||
-- certificates. They will be authenticated using other methods instead,
|
||||
-- even when s2s_secure_auth is enabled.
|
||||
|
||||
--s2s_insecure_domains = { "insecure.example" }
|
||||
|
||||
|
@ -125,7 +114,10 @@ s2s_secure_auth = false
|
|||
|
||||
--s2s_secure_domains = { "jabber.org" }
|
||||
|
||||
-- Enable rate limits for incoming client and server connections
|
||||
|
||||
-- Rate limits
|
||||
-- Enable rate limits for incoming client and server connections. These help
|
||||
-- protect from excessive resource consumption and denial-of-service attacks.
|
||||
|
||||
limits = {
|
||||
c2s = {
|
||||
|
@ -136,11 +128,19 @@ limits = {
|
|||
};
|
||||
}
|
||||
|
||||
-- Authentication
|
||||
-- Select the authentication backend to use. The 'internal' providers
|
||||
-- use Prosody's configured data storage to store the authentication data.
|
||||
-- For more information see https://prosody.im/doc/authentication
|
||||
|
||||
authentication = "internal_hashed"
|
||||
|
||||
-- Many authentication providers, including the default one, allow you to
|
||||
-- create user accounts via Prosody's admin interfaces. For details, see the
|
||||
-- documentation at https://prosody.im/doc/creating_accounts
|
||||
|
||||
|
||||
-- Storage
|
||||
-- Select the storage backend to use. By default Prosody uses flat files
|
||||
-- in its configured data directory, but it also supports more backends
|
||||
-- through modules. An "sql" backend is included by default, but requires
|
||||
|
@ -165,19 +165,36 @@ archive_expires_after = "1w" -- Remove archived messages after 1 week
|
|||
-- You can also configure messages to be stored in-memory only. For more
|
||||
-- archiving options, see https://prosody.im/doc/modules/mod_mam
|
||||
|
||||
|
||||
-- Audio/video call relay (STUN/TURN)
|
||||
-- To ensure clients connected to the server can establish connections for
|
||||
-- low-latency media streaming (such as audio and video calls), it is
|
||||
-- recommended to run a STUN/TURN server for clients to use. If you do this,
|
||||
-- specify the details here so clients can discover it.
|
||||
-- Find more information at https://prosody.im/doc/turn
|
||||
|
||||
-- Specify the address of the TURN service (you may use the same domain as XMPP)
|
||||
--turn_external_host = "turn.example.com"
|
||||
|
||||
-- This secret must be set to the same value in both Prosody and the TURN server
|
||||
--turn_external_secret = "your-secret-turn-access-token"
|
||||
|
||||
|
||||
-- Logging configuration
|
||||
-- For advanced logging see https://prosody.im/doc/logging
|
||||
log = {
|
||||
info = "prosody.log"; -- Change 'info' to 'debug' for verbose logging
|
||||
error = "prosody.err";
|
||||
-- "*syslog"; -- Uncomment this for logging to syslog
|
||||
-- "*console"; -- Log to the console, useful for debugging with daemonize=false
|
||||
-- "*console"; -- Log to the console, useful for debugging when running in the foreground
|
||||
}
|
||||
|
||||
|
||||
-- Uncomment to enable statistics
|
||||
-- For more info see https://prosody.im/doc/statistics
|
||||
-- statistics = "internal"
|
||||
|
||||
|
||||
-- Certificates
|
||||
-- Every virtual host and component needs a certificate so that clients and
|
||||
-- servers can securely verify its identity. Prosody will automatically load
|
||||
|
@ -188,17 +205,16 @@ log = {
|
|||
-- Location of directory to find certificates in (relative to main config file):
|
||||
certificates = "certs"
|
||||
|
||||
-- HTTPS currently only supports a single certificate, specify it here:
|
||||
--https_certificate = "certs/localhost.crt"
|
||||
|
||||
----------- Virtual hosts -----------
|
||||
-- You need to add a VirtualHost entry for each domain you wish Prosody to serve.
|
||||
-- Settings under each VirtualHost entry apply *only* to that host.
|
||||
|
||||
VirtualHost "localhost"
|
||||
-- Prosody requires at least one enabled VirtualHost to function. You can
|
||||
-- safely remove or disable 'localhost' once you have added another.
|
||||
|
||||
|
||||
--VirtualHost "example.com"
|
||||
-- certificate = "/path/to/example.crt"
|
||||
|
||||
------ Components ------
|
||||
-- You can specify components to add hosts that provide special services,
|
||||
|
@ -210,10 +226,13 @@ VirtualHost "localhost"
|
|||
--- Store MUC messages in an archive and allow users to access it
|
||||
--modules_enabled = { "muc_mam" }
|
||||
|
||||
---Set up a file sharing component
|
||||
--Component "share.example.com" "http_file_share"
|
||||
|
||||
---Set up an external component (default component port is 5347)
|
||||
--
|
||||
-- External components allow adding various services, such as gateways/
|
||||
-- transports to other networks like ICQ, MSN and Yahoo. For more info
|
||||
-- bridges to non-XMPP networks and services. For more info
|
||||
-- see: https://prosody.im/doc/components#adding_an_external_component
|
||||
--
|
||||
--Component "gateway.example.com"
|
||||
|
|
100
spec/net_stun_spec.lua
Normal file
100
spec/net_stun_spec.lua
Normal file
|
@ -0,0 +1,100 @@
|
|||
local hex = require "util.hex";
|
||||
|
||||
local function parse(pkt_desc)
|
||||
local result = {};
|
||||
for line in pkt_desc:gmatch("([^\n]+)\n") do
|
||||
local b1, b2, b3, b4 = line:match("^%s*(%x%x) (%x%x) (%x%x) (%x%x)%s");
|
||||
if b1 then
|
||||
table.insert(result, b1);
|
||||
table.insert(result, b2);
|
||||
table.insert(result, b3);
|
||||
table.insert(result, b4);
|
||||
end
|
||||
end
|
||||
return hex.decode(table.concat(result));
|
||||
end
|
||||
|
||||
local sample_packet = parse[[
|
||||
00 01 00 60 Request type and message length
|
||||
21 12 a4 42 Magic cookie
|
||||
78 ad 34 33 }
|
||||
c6 ad 72 c0 } Transaction ID
|
||||
29 da 41 2e }
|
||||
00 06 00 12 USERNAME attribute header
|
||||
e3 83 9e e3 }
|
||||
83 88 e3 83 }
|
||||
aa e3 83 83 } Username value (18 bytes) and padding (2 bytes)
|
||||
e3 82 af e3 }
|
||||
82 b9 00 00 }
|
||||
00 15 00 1c NONCE attribute header
|
||||
66 2f 2f 34 }
|
||||
39 39 6b 39 }
|
||||
35 34 64 36 }
|
||||
4f 4c 33 34 } Nonce value
|
||||
6f 4c 39 46 }
|
||||
53 54 76 79 }
|
||||
36 34 73 41 }
|
||||
00 14 00 0b REALM attribute header
|
||||
65 78 61 6d }
|
||||
70 6c 65 2e } Realm value (11 bytes) and padding (1 byte)
|
||||
6f 72 67 00 }
|
||||
00 08 00 14 MESSAGE-INTEGRITY attribute header
|
||||
f6 70 24 65 }
|
||||
6d d6 4a 3e }
|
||||
02 b8 e0 71 } HMAC-SHA1 fingerprint
|
||||
2e 85 c9 a2 }
|
||||
8c a8 96 66 }
|
||||
]];
|
||||
|
||||
--print(hex.encode(sample_packet))
|
||||
print(sample_packet)
|
||||
|
||||
describe("net.stun", function ()
|
||||
local stun = require "net.stun";
|
||||
|
||||
it("works", function ()
|
||||
local packet = stun.new_packet();
|
||||
assert.is_string(packet:serialize());
|
||||
end);
|
||||
|
||||
it("can decode the sample packet", function ()
|
||||
local packet = stun.new_packet():deserialize(sample_packet);
|
||||
assert(packet);
|
||||
local method, method_name = packet:get_method();
|
||||
assert.equal(1, method);
|
||||
assert.equal("binding", method_name);
|
||||
assert.equal("example.org", packet:get_attribute("realm"));
|
||||
end);
|
||||
|
||||
it("can generate the sample packet", function ()
|
||||
-- These values, and the sample packet, come from RFC 5769 2.4
|
||||
local username = string.char(
|
||||
-- U+30DE KATAKANA LETTER MA
|
||||
0xE3, 0x83, 0x9E,
|
||||
-- U+30C8 KATAKANA LETTER TO
|
||||
0xE3, 0x83, 0x88,
|
||||
-- U+30EA KATAKANA LETTER RI
|
||||
0xE3, 0x83, 0xAA,
|
||||
-- U+30C3 KATAKANA LETTER SMALL TU
|
||||
0xE3, 0x83, 0x83,
|
||||
-- U+30AF KATAKANA LETTER KU
|
||||
0xE3, 0x82, 0xAF,
|
||||
-- U+30B9 KATAKANA LETTER SU
|
||||
0xE3, 0x82, 0xB9
|
||||
);
|
||||
|
||||
-- Password: "The<U+00AD>M<U+00AA>tr<U+2168>" and "TheMatrIX" (without
|
||||
-- quotes) respectively before and after SASLprep processing
|
||||
local password = "TheMatrIX";
|
||||
local realm = "example.org";
|
||||
|
||||
local p3 = stun.new_packet("binding", "request");
|
||||
p3.transaction_id = hex.decode("78AD3433C6AD72C029DA412E");
|
||||
p3:add_attribute("username", username);
|
||||
p3:add_attribute("nonce", "f//499k954d6OL34oL9FSTvy64sA");
|
||||
p3:add_attribute("realm", realm);
|
||||
local key = stun.get_long_term_auth_key(realm, username, password);
|
||||
p3:add_message_integrity(key);
|
||||
assert.equal(sample_packet, p3:serialize());
|
||||
end);
|
||||
end);
|
|
@ -10,28 +10,28 @@ describe("PBKDF2-HMAC-SHA1", function ()
|
|||
local S = "salt"
|
||||
local c = 1
|
||||
local DK = "0c60c80f961f0e71f3a9b524af6012062fe037a6";
|
||||
assert.equal(DK, hex.to(hashes.pbkdf2_hmac_sha1(P, S, c)));
|
||||
assert.equal(DK, hex.encode(hashes.pbkdf2_hmac_sha1(P, S, c)));
|
||||
end);
|
||||
it("test vector 2", function ()
|
||||
local P = "password"
|
||||
local S = "salt"
|
||||
local c = 2
|
||||
local DK = "ea6c014dc72d6f8ccd1ed92ace1d41f0d8de8957";
|
||||
assert.equal(DK, hex.to(hashes.pbkdf2_hmac_sha1(P, S, c)));
|
||||
assert.equal(DK, hex.encode(hashes.pbkdf2_hmac_sha1(P, S, c)));
|
||||
end);
|
||||
it("test vector 3", function ()
|
||||
local P = "password"
|
||||
local S = "salt"
|
||||
local c = 4096
|
||||
local DK = "4b007901b765489abead49d926f721d065a429c1";
|
||||
assert.equal(DK, hex.to(hashes.pbkdf2_hmac_sha1(P, S, c)));
|
||||
assert.equal(DK, hex.encode(hashes.pbkdf2_hmac_sha1(P, S, c)));
|
||||
end);
|
||||
it("test vector 4 #SLOW", function ()
|
||||
local P = "password"
|
||||
local S = "salt"
|
||||
local c = 16777216
|
||||
local DK = "eefe3d61cd4da4e4e9945b3d6ba2158c2634e984";
|
||||
assert.equal(DK, hex.to(hashes.pbkdf2_hmac_sha1(P, S, c)));
|
||||
assert.equal(DK, hex.encode(hashes.pbkdf2_hmac_sha1(P, S, c)));
|
||||
end);
|
||||
end);
|
||||
|
||||
|
@ -41,14 +41,14 @@ describe("PBKDF2-HMAC-SHA256", function ()
|
|||
local S = "salt";
|
||||
local c = 1
|
||||
local DK = "120fb6cffcf8b32c43e7225256c4f837a86548c92ccc35480805987cb70be17b";
|
||||
assert.equal(DK, hex.to(hashes.pbkdf2_hmac_sha256(P, S, c)));
|
||||
assert.equal(DK, hex.encode(hashes.pbkdf2_hmac_sha256(P, S, c)));
|
||||
end);
|
||||
it("test vector 2", function ()
|
||||
local P = "password";
|
||||
local S = "salt";
|
||||
local c = 2
|
||||
local DK = "ae4d0c95af6b46d32d0adff928f06dd02a303f8ef3c251dfd6e2d85a95474c43";
|
||||
assert.equal(DK, hex.to(hashes.pbkdf2_hmac_sha256(P, S, c)));
|
||||
assert.equal(DK, hex.encode(hashes.pbkdf2_hmac_sha256(P, S, c)));
|
||||
end);
|
||||
end);
|
||||
|
||||
|
|
|
@ -7,8 +7,8 @@ local hmac = require "util.hmac";
|
|||
local hex = require "util.hex";
|
||||
|
||||
describe("Test case 1", function ()
|
||||
local Key = hex.from("0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b");
|
||||
local Data = hex.from("4869205468657265");
|
||||
local Key = hex.decode("0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b");
|
||||
local Data = hex.decode("4869205468657265");
|
||||
describe("HMAC-SHA-256", function ()
|
||||
it("works", function()
|
||||
assert.equal("b0344c61d8db38535ca8afceaf0bf12b881dc200c9833da726e9376c2e32cff7", hmac.sha256(Key, Data, true))
|
||||
|
@ -21,8 +21,8 @@ describe("Test case 1", function ()
|
|||
end);
|
||||
end);
|
||||
describe("Test case 2", function ()
|
||||
local Key = hex.from("4a656665");
|
||||
local Data = hex.from("7768617420646f2079612077616e7420666f72206e6f7468696e673f");
|
||||
local Key = hex.decode("4a656665");
|
||||
local Data = hex.decode("7768617420646f2079612077616e7420666f72206e6f7468696e673f");
|
||||
describe("HMAC-SHA-256", function ()
|
||||
it("works", function()
|
||||
assert.equal("5bdcc146bf60754e6a042426089575c75a003f089d2739839dec58b964ec3843", hmac.sha256(Key, Data, true))
|
||||
|
@ -35,8 +35,8 @@ describe("Test case 2", function ()
|
|||
end);
|
||||
end);
|
||||
describe("Test case 3", function ()
|
||||
local Key = hex.from("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa");
|
||||
local Data = hex.from("dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddd");
|
||||
local Key = hex.decode("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa");
|
||||
local Data = hex.decode("dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddd");
|
||||
describe("HMAC-SHA-256", function ()
|
||||
it("works", function()
|
||||
assert.equal("773ea91e36800e46854db8ebd09181a72959098b3ef8c122d9635514ced565fe", hmac.sha256(Key, Data, true))
|
||||
|
@ -49,8 +49,8 @@ describe("Test case 3", function ()
|
|||
end);
|
||||
end);
|
||||
describe("Test case 4", function ()
|
||||
local Key = hex.from("0102030405060708090a0b0c0d0e0f10111213141516171819");
|
||||
local Data = hex.from("cdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcd");
|
||||
local Key = hex.decode("0102030405060708090a0b0c0d0e0f10111213141516171819");
|
||||
local Data = hex.decode("cdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcd");
|
||||
describe("HMAC-SHA-256", function ()
|
||||
it("works", function()
|
||||
assert.equal("82558a389a443c0ea4cc819899f2083a85f0faa3e578f8077a2e3ff46729665b", hmac.sha256(Key, Data, true))
|
||||
|
@ -63,8 +63,8 @@ describe("Test case 4", function ()
|
|||
end);
|
||||
end);
|
||||
describe("Test case 5", function ()
|
||||
local Key = hex.from("0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c");
|
||||
local Data = hex.from("546573742057697468205472756e636174696f6e");
|
||||
local Key = hex.decode("0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c");
|
||||
local Data = hex.decode("546573742057697468205472756e636174696f6e");
|
||||
describe("HMAC-SHA-256", function ()
|
||||
it("works", function()
|
||||
assert.equal("a3b6167473100ee06e0c796c2955552b", hmac.sha256(Key, Data, true):sub(1,128/4))
|
||||
|
@ -77,8 +77,8 @@ describe("Test case 5", function ()
|
|||
end);
|
||||
end);
|
||||
describe("Test case 6", function ()
|
||||
local Key = hex.from("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa");
|
||||
local Data = hex.from("54657374205573696e67204c6172676572205468616e20426c6f636b2d53697a65204b6579202d2048617368204b6579204669727374");
|
||||
local Key = hex.decode("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa");
|
||||
local Data = hex.decode("54657374205573696e67204c6172676572205468616e20426c6f636b2d53697a65204b6579202d2048617368204b6579204669727374");
|
||||
describe("HMAC-SHA-256", function ()
|
||||
it("works", function()
|
||||
assert.equal("60e431591ee0b67f0d8a26aacbf5b77f8e0bc6213728c5140546040f0ee37f54", hmac.sha256(Key, Data, true))
|
||||
|
@ -91,8 +91,8 @@ describe("Test case 6", function ()
|
|||
end);
|
||||
end);
|
||||
describe("Test case 7", function ()
|
||||
local Key = hex.from("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa");
|
||||
local Data = hex.from("5468697320697320612074657374207573696e672061206c6172676572207468616e20626c6f636b2d73697a65206b657920616e642061206c6172676572207468616e20626c6f636b2d73697a6520646174612e20546865206b6579206e6565647320746f20626520686173686564206265666f7265206265696e6720757365642062792074686520484d414320616c676f726974686d2e");
|
||||
local Key = hex.decode("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa");
|
||||
local Data = hex.decode("5468697320697320612074657374207573696e672061206c6172676572207468616e20626c6f636b2d73697a65206b657920616e642061206c6172676572207468616e20626c6f636b2d73697a6520646174612e20546865206b6579206e6565647320746f20626520686173686564206265666f7265206265696e6720757365642062792074686520484d414320616c676f726974686d2e");
|
||||
describe("HMAC-SHA-256", function ()
|
||||
it("works", function()
|
||||
assert.equal("9b09ffa71b942fcb27635fbcd5b0e944bfdc63644f0713938a7f51535c3a35e2", hmac.sha256(Key, Data, true))
|
||||
|
|
|
@ -7,7 +7,8 @@ INSTALL_DATA=install -m644
|
|||
TARGET?=../util/
|
||||
|
||||
ALL=encodings.so hashes.so net.so pposix.so signal.so table.so \
|
||||
ringbuffer.so time.so poll.so compat.so strbitop.so
|
||||
ringbuffer.so time.so poll.so compat.so strbitop.so \
|
||||
struct.so
|
||||
|
||||
ifdef RANDOM
|
||||
ALL+=crand.so
|
||||
|
|
422
util-src/struct.c
Normal file
422
util-src/struct.c
Normal file
|
@ -0,0 +1,422 @@
|
|||
/*
|
||||
** {======================================================
|
||||
** Library for packing/unpacking structures.
|
||||
** $Id: struct.c,v 1.8 2018/05/16 11:00:23 roberto Exp $
|
||||
** See Copyright Notice at the end of this file
|
||||
** =======================================================
|
||||
*/
|
||||
/*
|
||||
** Valid formats:
|
||||
** > - big endian
|
||||
** < - little endian
|
||||
** ![num] - alignment
|
||||
** x - pading
|
||||
** b/B - signed/unsigned byte
|
||||
** h/H - signed/unsigned short
|
||||
** l/L - signed/unsigned long
|
||||
** T - size_t
|
||||
** i/In - signed/unsigned integer with size 'n' (default is size of int)
|
||||
** cn - sequence of 'n' chars (from/to a string); when packing, n==0 means
|
||||
the whole string; when unpacking, n==0 means use the previous
|
||||
read number as the string length
|
||||
** s - zero-terminated string
|
||||
** f - float
|
||||
** d - double
|
||||
** ' ' - ignored
|
||||
*/
|
||||
|
||||
|
||||
#include <ctype.h>
|
||||
#include <limits.h>
|
||||
#include <stddef.h>
|
||||
#include <string.h>
|
||||
|
||||
|
||||
#include "lua.h"
|
||||
#include "lauxlib.h"
|
||||
|
||||
|
||||
#if (LUA_VERSION_NUM >= 502)
|
||||
|
||||
#define luaL_register(L,n,f) luaL_newlib(L,f)
|
||||
|
||||
#endif
|
||||
|
||||
|
||||
/* basic integer type */
|
||||
#if !defined(STRUCT_INT)
|
||||
#define STRUCT_INT long
|
||||
#endif
|
||||
|
||||
typedef STRUCT_INT Inttype;
|
||||
|
||||
/* corresponding unsigned version */
|
||||
typedef unsigned STRUCT_INT Uinttype;
|
||||
|
||||
|
||||
/* maximum size (in bytes) for integral types */
|
||||
#define MAXINTSIZE 32
|
||||
|
||||
/* is 'x' a power of 2? */
|
||||
#define isp2(x) ((x) > 0 && ((x) & ((x) - 1)) == 0)
|
||||
|
||||
/* dummy structure to get alignment requirements */
|
||||
struct cD {
|
||||
char c;
|
||||
double d;
|
||||
};
|
||||
|
||||
|
||||
#define PADDING (sizeof(struct cD) - sizeof(double))
|
||||
#define MAXALIGN (PADDING > sizeof(int) ? PADDING : sizeof(int))
|
||||
|
||||
|
||||
/* endian options */
|
||||
#define BIG 0
|
||||
#define LITTLE 1
|
||||
|
||||
|
||||
static union {
|
||||
int dummy;
|
||||
char endian;
|
||||
} const native = {1};
|
||||
|
||||
|
||||
typedef struct Header {
|
||||
int endian;
|
||||
int align;
|
||||
} Header;
|
||||
|
||||
|
||||
static int getnum (const char **fmt, int df) {
|
||||
if (!isdigit(**fmt)) /* no number? */
|
||||
return df; /* return default value */
|
||||
else {
|
||||
int a = 0;
|
||||
do {
|
||||
a = a*10 + *((*fmt)++) - '0';
|
||||
} while (isdigit(**fmt));
|
||||
return a;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
#define defaultoptions(h) ((h)->endian = native.endian, (h)->align = 1)
|
||||
|
||||
|
||||
|
||||
static size_t optsize (lua_State *L, char opt, const char **fmt) {
|
||||
switch (opt) {
|
||||
case 'B': case 'b': return sizeof(char);
|
||||
case 'H': case 'h': return sizeof(short);
|
||||
case 'L': case 'l': return sizeof(long);
|
||||
case 'T': return sizeof(size_t);
|
||||
case 'f': return sizeof(float);
|
||||
case 'd': return sizeof(double);
|
||||
case 'x': return 1;
|
||||
case 'c': return getnum(fmt, 1);
|
||||
case 'i': case 'I': {
|
||||
int sz = getnum(fmt, sizeof(int));
|
||||
if (sz > MAXINTSIZE)
|
||||
luaL_error(L, "integral size %d is larger than limit of %d",
|
||||
sz, MAXINTSIZE);
|
||||
return sz;
|
||||
}
|
||||
default: return 0; /* other cases do not need alignment */
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
** return number of bytes needed to align an element of size 'size'
|
||||
** at current position 'len'
|
||||
*/
|
||||
static int gettoalign (size_t len, Header *h, int opt, size_t size) {
|
||||
if (size == 0 || opt == 'c') return 0;
|
||||
if (size > (size_t)h->align)
|
||||
size = h->align; /* respect max. alignment */
|
||||
return (size - (len & (size - 1))) & (size - 1);
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
** options to control endianess and alignment
|
||||
*/
|
||||
static void controloptions (lua_State *L, int opt, const char **fmt,
|
||||
Header *h) {
|
||||
switch (opt) {
|
||||
case ' ': return; /* ignore white spaces */
|
||||
case '>': h->endian = BIG; return;
|
||||
case '<': h->endian = LITTLE; return;
|
||||
case '!': {
|
||||
int a = getnum(fmt, MAXALIGN);
|
||||
if (!isp2(a))
|
||||
luaL_error(L, "alignment %d is not a power of 2", a);
|
||||
h->align = a;
|
||||
return;
|
||||
}
|
||||
default: {
|
||||
const char *msg = lua_pushfstring(L, "invalid format option '%c'", opt);
|
||||
luaL_argerror(L, 1, msg);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
static void putinteger (lua_State *L, luaL_Buffer *b, int arg, int endian,
|
||||
int size) {
|
||||
lua_Number n = luaL_checknumber(L, arg);
|
||||
Uinttype value;
|
||||
char buff[MAXINTSIZE];
|
||||
if (n < 0)
|
||||
value = (Uinttype)(Inttype)n;
|
||||
else
|
||||
value = (Uinttype)n;
|
||||
if (endian == LITTLE) {
|
||||
int i;
|
||||
for (i = 0; i < size; i++) {
|
||||
buff[i] = (value & 0xff);
|
||||
value >>= 8;
|
||||
}
|
||||
}
|
||||
else {
|
||||
int i;
|
||||
for (i = size - 1; i >= 0; i--) {
|
||||
buff[i] = (value & 0xff);
|
||||
value >>= 8;
|
||||
}
|
||||
}
|
||||
luaL_addlstring(b, buff, size);
|
||||
}
|
||||
|
||||
|
||||
static void correctbytes (char *b, int size, int endian) {
|
||||
if (endian != native.endian) {
|
||||
int i = 0;
|
||||
while (i < --size) {
|
||||
char temp = b[i];
|
||||
b[i++] = b[size];
|
||||
b[size] = temp;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
static int b_pack (lua_State *L) {
|
||||
luaL_Buffer b;
|
||||
const char *fmt = luaL_checkstring(L, 1);
|
||||
Header h;
|
||||
int arg = 2;
|
||||
size_t totalsize = 0;
|
||||
defaultoptions(&h);
|
||||
lua_pushnil(L); /* mark to separate arguments from string buffer */
|
||||
luaL_buffinit(L, &b);
|
||||
while (*fmt != '\0') {
|
||||
int opt = *fmt++;
|
||||
size_t size = optsize(L, opt, &fmt);
|
||||
int toalign = gettoalign(totalsize, &h, opt, size);
|
||||
totalsize += toalign;
|
||||
while (toalign-- > 0) luaL_addchar(&b, '\0');
|
||||
switch (opt) {
|
||||
case 'b': case 'B': case 'h': case 'H':
|
||||
case 'l': case 'L': case 'T': case 'i': case 'I': { /* integer types */
|
||||
putinteger(L, &b, arg++, h.endian, size);
|
||||
break;
|
||||
}
|
||||
case 'x': {
|
||||
luaL_addchar(&b, '\0');
|
||||
break;
|
||||
}
|
||||
case 'f': {
|
||||
float f = (float)luaL_checknumber(L, arg++);
|
||||
correctbytes((char *)&f, size, h.endian);
|
||||
luaL_addlstring(&b, (char *)&f, size);
|
||||
break;
|
||||
}
|
||||
case 'd': {
|
||||
double d = luaL_checknumber(L, arg++);
|
||||
correctbytes((char *)&d, size, h.endian);
|
||||
luaL_addlstring(&b, (char *)&d, size);
|
||||
break;
|
||||
}
|
||||
case 'c': case 's': {
|
||||
size_t l;
|
||||
const char *s = luaL_checklstring(L, arg++, &l);
|
||||
if (size == 0) size = l;
|
||||
luaL_argcheck(L, l >= (size_t)size, arg, "string too short");
|
||||
luaL_addlstring(&b, s, size);
|
||||
if (opt == 's') {
|
||||
luaL_addchar(&b, '\0'); /* add zero at the end */
|
||||
size++;
|
||||
}
|
||||
break;
|
||||
}
|
||||
default: controloptions(L, opt, &fmt, &h);
|
||||
}
|
||||
totalsize += size;
|
||||
}
|
||||
luaL_pushresult(&b);
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
static lua_Number getinteger (const char *buff, int endian,
|
||||
int issigned, int size) {
|
||||
Uinttype l = 0;
|
||||
int i;
|
||||
if (endian == BIG) {
|
||||
for (i = 0; i < size; i++) {
|
||||
l <<= 8;
|
||||
l |= (Uinttype)(unsigned char)buff[i];
|
||||
}
|
||||
}
|
||||
else {
|
||||
for (i = size - 1; i >= 0; i--) {
|
||||
l <<= 8;
|
||||
l |= (Uinttype)(unsigned char)buff[i];
|
||||
}
|
||||
}
|
||||
if (!issigned)
|
||||
return (lua_Number)l;
|
||||
else { /* signed format */
|
||||
Uinttype mask = (Uinttype)(~((Uinttype)0)) << (size*8 - 1);
|
||||
if (l & mask) /* negative value? */
|
||||
l |= mask; /* signal extension */
|
||||
return (lua_Number)(Inttype)l;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
static int b_unpack (lua_State *L) {
|
||||
Header h;
|
||||
const char *fmt = luaL_checkstring(L, 1);
|
||||
size_t ld;
|
||||
const char *data = luaL_checklstring(L, 2, &ld);
|
||||
size_t pos = (size_t)luaL_optinteger(L, 3, 1) - 1;
|
||||
int n = 0; /* number of results */
|
||||
luaL_argcheck(L, pos <= ld, 3, "initial position out of string");
|
||||
defaultoptions(&h);
|
||||
while (*fmt) {
|
||||
int opt = *fmt++;
|
||||
size_t size = optsize(L, opt, &fmt);
|
||||
pos += gettoalign(pos, &h, opt, size);
|
||||
luaL_argcheck(L, size <= ld - pos, 2, "data string too short");
|
||||
/* stack space for item + next position */
|
||||
luaL_checkstack(L, 2, "too many results");
|
||||
switch (opt) {
|
||||
case 'b': case 'B': case 'h': case 'H':
|
||||
case 'l': case 'L': case 'T': case 'i': case 'I': { /* integer types */
|
||||
int issigned = islower(opt);
|
||||
lua_Number res = getinteger(data+pos, h.endian, issigned, size);
|
||||
lua_pushnumber(L, res); n++;
|
||||
break;
|
||||
}
|
||||
case 'x': {
|
||||
break;
|
||||
}
|
||||
case 'f': {
|
||||
float f;
|
||||
memcpy(&f, data+pos, size);
|
||||
correctbytes((char *)&f, sizeof(f), h.endian);
|
||||
lua_pushnumber(L, f); n++;
|
||||
break;
|
||||
}
|
||||
case 'd': {
|
||||
double d;
|
||||
memcpy(&d, data+pos, size);
|
||||
correctbytes((char *)&d, sizeof(d), h.endian);
|
||||
lua_pushnumber(L, d); n++;
|
||||
break;
|
||||
}
|
||||
case 'c': {
|
||||
if (size == 0) {
|
||||
if (n == 0 || !lua_isnumber(L, -1))
|
||||
luaL_error(L, "format 'c0' needs a previous size");
|
||||
size = lua_tonumber(L, -1);
|
||||
lua_pop(L, 1); n--;
|
||||
luaL_argcheck(L, size <= ld - pos, 2, "data string too short");
|
||||
}
|
||||
lua_pushlstring(L, data+pos, size); n++;
|
||||
break;
|
||||
}
|
||||
case 's': {
|
||||
const char *e = (const char *)memchr(data+pos, '\0', ld - pos);
|
||||
if (e == NULL)
|
||||
luaL_error(L, "unfinished string in data");
|
||||
size = (e - (data+pos)) + 1;
|
||||
lua_pushlstring(L, data+pos, size - 1); n++;
|
||||
break;
|
||||
}
|
||||
default: controloptions(L, opt, &fmt, &h);
|
||||
}
|
||||
pos += size;
|
||||
}
|
||||
lua_pushinteger(L, pos + 1); /* next position */
|
||||
return n + 1;
|
||||
}
|
||||
|
||||
|
||||
static int b_size (lua_State *L) {
|
||||
Header h;
|
||||
const char *fmt = luaL_checkstring(L, 1);
|
||||
size_t pos = 0;
|
||||
defaultoptions(&h);
|
||||
while (*fmt) {
|
||||
int opt = *fmt++;
|
||||
size_t size = optsize(L, opt, &fmt);
|
||||
pos += gettoalign(pos, &h, opt, size);
|
||||
if (opt == 's')
|
||||
luaL_argerror(L, 1, "option 's' has no fixed size");
|
||||
else if (opt == 'c' && size == 0)
|
||||
luaL_argerror(L, 1, "option 'c0' has no fixed size");
|
||||
if (!isalnum(opt))
|
||||
controloptions(L, opt, &fmt, &h);
|
||||
pos += size;
|
||||
}
|
||||
lua_pushinteger(L, pos);
|
||||
return 1;
|
||||
}
|
||||
|
||||
/* }====================================================== */
|
||||
|
||||
|
||||
|
||||
static const struct luaL_Reg thislib[] = {
|
||||
{"pack", b_pack},
|
||||
{"unpack", b_unpack},
|
||||
{"size", b_size},
|
||||
{NULL, NULL}
|
||||
};
|
||||
|
||||
|
||||
LUALIB_API int luaopen_util_struct (lua_State *L);
|
||||
|
||||
LUALIB_API int luaopen_util_struct (lua_State *L) {
|
||||
luaL_register(L, "struct", thislib);
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
/******************************************************************************
|
||||
* Copyright (C) 2010-2018 Lua.org, PUC-Rio. All rights reserved.
|
||||
*
|
||||
* Permission is hereby granted, free of charge, to any person obtaining
|
||||
* a copy of this software and associated documentation files (the
|
||||
* "Software"), to deal in the Software without restriction, including
|
||||
* without limitation the rights to use, copy, modify, merge, publish,
|
||||
* distribute, sublicense, and/or sell copies of the Software, and to
|
||||
* permit persons to whom the Software is furnished to do so, subject to
|
||||
* the following conditions:
|
||||
*
|
||||
* The above copyright notice and this permission notice shall be
|
||||
* included in all copies or substantial portions of the Software.
|
||||
*
|
||||
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
||||
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
||||
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
|
||||
* IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
|
||||
* CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
|
||||
* TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
|
||||
* SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||
******************************************************************************/
|
||||
|
|
@ -3,5 +3,7 @@ return {
|
|||
band = function (a, b) return a & b end;
|
||||
bor = function (a, b) return a | b end;
|
||||
bxor = function (a, b) return a ~ b end;
|
||||
rshift = function (a, n) return a >> n end;
|
||||
lshift = function (a, n) return a << n end;
|
||||
};
|
||||
|
||||
|
|
|
@ -85,7 +85,7 @@ local function check_dependencies()
|
|||
{ "Debian/Ubuntu", "sudo apt install lua-sec" };
|
||||
{ "luarocks", "luarocks install luasec" };
|
||||
{ "Source", "https://github.com/brunoos/luasec" };
|
||||
}, "SSL/TLS support will not be available", err);
|
||||
}, nil, err);
|
||||
end
|
||||
|
||||
local bit, err = softreq"util.bitcompat";
|
||||
|
|
|
@ -13,7 +13,7 @@ local s_format = string.format;
|
|||
local s_sub = string.sub;
|
||||
|
||||
local iana_data = require "util.dnsregistry";
|
||||
local tohex = require "util.hex".to;
|
||||
local tohex = require "util.hex".encode;
|
||||
local inet_ntop = require "util.net".ntop;
|
||||
|
||||
-- Simplified versions of Waqas DNS parsers
|
||||
|
|
|
@ -23,4 +23,8 @@ local function from(s)
|
|||
return (s_gsub(s_lower(s), "%X*(%x%x)%X*", hex_to_char));
|
||||
end
|
||||
|
||||
return { to = to, from = from }
|
||||
return {
|
||||
encode = to, decode = from;
|
||||
-- COMPAT w/pre-0.12:
|
||||
to = to, from = from;
|
||||
};
|
||||
|
|
|
@ -67,7 +67,7 @@ function ip_methods:normal()
|
|||
end
|
||||
|
||||
function ip_methods.bits(ip)
|
||||
return hex.to(ip.packed):upper():gsub(".", hex2bits);
|
||||
return hex.encode(ip.packed):upper():gsub(".", hex2bits);
|
||||
end
|
||||
|
||||
function ip_methods.bits_full(ip)
|
||||
|
|
|
@ -60,6 +60,108 @@ local function check_probe(base_url, probe_module, target)
|
|||
return false, "Probe endpoint did not return a success status";
|
||||
end
|
||||
|
||||
local function check_turn_service(turn_service)
|
||||
local stun = require "net.stun";
|
||||
|
||||
-- Create UDP socket for communication with the server
|
||||
local sock = assert(require "socket".udp());
|
||||
sock:setsockname("*", 0);
|
||||
sock:setpeername(turn_service.host, turn_service.port);
|
||||
sock:settimeout(10);
|
||||
|
||||
-- Helper function to receive a packet
|
||||
local function receive_packet()
|
||||
local raw_packet, err = sock:receive();
|
||||
if not raw_packet then
|
||||
return nil, err;
|
||||
end
|
||||
return stun.new_packet():deserialize(raw_packet);
|
||||
end
|
||||
|
||||
local result = { warnings = {} };
|
||||
|
||||
-- Send a "binding" query, i.e. a request for our external IP/port
|
||||
local bind_query = stun.new_packet("binding", "request");
|
||||
bind_query:add_attribute("software", "prosodyctl check turn");
|
||||
sock:send(bind_query:serialize());
|
||||
|
||||
local bind_result, err = receive_packet();
|
||||
if not bind_result then
|
||||
result.error = "No STUN response: "..err;
|
||||
return result;
|
||||
elseif bind_result:is_err_resp() then
|
||||
result.error = ("STUN server returned error: %d (%s)"):format(bind_result:get_error());
|
||||
return result;
|
||||
elseif not bind_result:is_success_resp() then
|
||||
result.error = ("Unexpected STUN response: %d (%s)"):format(bind_result:get_type());
|
||||
return result;
|
||||
end
|
||||
|
||||
result.external_ip = bind_result:get_xor_mapped_address();
|
||||
if not result.external_ip then
|
||||
result.error = "STUN server did not return an address";
|
||||
return result;
|
||||
end
|
||||
|
||||
-- Send a TURN "allocate" request. Expected to fail due to auth, but
|
||||
-- necessary to obtain a valid realm/nonce from the server.
|
||||
local pre_request = stun.new_packet("allocate", "request");
|
||||
sock:send(pre_request:serialize());
|
||||
|
||||
local pre_result, err = receive_packet();
|
||||
if not pre_result then
|
||||
result.error = "No initial TURN response: "..err;
|
||||
return result;
|
||||
elseif pre_result:is_success_resp() then
|
||||
result.error = "TURN server does not have authentication enabled";
|
||||
return result;
|
||||
end
|
||||
|
||||
local realm = pre_result:get_attribute("realm");
|
||||
local nonce = pre_result:get_attribute("nonce");
|
||||
|
||||
if not realm then
|
||||
table.insert(result.warnings, "TURN server did not return an authentication realm");
|
||||
end
|
||||
if not nonce then
|
||||
table.insert(result.warnings, "TURN server did not return a nonce");
|
||||
end
|
||||
|
||||
-- Use the configured secret to obtain temporary user/pass credentials
|
||||
local turn_user, turn_pass = stun.get_user_pass_from_secret(turn_service.secret);
|
||||
|
||||
-- Send a TURN allocate request, will fail if auth is wrong
|
||||
local alloc_request = stun.new_packet("allocate", "request");
|
||||
alloc_request:add_requested_transport("udp");
|
||||
alloc_request:add_attribute("username", turn_user);
|
||||
if realm then
|
||||
alloc_request:add_attribute("realm", realm);
|
||||
end
|
||||
if nonce then
|
||||
alloc_request:add_attribute("nonce", nonce);
|
||||
end
|
||||
local key = stun.get_long_term_auth_key(realm or turn_service.host, turn_user, turn_pass);
|
||||
alloc_request:add_message_integrity(key);
|
||||
sock:send(alloc_request:serialize());
|
||||
|
||||
-- Check the response
|
||||
local alloc_response, err = receive_packet();
|
||||
if not alloc_response then
|
||||
result.error = "TURN server did not response to allocation request: "..err;
|
||||
return;
|
||||
elseif alloc_response:is_err_resp() then
|
||||
result.error = ("TURN allocation failed: %d (%s)"):format(alloc_response:get_error());
|
||||
return result;
|
||||
elseif not alloc_response:is_success_resp() then
|
||||
result.error = ("Unexpected TURN response: %d (%s)"):format(alloc_response:get_type());
|
||||
return result;
|
||||
end
|
||||
|
||||
-- No errors? Ok!
|
||||
|
||||
return result;
|
||||
end
|
||||
|
||||
local function skip_bare_jid_hosts(host)
|
||||
if jid_split(host) then
|
||||
-- See issue #779
|
||||
|
@ -80,8 +182,8 @@ local function check(arg)
|
|||
local ok = true;
|
||||
local function disabled_hosts(host, conf) return host ~= "*" and conf.enabled ~= false; end
|
||||
local function enabled_hosts() return it.filter(disabled_hosts, pairs(configmanager.getconfig())); end
|
||||
if not (what == nil or what == "disabled" or what == "config" or what == "dns" or what == "certs" or what == "connectivity") then
|
||||
show_warning("Don't know how to check '%s'. Try one of 'config', 'dns', 'certs', 'disabled' or 'connectivity'.", what);
|
||||
if not (what == nil or what == "disabled" or what == "config" or what == "dns" or what == "certs" or what == "connectivity" or what == "turn") then
|
||||
show_warning("Don't know how to check '%s'. Try one of 'config', 'dns', 'certs', 'disabled', 'turn' or 'connectivity'.", what);
|
||||
show_warning("Note: The connectivity check will connect to a remote server.");
|
||||
return 1;
|
||||
end
|
||||
|
@ -1004,6 +1106,65 @@ local function check(arg)
|
|||
print("Note: The connectivity check only checks the reachability of the domain.")
|
||||
print("Note: It does not ensure that the check actually reaches this specific prosody instance.")
|
||||
end
|
||||
|
||||
if what == "turn" then
|
||||
local turn_enabled_hosts = {};
|
||||
local turn_services = {};
|
||||
|
||||
for host in enabled_hosts() do
|
||||
local has_external_turn = modulemanager.get_modules_for_host(host):contains("turn_external");
|
||||
if has_external_turn then
|
||||
table.insert(turn_enabled_hosts, host);
|
||||
local turn_host = configmanager.get(host, "turn_external_host") or host;
|
||||
local turn_port = configmanager.get(host, "turn_external_port") or 3478;
|
||||
local turn_secret = configmanager.get(host, "turn_external_secret");
|
||||
if not turn_secret then
|
||||
print("Error: Your configuration is missing a turn_external_secret for "..host);
|
||||
print("Error: TURN will not be advertised for this host.");
|
||||
ok = false;
|
||||
else
|
||||
local turn_id = ("%s:%d"):format(turn_host, turn_port);
|
||||
if turn_services[turn_id] and turn_services[turn_id].secret ~= turn_secret then
|
||||
print("Error: Your configuration contains multiple differing secrets");
|
||||
print(" for the TURN service at "..turn_id.." - we will only test one.");
|
||||
elseif not turn_services[turn_id] then
|
||||
turn_services[turn_id] = {
|
||||
host = turn_host;
|
||||
port = turn_port;
|
||||
secret = turn_secret;
|
||||
};
|
||||
end
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
if what == "turn" then
|
||||
local count = it.count(pairs(turn_services));
|
||||
if count == 0 then
|
||||
print("Error: Unable to find any TURN services configured. Enable mod_turn_external!");
|
||||
else
|
||||
print("Identified "..tostring(count).." TURN services.");
|
||||
print("");
|
||||
end
|
||||
end
|
||||
|
||||
for turn_id, turn_service in pairs(turn_services) do
|
||||
print("Testing "..turn_id.."...");
|
||||
|
||||
local result = check_turn_service(turn_service);
|
||||
if #result.warnings > 0 then
|
||||
print(("%d warnings:\n\n "):format(#result.warnings));
|
||||
print(table.concat(result.warnings, "\n "));
|
||||
end
|
||||
if result.error then
|
||||
print("Error: "..result.error.."\n");
|
||||
ok = false;
|
||||
else
|
||||
print("Success!\n");
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
if not ok then
|
||||
print("Problems found, see above.");
|
||||
else
|
||||
|
|
|
@ -8,7 +8,7 @@
|
|||
|
||||
local random = require "util.random";
|
||||
local random_bytes = random.bytes;
|
||||
local hex = require "util.hex".to;
|
||||
local hex = require "util.hex".encode;
|
||||
local m_ceil = math.ceil;
|
||||
|
||||
local function get_nibbles(n)
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue