1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
|
# $OpenBSD: Client.pm,v 1.13 2020/10/16 22:46:45 bluhm Exp $
# Copyright (c) 2010-2020 Alexander Bluhm <bluhm@openbsd.org>
#
# Permission to use, copy, modify, and distribute this software for any
# purpose with or without fee is hereby granted, provided that the above
# copyright notice and this permission notice appear in all copies.
#
# THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
# WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
# MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
# ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
# WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
# ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
# OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
use strict;
use warnings;
package Client;
use parent 'Proc';
use Carp;
use Socket;
use Socket6;
use IO::Socket;
use IO::Socket::INET6;
use IO::Socket::SSL;
use Sys::Syslog qw(:standard :extended :macros);
sub new {
my $class = shift;
my %args = @_;
$args{ktracepid} = "ktrace" if $args{ktrace};
$args{ktracepid} = $ENV{KTRACE} if $ENV{KTRACE};
$args{ktracefile} ||= "client.ktrace";
$args{logfile} ||= "client.log";
$args{up} ||= "Openlog";
my $self = Proc::new($class, %args);
if (defined($self->{connectdomain})) {
$self->{connectproto} ||= "udp";
}
return $self;
}
sub child {
my $self = shift;
# TLS 1.3 writes multiple messages without acknowledgement.
# If the other side closes early, we want broken pipe error.
$SIG{PIPE} = 'IGNORE' if $self->{connectproto} eq "tls";
if (defined($self->{connectdomain}) &&
$self->{connectdomain} ne "sendsyslog") {
my $cs;
if ($self->{connectdomain} == AF_UNIX) {
$cs = IO::Socket::UNIX->new(
Type => SOCK_DGRAM,
Peer => $self->{connectpath} || "/dev/log",
) or die ref($self), " socket unix failed: $!";
$cs->setsockopt(SOL_SOCKET, SO_SNDBUF, 10000)
or die ref($self), " setsockopt failed: $!";
} else {
$SSL_ERROR = "";
my $iosocket = $self->{connectproto} eq "tls" ?
"IO::Socket::SSL" : "IO::Socket::INET6";
my $proto = $self->{connectproto};
$proto = "tcp" if $proto eq "tls";
$cs = $iosocket->new(
Proto => $proto,
Domain => $self->{connectdomain},
PeerAddr => $self->{connectaddr},
PeerPort => $self->{connectport},
$self->{sslcert} ?
(SSL_cert_file => $self->{sslcert}) : (),
$self->{sslkey} ?
(SSL_key_file => $self->{sslkey}) : (),
$self->{sslca} ?
(SSL_ca_file => $self->{sslca}) : (),
SSL_verify_mode => ($self->{sslca} ?
SSL_VERIFY_PEER : SSL_VERIFY_NONE),
$self->{sslversion} ?
(SSL_version => $self->{sslversion}) : (),
$self->{sslciphers} ?
(SSL_cipher_list => $self->{sslciphers}) : (),
) or die ref($self), " $iosocket socket connect ".
"failed: $!,$SSL_ERROR";
if ($self->{sndbuf}) {
setsockopt($cs, SOL_SOCKET, SO_SNDBUF,
pack('i', $self->{sndbuf})) or die
ref($self), " set SO_SNDBUF failed: $!";
}
if ($self->{rcvbuf}) {
setsockopt($cs, SOL_SOCKET, SO_RCVBUF,
pack('i', $self->{rcvbuf})) or die
ref($self), " set SO_RCVBUF failed: $!";
}
print STDERR "connect sock: ",$cs->sockhost()," ",
$cs->sockport(),"\n";
print STDERR "connect peer: ",$cs->peerhost()," ",
$cs->peerport(),"\n";
if ($self->{connectproto} eq "tls") {
print STDERR "ssl version: ",
$cs->get_sslversion(),"\n";
print STDERR "ssl cipher: ",
$cs->get_cipher(),"\n";
print STDERR "ssl issuer: ",
$cs->peer_certificate('issuer'),"\n";
print STDERR "ssl subject: ",
$cs->peer_certificate('subject'),"\n";
print STDERR "ssl cn: ",
$cs->peer_certificate('cn'),"\n";
}
}
IO::Handle::flush(\*STDOUT);
*STDIN = *STDOUT = $self->{cs} = $cs;
select(STDOUT);
}
if ($self->{logsock}) {
setlogsock($self->{logsock})
or die ref($self), " setlogsock failed: $!";
}
# we take LOG_UUCP as it is not used nowadays
openlog("syslogd-regress", "perror,pid", LOG_UUCP);
}
1;
|