summaryrefslogtreecommitdiffstats
path: root/plugins/imdtls/imdtls.c
diff options
context:
space:
mode:
Diffstat (limited to 'plugins/imdtls/imdtls.c')
-rw-r--r--plugins/imdtls/imdtls.c1164
1 files changed, 1164 insertions, 0 deletions
diff --git a/plugins/imdtls/imdtls.c b/plugins/imdtls/imdtls.c
new file mode 100644
index 0000000..6501d9c
--- /dev/null
+++ b/plugins/imdtls/imdtls.c
@@ -0,0 +1,1164 @@
+/**
+ * The dtls input module, uses OpenSSL as library to implement DTLS.
+ *
+ * \author Andre Lorbach <alorbach@adiscon.com>
+ *
+ * Copyright (C) 2023 Adiscon GmbH.
+ *
+ * This file is part of rsyslog.
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ * -or-
+ * see COPYING.ASL20 in the source distribution
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+#include "config.h"
+
+#include <stdio.h>
+#include <arpa/inet.h>
+#include <fcntl.h>
+#include <unistd.h>
+#include <sys/errno.h>
+#include <poll.h>
+#include <assert.h>
+#include <time.h>
+
+// --- Include openssl headers as well
+#include <openssl/ssl.h>
+#include <openssl/x509v3.h>
+#include <openssl/err.h>
+#if OPENSSL_VERSION_NUMBER >= 0x30000000L && !defined(LIBRESSL_VERSION_NUMBER)
+# include <openssl/bioerr.h>
+#endif
+#include <openssl/engine.h>
+// ---
+
+#include "rsyslog.h"
+#include "dirty.h"
+#include "module-template.h"
+#include "cfsysline.h"
+#include "msg.h"
+#include "errmsg.h"
+#include "glbl.h"
+#include "srUtils.h"
+#include "msg.h"
+#include "parser.h"
+#include "datetime.h"
+#include "net.h"
+#include "net_ossl.h"
+#include "prop.h"
+#include "ruleset.h"
+#include "statsobj.h"
+#include "unicode-helper.h"
+
+MODULE_TYPE_INPUT
+MODULE_TYPE_NOKEEP
+MODULE_CNFNAME("imdtls")
+
+/* defines */
+#define MAX_DTLS_CLIENTS 1024
+#define MAX_DTLS_MSGSIZE 65536
+#define DTLS_LISTEN_PORT "4433"
+// 1800 seconds = 30 minutes
+#define DTLS_DEFAULT_TIMEOUT 1800
+
+/* Module static data */
+DEF_OMOD_STATIC_DATA
+DEFobjCurrIf(glbl)
+DEFobjCurrIf(datetime)
+DEFobjCurrIf(prop)
+DEFobjCurrIf(ruleset)
+DEFobjCurrIf(statsobj)
+DEFobjCurrIf(net)
+DEFobjCurrIf(net_ossl)
+
+#define DTLS_MAX_RCVBUF 8192 /* Maximum DTLS packet is 8192 bytes which fits into Jumbo Frames. If not enabled
+ * message fragmentation (Ethernet MTU of ~ 1500 bytes) can occur.*/
+
+/* config settings */
+typedef struct configSettings_s {
+ uchar *pszBindRuleset; /* name of Ruleset to bind to */
+} configSettings_t;
+static configSettings_t cs;
+
+struct dtlsClient_s {
+ SSL* sslClient; /* DTSL (SSL) Client */
+ time_t lastActivityTime; /* Last Activity Time */
+ int clientfd; /* ClientFD */
+};
+
+// Use typedef to define a type 'dtlsClient_t' based on 'struct dtlsClient_s'
+typedef struct dtlsClient_s dtlsClient_t;
+
+struct instanceConf_s {
+ /* Network properties */
+ uchar *pszBindAddr; /* Listening IP Address */
+ uchar *pszBindPort; /* Port to bind socket to */
+ int timeout; /* Default timeout for DTLS Sessions */
+ /* Common properties */
+ uchar *pszBindRuleset; /* name of ruleset to bind to */
+ uchar *pszInputName;
+ prop_t *pInputName; /* InputName in property format for fast access */
+ ruleset_t *pBindRuleset; /* ruleset to bind listener to (use system default if unspecified) */
+ sbool bEnableLstn; /* flag to permit disabling of listener in error case */
+ statsobj_t *stats; /* listener stats */
+ STATSCOUNTER_DEF(ctrSubmit, mutCtrSubmit)
+ /* OpenSSL properties */
+ uchar *tlscfgcmd; /* OpenSSL Config Command used to override any OpenSSL Settings */
+ permittedPeers_t *pPermPeersRoot; /* permitted peers */
+ int CertVerifyDepth; /* Verify Depth for certificate chains */
+ /* Instance Variables */
+ char *pszRcvBuf;
+ int lenRcvBuf;
+ /**< -1: empty, 0: connection closed, 1..NSD_OSSL_MAX_RCVBUF-1: data of that size present */
+ int ptrRcvBuf; /**< offset for next recv operation if 0 < lenRcvBuf < NSD_OSSL_MAX_RCVBUF */
+
+ /* OpenSSL and Config Cert vars inside net_ossl_t now */
+ net_ossl_t *pNetOssl; /* OSSL shared Config and object vars are here */
+ int nClients; /* */
+ dtlsClient_t **dtlsClients; /* Array of DTSL (SSL) Clients */
+ int sockfd; /* UDP Socket used to bind to */
+ struct sockaddr_in server_addr; /* Server Sockaddr */
+ int port; /* Server Port as integer */
+
+ int id; /* Thread ID */
+ thrdInfo_t *pThrd; /* Thread Instance Info */
+ pthread_t tid; /* the instances thread ID */
+
+ struct instanceConf_s *next;
+ struct instanceConf_s *prev;
+};
+
+/* config variables */
+struct modConfData_s {
+ rsconf_t *pConf; /* our overall config object */
+ instanceConf_t *root, *tail;
+ uchar *pszBindRuleset; /* default name of Ruleset to bind to */
+ AuthMode drvrAuthMode; /* authenticate peer if no other name given */
+};
+
+static modConfData_t *loadModConf = NULL;/* modConf ptr to use for the current load process */
+static modConfData_t *runModConf = NULL;/* modConf ptr to use for the current load process */
+
+static prop_t *pInputName = NULL;
+
+/* module-global parameters */
+static struct cnfparamdescr modpdescr[] = {
+ { "ruleset", eCmdHdlrGetWord, 0 },
+ { "tls.authmode", eCmdHdlrString, 0 },
+};
+static struct cnfparamblk modpblk =
+ { CNFPARAMBLK_VERSION,
+ sizeof(modpdescr)/sizeof(struct cnfparamdescr),
+ modpdescr
+ };
+
+/* input instance parameters */
+static struct cnfparamdescr inppdescr[] = {
+ { "port", eCmdHdlrString, CNFPARAM_REQUIRED },
+ { "address", eCmdHdlrString, 0 },
+ { "timeout", eCmdHdlrPositiveInt, 0 },
+ { "name", eCmdHdlrString, 0 },
+ { "ruleset", eCmdHdlrString, 0 },
+ { "tls.permittedpeer", eCmdHdlrArray, 0 },
+ { "tls.authmode", eCmdHdlrString, 0 },
+ { "tls.cacert", eCmdHdlrString, 0 },
+ { "tls.mycert", eCmdHdlrString, 0 },
+ { "tls.myprivkey", eCmdHdlrString, 0 },
+ { "tls.tlscfgcmd", eCmdHdlrString, 0 }
+};
+static struct cnfparamblk inppblk =
+ { CNFPARAMBLK_VERSION,
+ sizeof(inppdescr)/sizeof(struct cnfparamdescr),
+ inppdescr
+ };
+#include "im-helper.h" /* must be included AFTER the type definitions! */
+
+/* create input instance, set default parameters, and
+ * add it to the list of instances.
+ */
+static rsRetVal
+createInstance(instanceConf_t **pinst)
+{
+ instanceConf_t *inst;
+ DEFiRet;
+ CHKmalloc(inst = malloc(sizeof(instanceConf_t)));
+ inst->next = NULL;
+
+ inst->pszBindAddr = NULL;
+ inst->pszBindPort = NULL;
+ inst->timeout = 1800;
+ inst->pszBindRuleset = loadModConf->pszBindRuleset;
+ inst->pszInputName = NULL;
+ inst->pBindRuleset = NULL;
+ inst->bEnableLstn = 0;
+
+ inst->tlscfgcmd = NULL;
+ inst->pPermPeersRoot = NULL;
+ inst->CertVerifyDepth = 2;
+
+ /* node created, let's add to config */
+ if(loadModConf->tail == NULL) {
+ loadModConf->tail = loadModConf->root = inst;
+ } else {
+ loadModConf->tail->next = inst;
+ loadModConf->tail = inst;
+ }
+
+ // Construct pNetOssl helper
+ CHKiRet(net_ossl.Construct(&inst->pNetOssl));
+ inst->pNetOssl->authMode = loadModConf->drvrAuthMode;
+
+ *pinst = inst;
+finalize_it:
+ RETiRet;
+}
+
+
+/* function to generate an error message if the ruleset cannot be found */
+static inline void
+std_checkRuleset_genErrMsg(__attribute__((unused)) modConfData_t *modConf, instanceConf_t *inst)
+{
+ LogError(0, NO_ERRCODE, "imdtls[%s]: ruleset '%s' not found - "
+ "using default ruleset instead",
+ inst->pszBindPort, inst->pszBindRuleset);
+}
+
+static void
+DTLSCloseSocket(instanceConf_t *inst) {
+ DBGPRINTF("imdtls: DTLSCloseSocket for %s:%d\n", inst->pszBindAddr, inst->port);
+ // Close UDP Socket
+ close(inst->sockfd);
+ inst->sockfd = 0;
+}
+
+static rsRetVal
+DTLSCreateSocket(instanceConf_t *inst) {
+ DEFiRet;
+ int optval = 1;
+ int flags;
+
+ struct in_addr ip_struct;
+ DBGPRINTF("imdtls: DTLSCreateSocket for %s:%d\n", inst->pszBindAddr, inst->port);
+
+ // Create UDP Socket
+ inst->sockfd = socket(AF_INET, SOCK_DGRAM, 0);
+ if (inst->sockfd < 0) {
+ LogError(0, NO_ERRCODE, "imdtls: Unable to create DTLS listener,"
+ " failed to create socket, "
+ " ignoring port %d bind-address %s.",
+ inst->port, inst->pszBindAddr);
+ ABORT_FINALIZE(RS_RET_ERR);
+ }
+ setsockopt(inst->sockfd, SOL_SOCKET, SO_REUSEADDR, &optval, sizeof(optval));
+ setsockopt(inst->sockfd, SOL_SOCKET, SO_REUSEPORT, &optval, sizeof(optval));
+
+ // Set NON Blcoking Flags
+ flags = fcntl(inst->sockfd, F_GETFL, 0);
+ fcntl(inst->sockfd, F_SETFL, flags | O_NONBLOCK);
+
+ // Convert IP Address into numeric
+ if (inet_pton(AF_INET, (char*) inst->pszBindAddr, &ip_struct) <= 0) {
+ LogError(0, NO_ERRCODE, "imdtls: Unable to create DTLS listener,"
+ " invalid Bind Address, "
+ " ignoring port %d bind-address %s.",
+ inst->port, inst->pszBindAddr);
+ ABORT_FINALIZE(RS_RET_ERR);
+ }
+
+ // Set Server Address
+ memset(&inst->server_addr, 0, sizeof(struct sockaddr_in));
+ inst->server_addr.sin_family = AF_INET;
+ inst->server_addr.sin_port = htons(inst->port);
+ inst->server_addr.sin_addr.s_addr = htonl(ip_struct.s_addr);
+
+ // Bind UDP Socket
+ if (bind(inst->sockfd, (struct sockaddr*)&inst->server_addr, sizeof(struct sockaddr_in)) < 0) {
+ LogError(0, NO_ERRCODE, "imdtls: Unable to create DTLS listener,"
+ " unable to bind, "
+ " ignoring port %d bind-address %s.",
+ inst->port, inst->pszBindAddr);
+ ABORT_FINALIZE(RS_RET_ERR);
+ }
+finalize_it:
+ RETiRet;
+}
+
+/* Verify Callback for X509 Certificate validation. Force visibility as this function is not called anywhere but
+* only used as callback!
+*/
+static int
+imdtls_verify_callback(int status, SSL* ssl)
+{
+ DEFiRet;
+ X509 *certpeer;
+ instanceConf_t *inst = NULL;
+
+ dbgprintf("imdtls_verify_callback: get SSL [%p]\n", (void *)ssl);
+ inst = (instanceConf_t*) SSL_get_ex_data(ssl, 2);
+
+ /* Continue check if certificate verify was valid */
+ if (status == 1) {
+ if ( ssl != NULL &&
+ inst != NULL) {
+ /* call the actual function based on current auth mode */
+ switch(inst->pNetOssl->authMode) {
+ case OSSL_AUTH_CERTNAME:
+ /* if we check the name, we must ensure the cert is valid */
+ certpeer = net_ossl_getpeercert(inst->pNetOssl, ssl, NULL);
+ dbgprintf("imdtls_verify_callback: Check peer certname[%p]=%s\n",
+ (void *)ssl, (certpeer != NULL ? "VALID" : "NULL"));
+ CHKiRet(net_ossl_chkpeercertvalidity(inst->pNetOssl, ssl, NULL));
+ CHKiRet(net_ossl_chkpeername(inst->pNetOssl, certpeer, NULL));
+ break;
+ case OSSL_AUTH_CERTFINGERPRINT:
+ certpeer = net_ossl_getpeercert(inst->pNetOssl, ssl, NULL);
+ dbgprintf("imdtls_verify_callback: Check peer fingerprint[%p]=%s\n",
+ (void *)ssl, (certpeer != NULL ? "VALID" : "NULL"));
+ CHKiRet(net_ossl_chkpeercertvalidity(inst->pNetOssl, ssl, NULL));
+ CHKiRet(net_ossl_peerfingerprint(inst->pNetOssl, certpeer, NULL));
+ break;
+ case OSSL_AUTH_CERTVALID:
+ certpeer = net_ossl_getpeercert(inst->pNetOssl, ssl, NULL);
+ dbgprintf("imdtls_verify_callback: Check peer valid[%p]=%s\n",
+ (void *)ssl, (certpeer != NULL ? "VALID" : "NULL"));
+ CHKiRet(net_ossl_chkpeercertvalidity(inst->pNetOssl, ssl, NULL));
+ break;
+ case OSSL_AUTH_CERTANON:
+ dbgprintf("imdtls_verify_callback: ANON[%p]\n", (void *)ssl);
+ FINALIZE;
+ break;
+ }
+ } else {
+ LogMsg(0, RS_RET_NO_ERRCODE, LOG_WARNING, "imdtls_verify_callback: MISSING ssl or inst!");
+ }
+ }
+finalize_it:
+ if(iRet != RS_RET_OK) {
+ DBGPRINTF("imdtls_verify_callback: FAILED\n");
+ status = 0;
+ }
+ return status;
+}
+
+
+static rsRetVal
+addListner(modConfData_t __attribute__((unused)) *modConf, instanceConf_t *inst)
+{
+ uchar statname[64];
+ DEFiRet;
+ DBGPRINTF("imdtls: addListner ENTER\n");
+
+ if(!inst->bEnableLstn) {
+ DBGPRINTF("imdtls: DTLS Listener not started because it is disabled by config error\n");
+ FINALIZE;
+ }
+
+ inst->pszInputName = ustrdup((inst->pszInputName == NULL) ? UCHAR_CONSTANT("imdtls") : inst->pszInputName);
+ CHKiRet(prop.Construct(&inst->pInputName));
+ CHKiRet(prop.SetString(inst->pInputName, inst->pszInputName, ustrlen(inst->pszInputName)));
+ CHKiRet(prop.ConstructFinalize(inst->pInputName));
+
+ /* Init defaults */
+ if (inst->pszBindPort == NULL) {
+ CHKmalloc(inst->pszBindPort = ustrdup((uchar*) DTLS_LISTEN_PORT));
+ }
+
+ /* Init SSL Handles! */
+ CHKmalloc(inst->dtlsClients = (dtlsClient_t**) calloc(MAX_DTLS_CLIENTS, sizeof(dtlsClient_t*)));
+ for (int i = 0; i < MAX_DTLS_CLIENTS; ++i) {
+ CHKmalloc(inst->dtlsClients[i] = (dtlsClient_t*) calloc(1, sizeof(dtlsClient_t)));
+ }
+ inst->nClients = 0;
+
+ /* support statistics gathering */
+ CHKiRet(statsobj.Construct(&(inst->stats)));
+ snprintf((char*)statname, sizeof(statname), "%s(%s)",
+ inst->pszInputName, inst->pszBindPort);
+ statname[sizeof(statname)-1] = '\0'; /* just to be on the save side... */
+ CHKiRet(statsobj.SetName(inst->stats, statname));
+ CHKiRet(statsobj.SetOrigin(inst->stats, (uchar*)"imdtls"));
+ STATSCOUNTER_INIT(inst->ctrSubmit, inst->mutCtrSubmit);
+ CHKiRet(statsobj.AddCounter(inst->stats, UCHAR_CONSTANT("submitted"),
+ ctrType_IntCtr, CTR_FLAG_RESETTABLE, &(inst->ctrSubmit)));
+ CHKiRet(statsobj.ConstructFinalize(inst->stats));
+ /* end stats counters */
+
+ // Init OpenSSL Context with DTLS_server_method
+ CHKiRet(net_ossl.osslCtxInit(inst->pNetOssl, DTLS_method()));
+
+# if OPENSSL_VERSION_NUMBER >= 0x10002000L
+ // Init OpenSSL Cookie Callbacks
+ CHKiRet(net_ossl.osslCtxInitCookie(inst->pNetOssl));
+# endif
+ // Run openssl config commands in Context
+ CHKiRet(net_ossl_apply_tlscgfcmd(inst->pNetOssl, inst->tlscfgcmd));
+
+ // Init Socket
+ CHKiRet(DTLSCreateSocket(inst));
+finalize_it:
+ if(iRet != RS_RET_OK) {
+ LogError(0, NO_ERRCODE, "DTLS Listener for thread failed to create UDP socket "
+ "for thread %s is not functional!", inst->pszInputName);
+ } else {
+ DBGPRINTF("imdtls: DTLS Listener for thread %s added\n", inst->pszInputName);
+ }
+ RETiRet;
+}
+
+static rsRetVal
+processMsg(instanceConf_t *inst, dtlsClient_t *dtlsClient, char *msg, size_t lenMsg)
+{
+ DEFiRet;
+ smsg_t *pMsg = NULL;
+ prop_t *pProp = NULL;
+ BIO *wbio;
+ BIO_ADDR *peer_addr;
+
+ /* Get Gentime */
+ time_t ttGenTime = 0;
+ struct syslogTime stTime;
+ datetime.getCurrTime(&stTime, &ttGenTime, TIME_IN_LOCALTIME);
+
+ /* we now create our own message object and submit it to the queue */
+ CHKiRet(msgConstructWithTime(&pMsg, &stTime, ttGenTime));
+ MsgSetRawMsg(pMsg, msg, lenMsg);
+ MsgSetInputName(pMsg, inst->pInputName);
+ MsgSetRuleset(pMsg, inst->pBindRuleset);
+ MsgSetFlowControlType(pMsg, eFLOWCTL_NO_DELAY);
+ pMsg->msgFlags = NEEDS_PARSING | PARSE_HOSTNAME;
+
+ // Obtain Sender from BIO
+ wbio = SSL_get_wbio(dtlsClient->sslClient);
+ peer_addr = BIO_ADDR_new();
+ if (BIO_dgram_get_peer(wbio, peer_addr)) {
+ char *pHostname = BIO_ADDR_hostname_string(peer_addr, 1);
+ DBGPRINTF("imdtls: processMsg Received message from %s: %s\n", pHostname, msg);
+ MsgSetRcvFromStr(pMsg, (uchar *)pHostname, strlen(pHostname), &pProp);
+ CHKiRet(prop.Destruct(&pProp));
+ OPENSSL_free(pHostname);
+ } else {
+ DBGPRINTF("imdtls: processMsg Received message from UNKNOWN: %s\n", msg);
+ }
+ BIO_ADDR_free(peer_addr);
+
+ // Update Activity
+ dtlsClient->lastActivityTime = time(NULL);
+
+ // Submit Message
+ CHKiRet(submitMsg2(pMsg));
+ STATSCOUNTER_INC(inst->ctrSubmit, inst->mutCtrSubmit);
+finalize_it:
+ RETiRet;
+}
+
+static void
+DTLScleanupSession(instanceConf_t *inst, int idx) {
+ if (inst->dtlsClients[idx]->sslClient != NULL) {
+ BIO *rbio = SSL_get_rbio(inst->dtlsClients[idx]->sslClient);
+ if (rbio) {
+ // Close socket FIRST!
+ int clientfd = -1;
+ BIO_get_fd(rbio, &clientfd);
+ if (clientfd != -1) {
+ close(clientfd);
+ }
+ }
+ SSL_free(inst->dtlsClients[idx]->sslClient);
+ DBGPRINTF("imdtls: DTLScleanupSession Socket/SSL for Client idx (%d) terminated.\n", idx);
+ }
+ inst->dtlsClients[idx]->sslClient = NULL;
+ inst->dtlsClients[idx]->lastActivityTime = 0;
+}
+
+static void
+DTLSAcceptSession(instanceConf_t *inst, int idx) {
+ int ret, err;
+ SSL* ssl = inst->dtlsClients[idx]->sslClient;
+ DBGPRINTF("imdtls: DTLSAcceptSession for Client idx (%d).\n", idx);
+
+ // Check if the handshake has already been completed
+ ret = SSL_get_state(ssl);
+ if (ret != TLS_ST_OK) {
+ // Existing client Finish handshake
+ ret = SSL_accept(ssl);
+ if (ret <= 0) {
+ err = SSL_get_error(ssl, ret);
+ if (err == SSL_ERROR_WANT_READ || err == SSL_ERROR_WANT_WRITE) {
+ // Non-blocking operation did not complete; retry later
+ DBGPRINTF("imdtls: SSL_accept didn't complete (%d). Will retry.\n", err);
+ } else if(err == SSL_ERROR_SYSCALL) {
+ DBGPRINTF("imdtls: SSL_accept failed SSL_ERROR_SYSCALL idx (%d), removing client.\n",
+ idx);
+ net_ossl_lastOpenSSLErrorMsg(NULL, err, ssl, LOG_WARNING,
+ "DTLSHandleSessions", "SSL_accept");
+ DTLScleanupSession(inst, idx);
+ } else {
+ // An actual error occurred
+ DBGPRINTF("imdtls: SSL_accept failed (%d) idx (%d), removing client.\n", err, idx);
+ net_ossl_lastOpenSSLErrorMsg(NULL, err, ssl, LOG_ERR,
+ "DTLSHandleSessions", "SSL_accept");
+ DTLScleanupSession(inst, idx);
+ }
+ } else {
+ DBGPRINTF("imdtls: SSL_accept success idx (%d), adding client.\n", idx);
+ inst->dtlsClients[idx]->lastActivityTime = time(NULL);
+
+ int status = 1;
+ status = imdtls_verify_callback(status, ssl);
+ if (status == 0) {
+ LogMsg(0, RS_RET_NO_ERRCODE, LOG_WARNING,
+ "imdtls: Cert Verify FAILED for DTLS client idx (%d)",idx);
+ } else {
+ DBGPRINTF("imdtls: Cert Verify SUCCESS for DTLS client idx (%d)\n", idx);
+ }
+ }
+ } else {
+ DBGPRINTF("imdtls: SSL_get_state for DTLS client idx (%d) is %d\n", idx, ret);
+ }
+}
+
+static void
+DTLSTerminateClients(instanceConf_t *inst) {
+ // Process pending Client Data first!
+ for (int i = 0; i < MAX_DTLS_CLIENTS; ++i) {
+ if (inst->dtlsClients[i]->sslClient != NULL) {
+ DTLScleanupSession(inst, i);
+ }
+ }
+}
+
+static void
+DTLSReadClient(instanceConf_t *inst, int idx, short revents) {
+ int err;
+ SSL* ssl = inst->dtlsClients[idx]->sslClient;
+ DBGPRINTF("imdtls: DEBUG Check Client activity on index %d.\n", idx);
+ if (revents & POLLIN) {
+ if (ssl == NULL) {
+ DBGPRINTF("imdtls: DTLSHandleSessions MISSING SSL OBJ for index %d.\n", idx);
+ return;
+ }
+ DBGPRINTF("imdtls: Read Client activity on index %d.\n", idx);
+ char buf[MAX_DTLS_MSGSIZE];
+ int len = 0;
+ do {
+ len = SSL_read(ssl, buf, sizeof(buf) - 1);
+ if (len > 0) {
+ buf[len] = '\0';
+ processMsg(inst, inst->dtlsClients[idx], buf, len);
+ } else {
+ err = SSL_get_error(ssl, len);
+ if (err == SSL_ERROR_WANT_READ) {
+ DBGPRINTF("imdtls: SSL_ERROR_WANT_READ flush rbio on index %d.\n", idx);
+ BIO *rbio = SSL_get_rbio(ssl);
+ BIO_flush(rbio);
+ } else if (err == SSL_ERROR_WANT_WRITE) {
+ DBGPRINTF("imdtls: SSL_ERROR_WANT_WRITE flush wbio on index %d.\n", idx);
+ BIO *wbio = SSL_get_wbio(ssl);
+ BIO_flush(wbio);
+ } else if (err == SSL_ERROR_ZERO_RETURN) {
+ DBGPRINTF("imdtls: SSL_ERROR_ZERO_RETURN on index %d.\n", idx);
+ break;
+ } else if (err == SSL_ERROR_SYSCALL) {
+ DBGPRINTF("imdtls: SSL_ERROR_SYSCALL on index %d ERRNO %d\n", idx, errno);
+ net_ossl_lastOpenSSLErrorMsg(NULL, err, ssl, LOG_ERR,
+ "DTLSReadClient", "SSL_read");
+ DTLScleanupSession(inst, idx);
+ break;
+ } else {
+ DBGPRINTF("imdtls: SSL_read error %d (%d) on idx %d, rem client.\n",
+ err, errno, idx);
+ DTLScleanupSession(inst, idx);
+ // Exit the loop if any error occurs
+ break;
+ }
+ }
+ } while (len > 0);
+ }
+}
+
+static void
+DTLSHandleSessions(instanceConf_t *inst) {
+ int fdToIndex[MAX_DTLS_CLIENTS + 1];
+ struct pollfd fds[MAX_DTLS_CLIENTS + 1];
+ int optval = 1;
+ int fdcount = 0;
+ int ret, err;
+ memset(fdToIndex, 0, sizeof(fdToIndex));
+ memset(fds, 0, sizeof(fds));
+ fds[0].fd = inst->sockfd;
+ fds[0].events = POLLIN;
+ DBGPRINTF("imdtls: DTLSHandleSessions ENTER \n");
+
+ // Create FDS Array for Polling sockets
+ for (int i = 0; i < MAX_DTLS_CLIENTS; ++i) {
+ if (inst->dtlsClients[i]->sslClient != NULL) {
+ int clientfd = -1;
+ fdcount++;
+ BIO_get_fd(SSL_get_wbio(inst->dtlsClients[i]->sslClient), &clientfd);
+ DBGPRINTF("imdtls: DTLSHandleSessions handle client %d (%d)\n", fdcount, clientfd);
+ fds[fdcount].fd = clientfd;
+ fds[fdcount].events = POLLIN;
+ fdToIndex[clientfd] = i; // Map fd to dtlsClients index
+ }
+ }
+
+ DBGPRINTF("imdtls: Waiting for poll (clients %d) ...\n", fdcount);
+ ret = poll(fds, fdcount+1, -1);
+ if(glbl.GetGlobalInputTermState() == 1) {
+ DBGPRINTF("imdtls: DTLSHandleSessions Terminate State\n");
+ return; /* terminate input! */
+ }
+ if (ret < 0) {
+ DBGPRINTF("imdtls: DTLSHandleSessions ERROR poll failed %d with err %d\n", ret , errno);
+ return;
+ }
+
+ // Process pending Client Data first!
+ DBGPRINTF("imdtls: DTLSHandleSessions handle client sockets (%d) \n", fdcount);
+ for (int i = 1; i <= fdcount; ++i) {
+ DTLSReadClient(inst, fdToIndex[fds[i].fd], fds[i].revents);
+ }
+
+ // Check session timeouts
+ for (int i = 0; i < MAX_DTLS_CLIENTS; ++i) {
+ if (inst->dtlsClients[i]->sslClient != NULL) {
+ if (difftime(time(NULL), inst->dtlsClients[i]->lastActivityTime) > inst->timeout) {
+ DBGPRINTF("imdtls: Session timeout (%d) for client index %d.\n", i, inst->timeout);
+ DTLScleanupSession(inst, i);
+ continue;
+ }
+ }
+ }
+
+ // Check MAIN socket for new connections
+ if (fds[0].revents & POLLIN) {
+ DBGPRINTF("imdtls: DTLSHandleSessions handle main socket\n");
+
+ // Create BIO Object for potential new client
+ BIO *sbio = BIO_new_dgram(inst->sockfd, BIO_NOCLOSE);
+ BIO_ctrl(sbio, BIO_CTRL_DGRAM_MTU_DISCOVER, 0, NULL);
+
+ // Create SSL Object for new client and apply default callbacks
+ SSL *ssl = SSL_new(inst->pNetOssl->ctx);
+ SSL_set_bio(ssl, sbio, sbio);
+ SSL_set_accept_state(ssl);
+ if (inst->pNetOssl->authMode != OSSL_AUTH_CERTANON) {
+ dbgprintf("imdtls: enable certificate checking (Mode=%d, VerifyDepth=%d)\n",
+ inst->pNetOssl->authMode, inst->CertVerifyDepth);
+ net_ossl_set_ssl_verify_callback(ssl,
+ SSL_VERIFY_PEER|SSL_VERIFY_FAIL_IF_NO_PEER_CERT);
+ if (inst->CertVerifyDepth != 0) {
+ SSL_set_verify_depth(ssl, inst->CertVerifyDepth);
+ }
+ }
+
+ // Store reference in SSL obj
+ SSL_set_ex_data(ssl, 0, NULL); /* Reserved for pTcp */
+ SSL_set_ex_data(ssl, 1, NULL); /* Reserved for permitExpiredCerts */
+ SSL_set_ex_data(ssl, 2, inst); /* Used in imdtls */
+
+ // Debug Callback for conn sbio!
+ net_ossl_set_bio_callback(sbio);
+
+ // Connect the new Client
+ BIO_ADDR *client_addr = BIO_ADDR_new();
+
+ // Start DTLS Listen and Session
+ do {
+ ret = DTLSv1_listen(ssl, client_addr);
+ if (ret > 0) {
+ dbgprintf("imdtls: DTLSHandleSessions DTLSv1_listen SUCCESS\n");
+ // Create new CLIENT socket for communication!
+ int clientfd = socket(BIO_ADDR_family(client_addr), SOCK_DGRAM, 0);
+ if (clientfd < 0) {
+ LogError(0, NO_ERRCODE, "imdtls: DTLSHandleSessions unable to create"
+ " client socket");
+ return;
+ }
+ setsockopt(clientfd, SOL_SOCKET, SO_REUSEADDR, &optval, sizeof(optval));
+ setsockopt(clientfd, SOL_SOCKET, SO_REUSEPORT, &optval, sizeof(optval));
+ // Bind and Connect Client Socket
+ if (bind(clientfd,
+ (struct sockaddr*) &inst->server_addr, sizeof(struct sockaddr_in)) < 0) {
+ LogError(0, NO_ERRCODE, "imdtls: DTLSHandleSessions unable to bind"
+ " client socket"
+ " ignoring port %d bind-address %s.",
+ inst->port, inst->pszBindAddr);
+ return;
+ }
+ // Set new fd and set BIO to connected
+ BIO *rbio = SSL_get_rbio(ssl);
+ BIO_set_fd(rbio, clientfd, BIO_NOCLOSE);
+
+ // Set and activate timeouts
+ struct timeval timeout;
+ timeout.tv_sec = inst->timeout;
+ timeout.tv_usec = 0;
+ BIO_ctrl(rbio, BIO_CTRL_DGRAM_SET_RECV_TIMEOUT, 0, &timeout);
+
+ // Set BIO to connected
+ ret = BIO_connect(clientfd, client_addr, 0);
+ if (ret == 0) {
+ err = SSL_get_error(ssl, ret);
+ DBGPRINTF("imdtls: DTLSHandleSessions BIO_connect ERROR %d\n", err);
+ net_ossl_lastOpenSSLErrorMsg(NULL, err, ssl, LOG_WARNING,
+ "DTLSHandleSessions", "BIO_connect");
+ LogMsg(0, RS_RET_NO_ERRCODE, LOG_WARNING,
+ "imdtls: BIO_connect failed for DTLS client");
+ SSL_free(ssl);
+ } else {
+ BIO_ctrl_set_connected(rbio, client_addr);
+ DBGPRINTF("imdtls: BIO_connect succeeded.\n");
+
+ // Add to DTLS Clients
+ for (int i = 0; i < MAX_DTLS_CLIENTS; ++i) {
+ if (inst->dtlsClients[i]->sslClient == NULL) {
+ inst->dtlsClients[i]->sslClient = ssl;
+ inst->dtlsClients[i]->lastActivityTime = time(NULL);
+ DBGPRINTF("imdtls: New Client added at idx %d.\n", i);
+ DTLSAcceptSession(inst, i);
+ break;
+ }
+ }
+ }
+ break;
+ } else {
+ err = SSL_get_error(ssl, ret);
+ if ( (ret == 0 && err == SSL_ERROR_SYSCALL) ||
+ (err == SSL_ERROR_SYSCALL && errno == EAGAIN)) {
+ DBGPRINTF("imdtls: DTLSv1_listen RET %d (ERR %d / ERRNO %d), retry\n",
+ ret, err, errno);
+ // Wait little and retry DTLSv1_listen
+ srSleep(0, 100000);
+ continue;
+ } else {
+ DBGPRINTF("imdtls: DTLSv1_listen RET %d (ERR %d / ERRNO %d), abort\n",
+ ret, err, errno);
+ net_ossl_lastOpenSSLErrorMsg(NULL, err, ssl, LOG_WARNING,
+ "DTLSHandleSessions", "DTLSv1_listen");
+ LogMsg(0, RS_RET_NO_ERRCODE, LOG_WARNING,
+ "imdtls: DTLSv1_listen failed for DTLS client");
+ SSL_free(ssl);
+ break;
+ }
+ }
+ }
+ while (1);
+ BIO_ADDR_free(client_addr);
+ }
+}
+
+static void*
+startDtlsHandler(void *myself) {
+ instanceConf_t *inst = (instanceConf_t *) myself;
+ DBGPRINTF("imdtls: start DtlsHandler for thread %s\n", inst->pszInputName);
+
+ /* DTLS Receiving Loop */
+ while(glbl.GetGlobalInputTermState() == 0) {
+ DBGPRINTF("imdtls: begin handle DTSL Client Sessions\n");
+ DTLSHandleSessions(inst);
+ }
+
+ /* DTLS Terminate Sessions */
+ DBGPRINTF("imdtls: Terminate DTLS Client Sessions\n");
+ DTLSTerminateClients(inst);
+
+ DBGPRINTF("imdtls: stop DtlsHandler for thread %s\n", inst->pszInputName);
+ return NULL;
+}
+
+/* Set permitted peers. It is depending on the auth mode if this are
+ * fingerprints or names. -- rgerhards, 2008-05-19
+ */
+static rsRetVal
+SetPermPeers(instanceConf_t *inst, permittedPeers_t *pPermPeers)
+{
+ DEFiRet;
+ if(pPermPeers == NULL)
+ FINALIZE;
+
+ if(inst->pNetOssl->authMode != OSSL_AUTH_CERTFINGERPRINT && inst->pNetOssl->authMode != OSSL_AUTH_CERTNAME) {
+ LogError(0, RS_RET_VALUE_NOT_IN_THIS_MODE, "authentication not supported by "
+ "imdtls in the configured authentication mode - ignored");
+ ABORT_FINALIZE(RS_RET_VALUE_NOT_IN_THIS_MODE);
+ }
+ inst->pNetOssl->pPermPeers = pPermPeers;
+finalize_it:
+ RETiRet;
+}
+BEGINnewInpInst
+ struct cnfparamvals *pvals;
+ instanceConf_t *inst = NULL;
+ int i,j;
+ FILE *fp;
+CODESTARTnewInpInst
+ DBGPRINTF("newInpInst (imdtls)\n");
+
+ if((pvals = nvlstGetParams(lst, &inppblk, NULL)) == NULL) {
+ ABORT_FINALIZE(RS_RET_MISSING_CNFPARAMS);
+ }
+
+ if(Debug) {
+ dbgprintf("input param blk in imdtls:\n");
+ cnfparamsPrint(&inppblk, pvals);
+ }
+
+ CHKiRet(createInstance(&inst));
+
+ for(i = 0 ; i < inppblk.nParams ; ++i) {
+ if(!pvals[i].bUsed)
+ continue;
+ if(!strcmp(inppblk.descr[i].name, "port")) {
+ inst->pszBindPort = (uchar*)es_str2cstr(pvals[i].val.d.estr, NULL);
+ } else if(!strcmp(inppblk.descr[i].name, "address")) {
+ inst->pszBindAddr = (uchar*)es_str2cstr(pvals[i].val.d.estr, NULL);
+ } else if(!strcmp(inppblk.descr[i].name, "timeout")) {
+ inst->timeout = (int) pvals[i].val.d.n;
+ } else if(!strcmp(inppblk.descr[i].name, "ruleset")) {
+ inst->pszBindRuleset = (uchar*)es_str2cstr(pvals[i].val.d.estr, NULL);
+ } else if(!strcmp(inppblk.descr[i].name, "name")) {
+ inst->pszInputName = (uchar*)es_str2cstr(pvals[i].val.d.estr, NULL);
+ } else if(!strcmp(inppblk.descr[i].name, "tls.authmode")) {
+ char* pszAuthMode = es_str2cstr(pvals[i].val.d.estr, NULL);
+ if(!strcasecmp(pszAuthMode, "fingerprint"))
+ inst->pNetOssl->authMode = OSSL_AUTH_CERTFINGERPRINT;
+ else if(!strcasecmp(pszAuthMode, "name"))
+ inst->pNetOssl->authMode = OSSL_AUTH_CERTNAME;
+ else if(!strcasecmp(pszAuthMode, "certvalid"))
+ inst->pNetOssl->authMode = OSSL_AUTH_CERTVALID;
+ else
+ inst->pNetOssl->authMode = OSSL_AUTH_CERTANON;
+ free(pszAuthMode);
+ } else if(!strcmp(inppblk.descr[i].name, "tls.cacert")) {
+ inst->pNetOssl->pszCAFile = (uchar*)es_str2cstr(pvals[i].val.d.estr, NULL);
+ fp = fopen((const char*)inst->pNetOssl->pszCAFile, "r");
+ if(fp == NULL) {
+ char errStr[1024];
+ rs_strerror_r(errno, errStr, sizeof(errStr));
+ LogError(0, RS_RET_NO_FILE_ACCESS,
+ "error: certificate file %s couldn't be accessed: %s\n",
+ inst->pNetOssl->pszCAFile, errStr);
+ } else {
+ fclose(fp);
+ }
+ } else if(!strcmp(inppblk.descr[i].name, "tls.mycert")) {
+ inst->pNetOssl->pszCertFile = (uchar*)es_str2cstr(pvals[i].val.d.estr, NULL);
+ fp = fopen((const char*)inst->pNetOssl->pszCertFile, "r");
+ if(fp == NULL) {
+ char errStr[1024];
+ rs_strerror_r(errno, errStr, sizeof(errStr));
+ LogError(0, RS_RET_NO_FILE_ACCESS,
+ "error: certificate file %s couldn't be accessed: %s\n",
+ inst->pNetOssl->pszCertFile, errStr);
+ } else {
+ fclose(fp);
+ }
+ } else if(!strcmp(inppblk.descr[i].name, "tls.myprivkey")) {
+ inst->pNetOssl->pszKeyFile = (uchar*)es_str2cstr(pvals[i].val.d.estr, NULL);
+ fp = fopen((const char*)inst->pNetOssl->pszKeyFile, "r");
+ if(fp == NULL) {
+ char errStr[1024];
+ rs_strerror_r(errno, errStr, sizeof(errStr));
+ LogError(0, RS_RET_NO_FILE_ACCESS,
+ "error: certificate file %s couldn't be accessed: %s\n",
+ inst->pNetOssl->pszKeyFile, errStr);
+ } else {
+ fclose(fp);
+ }
+ } else if(!strcmp(inppblk.descr[i].name, "tls.tlscfgcmd")) {
+ inst->tlscfgcmd = (uchar*)es_str2cstr(pvals[i].val.d.estr, NULL);
+ } else if(!strcmp(inppblk.descr[i].name, "tls.permittedpeer")) {
+ for(j = 0 ; j < pvals[i].val.d.ar->nmemb ; ++j) {
+ uchar *const peer = (uchar*) es_str2cstr(pvals[i].val.d.ar->arr[j], NULL);
+ CHKiRet(net.AddPermittedPeer(&inst->pPermPeersRoot, peer));
+ free(peer);
+ }
+ } else {
+ dbgprintf("imdtls: program error, non-handled "
+ "param '%s'\n", inppblk.descr[i].name);
+ }
+ }
+
+ /* check if no port is set. If not, we use DEFAULT of 4433 */
+ if(inst->pszBindPort == NULL) {
+ CHKmalloc(inst->pszBindPort = (uchar*)strdup("4433"));
+ }
+ inst->port = atoi((char*)inst->pszBindPort);
+ /* check if BinAddr is set. If not, we use DEFAULT of 0.0.0.0 */
+ if(inst->pszBindAddr == NULL) {
+ CHKmalloc(inst->pszBindAddr = (uchar*)strdup("0.0.0.0"));
+ }
+
+ // Assign Loaded Peers to Netossl
+ SetPermPeers(inst, inst->pPermPeersRoot);
+
+ /* all ok, ready to start up */
+ inst->bEnableLstn = -1;
+
+finalize_it:
+CODE_STD_FINALIZERnewInpInst
+ cnfparamvalsDestruct(pvals, &inppblk);
+ENDnewInpInst
+
+
+BEGINbeginCnfLoad
+CODESTARTbeginCnfLoad
+ loadModConf = pModConf;
+ pModConf->pConf = pConf;
+ pModConf->pszBindRuleset = NULL;
+ pModConf->drvrAuthMode = OSSL_AUTH_CERTANON;
+ /* init legacy config variables */
+ cs.pszBindRuleset = NULL;
+ENDbeginCnfLoad
+
+
+BEGINsetModCnf
+ struct cnfparamvals *pvals = NULL;
+ int i;
+CODESTARTsetModCnf
+ pvals = nvlstGetParams(lst, &modpblk, NULL);
+ if(pvals == NULL) {
+ LogError(0, RS_RET_MISSING_CNFPARAMS, "imdtls: error processing module "
+ "config parameters [module(...)]");
+ ABORT_FINALIZE(RS_RET_MISSING_CNFPARAMS);
+ }
+
+ if(Debug) {
+ dbgprintf("module (global) param blk for imdtls:\n");
+ cnfparamsPrint(&modpblk, pvals);
+ }
+
+ for(i = 0 ; i < modpblk.nParams ; ++i) {
+ if(!pvals[i].bUsed)
+ continue;
+ if(!strcmp(modpblk.descr[i].name, "tls.authmode")) {
+ char* pszAuthMode = es_str2cstr(pvals[i].val.d.estr, NULL);
+ if(!strcasecmp(pszAuthMode, "fingerprint"))
+ loadModConf->drvrAuthMode = OSSL_AUTH_CERTFINGERPRINT;
+ else if(!strcasecmp(pszAuthMode, "name"))
+ loadModConf->drvrAuthMode = OSSL_AUTH_CERTNAME;
+ else if(!strcasecmp(pszAuthMode, "certvalid"))
+ loadModConf->drvrAuthMode = OSSL_AUTH_CERTVALID;
+ else
+ loadModConf->drvrAuthMode = OSSL_AUTH_CERTANON;
+ free(pszAuthMode);
+ } else if(!strcmp(modpblk.descr[i].name, "ruleset")) {
+ loadModConf->pszBindRuleset = (uchar*)es_str2cstr(pvals[i].val.d.estr, NULL);
+ } else {
+ dbgprintf("imdtls: program error, non-handled "
+ "param '%s' in beginCnfLoad\n", modpblk.descr[i].name);
+ }
+ }
+finalize_it:
+ if(pvals != NULL)
+ cnfparamvalsDestruct(pvals, &modpblk);
+ENDsetModCnf
+
+
+BEGINendCnfLoad
+CODESTARTendCnfLoad
+ if(loadModConf->pszBindRuleset == NULL) {
+ if((cs.pszBindRuleset == NULL) || (cs.pszBindRuleset[0] == '\0')) {
+ loadModConf->pszBindRuleset = NULL;
+ } else {
+ CHKmalloc(loadModConf->pszBindRuleset = ustrdup(cs.pszBindRuleset));
+ }
+ } else {
+ if((cs.pszBindRuleset != NULL) && (cs.pszBindRuleset[0] != '\0')) {
+ LogError(0, RS_RET_DUP_PARAM, "imdtls: ruleset "
+ "set via legacy directive ignored");
+ }
+ }
+finalize_it:
+ free(cs.pszBindRuleset);
+ cs.pszBindRuleset = NULL;
+ loadModConf = NULL; /* done loading */
+ENDendCnfLoad
+
+
+BEGINcheckCnf
+ instanceConf_t *inst;
+CODESTARTcheckCnf
+ for(inst = pModConf->root ; inst != NULL ; inst = inst->next) {
+ if(inst->pszBindRuleset == NULL && pModConf->pszBindRuleset != NULL) {
+ CHKmalloc(inst->pszBindRuleset = ustrdup(pModConf->pszBindRuleset));
+ }
+ std_checkRuleset(pModConf, inst);
+ }
+finalize_it:
+ENDcheckCnf
+
+
+BEGINactivateCnfPrePrivDrop
+ instanceConf_t *inst;
+CODESTARTactivateCnfPrePrivDrop
+ runModConf = pModConf;
+ DBGPRINTF("imdtls: activate addListners for dtls\n");
+ for(inst = runModConf->root ; inst != NULL ; inst = inst->next) {
+ addListner(pModConf, inst);
+ }
+ENDactivateCnfPrePrivDrop
+
+BEGINactivateCnf
+CODESTARTactivateCnf
+ENDactivateCnf
+
+
+BEGINfreeCnf
+ instanceConf_t *inst, *del;
+ int i;
+CODESTARTfreeCnf
+ for(inst = pModConf->root ; inst != NULL ; ) {
+ free(inst->pszBindPort);
+ if (inst->pszBindAddr != NULL) {
+ free(inst->pszBindAddr);
+ }
+ free(inst->pszBindRuleset);
+ free(inst->pszInputName);
+
+ // --- CleanUP OpenSSL ressources
+ // Remove SSL CLients
+ if(inst->dtlsClients != NULL) {
+ for (i = 0; i < MAX_DTLS_CLIENTS; ++i) {
+ DTLScleanupSession(inst, i);
+ free(inst->dtlsClients[i]);
+ }
+ free(inst->dtlsClients);
+ }
+
+ // DeConstruct pNetOssl helper
+ net_ossl.Destruct(&inst->pNetOssl);
+
+ // ---
+
+ if(inst->pPermPeersRoot != NULL) {
+ net.DestructPermittedPeers(&inst->pPermPeersRoot);
+ }
+
+ if(inst->bEnableLstn) {
+ prop.Destruct(&inst->pInputName);
+ statsobj.Destruct(&(inst->stats));
+ }
+ del = inst;
+ inst = inst->next;
+ free(del);
+ }
+ free(pModConf->pszBindRuleset);
+ENDfreeCnf
+
+
+
+/* This function is called to gather input.
+ * In essence, it just starts the pool of workers. To save resources,
+ * we run one of the workers on our own thread -- otherwise that thread would
+ * just idle around and wait for the workers to finish.
+ */
+BEGINrunInput
+ instanceConf_t *inst;
+ pthread_attr_t wrkrThrdAttr;
+CODESTARTrunInput
+ pthread_attr_init(&wrkrThrdAttr);
+ pthread_attr_setstacksize(&wrkrThrdAttr, 4096*1024);
+
+ DBGPRINTF("imdtls: create dtls handling threads\n");
+ for(inst = runModConf->root ; inst != NULL ; inst = inst->next) {
+ if(inst->bEnableLstn) {
+ pthread_create(&inst->tid, &wrkrThrdAttr, startDtlsHandler, inst);
+ }
+ }
+ pthread_attr_destroy(&wrkrThrdAttr);
+
+ DBGPRINTF("imdtls: starting to wait for close condition\n");
+ while(glbl.GetGlobalInputTermState() == 0) {
+ srSleep(0, 400000);
+ }
+
+ DBGPRINTF("imdtls: received close signal, signaling instance threads...\n");
+ for (inst = runModConf->root; inst != NULL; inst = inst->next) {
+ pthread_kill(inst->tid, SIGTTIN);
+ DTLSCloseSocket(inst);
+ }
+
+ DBGPRINTF("imdtls: threads signaled, waiting for join...");
+ for (inst = runModConf->root ; inst != NULL ; inst = inst->next) {
+ pthread_join(inst->tid, NULL);
+ }
+
+ DBGPRINTF("imdtls: finished threads, stopping\n");
+ENDrunInput
+
+
+BEGINwillRun
+CODESTARTwillRun
+ /* we need to create the inputName property (only once during our lifetime) */
+ CHKiRet(prop.Construct(&pInputName));
+ CHKiRet(prop.SetString(pInputName, UCHAR_CONSTANT("imdtls"), sizeof("imdtls") - 1));
+ CHKiRet(prop.ConstructFinalize(pInputName));
+finalize_it:
+ENDwillRun
+
+/* This function is called by the framework after runInput() has been terminated. It
+ * shall free any resources and prepare the module for unload.
+ * CODEqueryEtryPt_STD_IMOD_QUERIES
+ */
+BEGINafterRun
+CODESTARTafterRun
+ /* TODO: do cleanup here ?! */
+ dbgprintf("imdtls: AfterRun\n");
+ if(pInputName != NULL)
+ prop.Destruct(&pInputName);
+ENDafterRun
+
+BEGINmodExit
+CODESTARTmodExit
+ DBGPRINTF("imdtls: modExit\n");
+ /* release objects we used */
+ objRelease(net_ossl, LM_NET_OSSL_FILENAME);
+ objRelease(statsobj, CORE_COMPONENT);
+ objRelease(ruleset, CORE_COMPONENT);
+ objRelease(datetime, CORE_COMPONENT);
+ objRelease(prop, CORE_COMPONENT);
+ objRelease(net, LM_NET_FILENAME);
+ objRelease(glbl, CORE_COMPONENT);
+ENDmodExit
+
+BEGINisCompatibleWithFeature
+CODESTARTisCompatibleWithFeature
+ if(eFeat == sFEATURENonCancelInputTermination)
+ iRet = RS_RET_OK;
+ENDisCompatibleWithFeature
+
+BEGINqueryEtryPt
+CODESTARTqueryEtryPt
+CODEqueryEtryPt_STD_IMOD_QUERIES
+CODEqueryEtryPt_STD_CONF2_QUERIES
+CODEqueryEtryPt_STD_CONF2_setModCnf_QUERIES
+CODEqueryEtryPt_STD_CONF2_PREPRIVDROP_QUERIES
+CODEqueryEtryPt_STD_CONF2_IMOD_QUERIES
+CODEqueryEtryPt_IsCompatibleWithFeature_IF_OMOD_QUERIES
+ENDqueryEtryPt
+
+BEGINmodInit()
+CODESTARTmodInit
+ *ipIFVersProvided = CURR_MOD_IF_VERSION; /* we only support the current interface specification */
+CODEmodInit_QueryRegCFSLineHdlr
+ DBGPRINTF("imdtls: modInit\n");
+ /* request objects we use */
+ CHKiRet(objUse(glbl, CORE_COMPONENT));
+ CHKiRet(objUse(prop, CORE_COMPONENT));
+ CHKiRet(objUse(net, LM_NET_FILENAME));
+ CHKiRet(objUse(net_ossl, LM_NET_OSSL_FILENAME));
+ CHKiRet(objUse(datetime, CORE_COMPONENT));
+ CHKiRet(objUse(ruleset, CORE_COMPONENT));
+ CHKiRet(objUse(statsobj, CORE_COMPONENT));
+ENDmodInit