xref: /freebsd/crypto/openssh/channels.h (revision 2574974648c68c738aec3ff96644d888d7913a37)
1 /* $OpenBSD: channels.h,v 1.164 2026/03/05 05:40:35 djm Exp $ */
2 
3 /*
4  * Author: Tatu Ylonen <ylo@cs.hut.fi>
5  * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
6  *                    All rights reserved
7  *
8  * As far as I am concerned, the code I have written for this software
9  * can be used freely for any purpose.  Any derived versions of this
10  * software must be clearly marked as such, and if the derived work is
11  * incompatible with the protocol description in the RFC file, it must be
12  * called by a name other than "ssh" or "Secure Shell".
13  */
14 /*
15  * Copyright (c) 1999, 2000, 2001, 2002 Markus Friedl.  All rights reserved.
16  *
17  * Redistribution and use in source and binary forms, with or without
18  * modification, are permitted provided that the following conditions
19  * are met:
20  * 1. Redistributions of source code must retain the above copyright
21  *    notice, this list of conditions and the following disclaimer.
22  * 2. Redistributions in binary form must reproduce the above copyright
23  *    notice, this list of conditions and the following disclaimer in the
24  *    documentation and/or other materials provided with the distribution.
25  *
26  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
27  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
28  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
29  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
30  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
31  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
32  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
33  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
34  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36  */
37 
38 #ifndef CHANNEL_H
39 #define CHANNEL_H
40 
41 /* Definitions for channel types. */
42 #define SSH_CHANNEL_X11_LISTENER	1	/* Listening for inet X11 conn. */
43 #define SSH_CHANNEL_PORT_LISTENER	2	/* Listening on a port. */
44 #define SSH_CHANNEL_OPENING		3	/* waiting for confirmation */
45 #define SSH_CHANNEL_OPEN		4	/* normal open two-way channel */
46 #define SSH_CHANNEL_CLOSED		5	/* waiting for close confirmation */
47 #define SSH_CHANNEL_AUTH_SOCKET		6	/* authentication socket */
48 #define SSH_CHANNEL_X11_OPEN		7	/* reading first X11 packet */
49 #define SSH_CHANNEL_LARVAL		10	/* larval session */
50 #define SSH_CHANNEL_RPORT_LISTENER	11	/* Listening to a R-style port  */
51 #define SSH_CHANNEL_CONNECTING		12
52 #define SSH_CHANNEL_DYNAMIC		13
53 #define SSH_CHANNEL_ZOMBIE		14	/* Almost dead. */
54 #define SSH_CHANNEL_MUX_LISTENER	15	/* Listener for mux conn. */
55 #define SSH_CHANNEL_MUX_CLIENT		16	/* Conn. to mux client */
56 #define SSH_CHANNEL_ABANDONED		17	/* Abandoned session, eg mux */
57 #define SSH_CHANNEL_UNIX_LISTENER	18	/* Listening on a domain socket. */
58 #define SSH_CHANNEL_RUNIX_LISTENER	19	/* Listening to a R-style domain socket. */
59 #define SSH_CHANNEL_MUX_PROXY		20	/* proxy channel for mux-client */
60 #define SSH_CHANNEL_RDYNAMIC_OPEN	21	/* reverse SOCKS, parsing request */
61 #define SSH_CHANNEL_RDYNAMIC_FINISH	22	/* reverse SOCKS, finishing connect */
62 #define SSH_CHANNEL_MAX_TYPE		23
63 
64 #define CHANNEL_CANCEL_PORT_STATIC	-1
65 
66 /* nonblocking flags for channel_new */
67 #define CHANNEL_NONBLOCK_LEAVE	0 /* don't modify non-blocking state */
68 #define CHANNEL_NONBLOCK_SET	1 /* set non-blocking state */
69 #define CHANNEL_NONBLOCK_STDIO	2 /* set non-blocking and restore on close */
70 
71 /* c->restore_block mask flags */
72 #define CHANNEL_RESTORE_RFD	0x01
73 #define CHANNEL_RESTORE_WFD	0x02
74 #define CHANNEL_RESTORE_EFD	0x04
75 
76 /* TCP forwarding */
77 #define FORWARD_DENY		0
78 #define FORWARD_REMOTE		(1)
79 #define FORWARD_LOCAL		(1<<1)
80 #define FORWARD_ALLOW		(FORWARD_REMOTE|FORWARD_LOCAL)
81 
82 #define FORWARD_ADM		0x100
83 #define FORWARD_USER		0x101
84 
85 /* default pattern-lists used to classify channel types as bulk */
86 #define CHANNEL_BULK_TTY	""
87 #define CHANNEL_BULK_NOTTY	"direct-*,forwarded-*,tun-*,x11-*,session*"
88 
89 struct ssh;
90 struct Channel;
91 typedef struct Channel Channel;
92 
93 typedef void channel_open_fn(struct ssh *, int, int, void *);
94 typedef void channel_callback_fn(struct ssh *, int, int, void *);
95 typedef int channel_infilter_fn(struct ssh *, struct Channel *, char *, int);
96 typedef void channel_filter_cleanup_fn(struct ssh *, int, void *);
97 typedef u_char *channel_outfilter_fn(struct ssh *, struct Channel *,
98     u_char **, size_t *);
99 
100 /* Channel success/failure callbacks */
101 typedef void channel_confirm_cb(struct ssh *, int, struct Channel *, void *);
102 typedef void channel_confirm_abandon_cb(struct ssh *, struct Channel *, void *);
103 struct channel_confirm {
104 	TAILQ_ENTRY(channel_confirm) entry;
105 	channel_confirm_cb *cb;
106 	channel_confirm_abandon_cb *abandon_cb;
107 	void *ctx;
108 };
109 TAILQ_HEAD(channel_confirms, channel_confirm);
110 
111 /* Context for non-blocking connects */
112 struct channel_connect {
113 	char *host;
114 	int port;
115 	struct addrinfo *ai, *aitop;
116 };
117 
118 /* Callbacks for mux channels back into client-specific code */
119 typedef int mux_callback_fn(struct ssh *, struct Channel *);
120 
121 /*
122  * NB. channel IDs on the wire and in c->remote_id are uint32, but local
123  * channel IDs (e.g. c->self) only ever use the int32 subset of this range,
124  * because we use local channel ID -1 for housekeeping. Remote channels have
125  * a dedicated "have_remote_id" flag to indicate their validity.
126  */
127 
128 struct Channel {
129 	int     type;		/* channel type/state */
130 
131 	int     self;		/* my own channel identifier */
132 	uint32_t remote_id;	/* channel identifier for remote peer */
133 	int	have_remote_id;	/* non-zero if remote_id is valid */
134 
135 	u_int   istate;		/* input from channel (state of receive half) */
136 	u_int   ostate;		/* output to channel  (state of transmit half) */
137 	int     flags;		/* close sent/rcvd */
138 	int     rfd;		/* read fd */
139 	int     wfd;		/* write fd */
140 	int     efd;		/* extended fd */
141 	int     sock;		/* sock fd */
142 	u_int	io_want;	/* bitmask of SSH_CHAN_IO_* */
143 	u_int	io_ready;	/* bitmask of SSH_CHAN_IO_* */
144 	int	pfds[4];	/* pollfd entries for rfd/wfd/efd/sock */
145 	int     ctl_chan;	/* control channel (multiplexed connections) */
146 	uint32_t ctl_child_id;	/* child session for mux controllers */
147 	int	have_ctl_child_id;/* non-zero if ctl_child_id is valid */
148 	int     remote_has_tty;	/* remote side has a tty */
149 	int     isatty;		/* rfd is a tty */
150 #ifdef _AIX
151 	int     wfd_isatty;	/* wfd is a tty */
152 #endif
153 	int	client_tty;	/* (client) TTY has been requested */
154 	int     force_drain;	/* force close on iEOF */
155 	time_t	notbefore;	/* Pause IO until deadline (time_t) */
156 	int     delayed;	/* post-IO handlers for newly created
157 				 * channels are delayed until the first call
158 				 * to a matching pre-IO handler.
159 				 * this way post-IO handlers are not
160 				 * accidentally called if a FD gets reused */
161 	int	restore_block;	/* fd mask to restore blocking status */
162 	int	restore_flags[3];/* flags to restore */
163 	struct sshbuf *input;	/* data read from socket, to be sent over
164 				 * encrypted connection */
165 	struct sshbuf *output;	/* data received over encrypted connection for
166 				 * send on socket */
167 	struct sshbuf *extended;
168 
169 	char    *path;
170 		/* path for unix domain sockets, or host name for forwards */
171 	int     listening_port;	/* port being listened for forwards */
172 	char   *listening_addr;	/* addr being listened for forwards */
173 	int     host_port;	/* remote port to connect for forwards */
174 	char   *remote_name;	/* remote hostname */
175 
176 	u_int	remote_window;
177 	u_int	remote_maxpacket;
178 	u_int	local_window;
179 	u_int	local_window_exceeded;
180 	u_int	local_window_max;
181 	u_int	local_consumed;
182 	u_int	local_maxpacket;
183 	int     extended_usage;
184 	int	agent_new;	/* For agent listeners, use RFC XXX reqests */
185 	int	single_connection;
186 
187 	char   *ctype;		/* const type - NB. not freed on channel_free */
188 	char   *xctype;		/* extended type */
189 	int	bulk;		/* channel is non-interactive */
190 
191 	/* callback */
192 	channel_open_fn		*open_confirm;
193 	void			*open_confirm_ctx;
194 	channel_callback_fn	*detach_user;
195 	int			detach_close;
196 	struct channel_confirms	status_confirms;
197 
198 	/* filter */
199 	channel_infilter_fn	*input_filter;
200 	channel_outfilter_fn	*output_filter;
201 	void			*filter_ctx;
202 	channel_filter_cleanup_fn *filter_cleanup;
203 
204 	/* keep boundaries */
205 	int			datagram;
206 
207 	/* non-blocking connect */
208 	/* XXX make this a pointer so the structure can be opaque */
209 	struct channel_connect	connect_ctx;
210 
211 	/* multiplexing protocol hook, called for each packet received */
212 	mux_callback_fn		*mux_rcb;
213 	void			*mux_ctx;
214 	int			mux_pause;
215 	int			mux_downstream_id;
216 
217 	/* Inactivity timeouts */
218 
219 	/* Last traffic seen for OPEN channels */
220 	time_t			lastused;
221 	/* Inactivity timeout deadline in seconds (0 = no timeout) */
222 	int			inactive_deadline;
223 };
224 
225 #define CHAN_EXTENDED_IGNORE		0
226 #define CHAN_EXTENDED_READ		1
227 #define CHAN_EXTENDED_WRITE		2
228 
229 /* default window/packet sizes for tcp/x11-fwd-channel */
230 #define CHAN_SES_PACKET_DEFAULT	(32*1024)
231 #define CHAN_SES_WINDOW_DEFAULT	(64*CHAN_SES_PACKET_DEFAULT)
232 #define CHAN_TCP_PACKET_DEFAULT	(32*1024)
233 #define CHAN_TCP_WINDOW_DEFAULT	(64*CHAN_TCP_PACKET_DEFAULT)
234 #define CHAN_X11_PACKET_DEFAULT	(16*1024)
235 #define CHAN_X11_WINDOW_DEFAULT	(4*CHAN_X11_PACKET_DEFAULT)
236 
237 /* possible input states */
238 #define CHAN_INPUT_OPEN			0
239 #define CHAN_INPUT_WAIT_DRAIN		1
240 #define CHAN_INPUT_WAIT_OCLOSE		2
241 #define CHAN_INPUT_CLOSED		3
242 
243 /* possible output states */
244 #define CHAN_OUTPUT_OPEN		0
245 #define CHAN_OUTPUT_WAIT_DRAIN		1
246 #define CHAN_OUTPUT_WAIT_IEOF		2
247 #define CHAN_OUTPUT_CLOSED		3
248 
249 #define CHAN_CLOSE_SENT			0x01
250 #define CHAN_CLOSE_RCVD			0x02
251 #define CHAN_EOF_SENT			0x04
252 #define CHAN_EOF_RCVD			0x08
253 #define CHAN_LOCAL			0x10
254 
255 /* file descriptor events */
256 #define SSH_CHAN_IO_RFD			0x01
257 #define SSH_CHAN_IO_WFD			0x02
258 #define SSH_CHAN_IO_EFD_R		0x04
259 #define SSH_CHAN_IO_EFD_W		0x08
260 #define SSH_CHAN_IO_EFD			(SSH_CHAN_IO_EFD_R|SSH_CHAN_IO_EFD_W)
261 #define SSH_CHAN_IO_SOCK_R		0x10
262 #define SSH_CHAN_IO_SOCK_W		0x20
263 #define SSH_CHAN_IO_SOCK		(SSH_CHAN_IO_SOCK_R|SSH_CHAN_IO_SOCK_W)
264 
265 /* Read buffer size */
266 #define CHAN_RBUF	(16*1024)
267 
268 /* Maximum size for direct reads to buffers */
269 #define CHANNEL_MAX_READ	CHAN_SES_PACKET_DEFAULT
270 
271 /* Maximum channel input buffer size */
272 #define CHAN_INPUT_MAX	(16*1024*1024)
273 
274 /* Hard limit on number of channels */
275 #define CHANNELS_MAX_CHANNELS	(16*1024)
276 
277 /* check whether 'efd' is still in use */
278 #define CHANNEL_EFD_INPUT_ACTIVE(c) \
279 	(c->extended_usage == CHAN_EXTENDED_READ && \
280 	(c->efd != -1 || \
281 	sshbuf_len(c->extended) > 0))
282 #define CHANNEL_EFD_OUTPUT_ACTIVE(c) \
283 	(c->extended_usage == CHAN_EXTENDED_WRITE && \
284 	c->efd != -1 && (!(c->flags & (CHAN_EOF_RCVD|CHAN_CLOSE_RCVD)) || \
285 	sshbuf_len(c->extended) > 0))
286 
287 /* Add/remove channel management structures to/from SSH transport instance */
288 void channel_init_channels(struct ssh *ssh);
289 void channel_free_channels(struct ssh *ssh);
290 
291 /* channel management */
292 
293 Channel	*channel_by_id(struct ssh *, int);
294 Channel	*channel_by_remote_id(struct ssh *, u_int);
295 Channel	*channel_lookup(struct ssh *, int);
296 Channel *channel_new(struct ssh *, char *, int, int, int, int,
297 	    u_int, u_int, int, const char *, int);
298 void	 channel_set_fds(struct ssh *, int, int, int, int, int,
299 	    int, int, u_int);
300 void	 channel_set_tty(struct ssh *, Channel *);
301 void	 channel_free(struct ssh *, Channel *);
302 void	 channel_free_all(struct ssh *);
303 void	 channel_stop_listening(struct ssh *);
304 void	 channel_force_close(struct ssh *, Channel *, int);
305 void	 channel_set_xtype(struct ssh *, int, const char *);
306 
307 void	 channel_send_open(struct ssh *, int);
308 void	 channel_request_start(struct ssh *, int, const char *, int);
309 void	 channel_register_cleanup(struct ssh *, int,
310 	    channel_callback_fn *, int);
311 void	 channel_register_open_confirm(struct ssh *, int,
312 	    channel_open_fn *, void *);
313 void	 channel_register_filter(struct ssh *, int, channel_infilter_fn *,
314 	    channel_outfilter_fn *, channel_filter_cleanup_fn *, void *);
315 void	 channel_register_status_confirm(struct ssh *, int,
316 	    channel_confirm_cb *, channel_confirm_abandon_cb *, void *);
317 void	 channel_cancel_cleanup(struct ssh *, int);
318 int	 channel_close_fd(struct ssh *, Channel *, int *);
319 void	 channel_send_window_changes(struct ssh *);
320 int	 channel_has_bulk(struct ssh *);
321 
322 /* channel inactivity timeouts */
323 void channel_add_timeout(struct ssh *, const char *, int);
324 void channel_clear_timeouts(struct ssh *);
325 
326 /* mux proxy support */
327 
328 int	 channel_proxy_downstream(struct ssh *, Channel *mc);
329 int	 channel_proxy_upstream(Channel *, int, uint32_t, struct ssh *);
330 
331 /* protocol handler */
332 
333 int	 channel_input_data(int, uint32_t, struct ssh *);
334 int	 channel_input_extended_data(int, uint32_t, struct ssh *);
335 int	 channel_input_ieof(int, uint32_t, struct ssh *);
336 int	 channel_input_oclose(int, uint32_t, struct ssh *);
337 int	 channel_input_open_confirmation(int, uint32_t, struct ssh *);
338 int	 channel_input_open_failure(int, uint32_t, struct ssh *);
339 int	 channel_input_window_adjust(int, uint32_t, struct ssh *);
340 int	 channel_input_status_confirm(int, uint32_t, struct ssh *);
341 
342 /* file descriptor handling (read/write) */
343 struct pollfd;
344 struct timespec;
345 
346 void	 channel_prepare_poll(struct ssh *, struct pollfd **,
347 	    u_int *, u_int *, u_int, struct timespec *);
348 void	 channel_after_poll(struct ssh *, struct pollfd *, u_int);
349 int	 channel_output_poll(struct ssh *);
350 
351 int      channel_not_very_much_buffered_data(struct ssh *);
352 void     channel_close_all(struct ssh *);
353 int      channel_still_open(struct ssh *);
354 int	 channel_tty_open(struct ssh *);
355 const char *channel_format_extended_usage(const Channel *);
356 char	*channel_open_message(struct ssh *);
357 void	 channel_report_open(struct ssh *, int);
358 int	 channel_find_open(struct ssh *);
359 
360 /* tcp forwarding */
361 struct Forward;
362 struct ForwardOptions;
363 void	 channel_set_af(struct ssh *, int af);
364 void     channel_permit_all(struct ssh *, int);
365 void	 channel_add_permission(struct ssh *, int, int, char *, int);
366 void	 channel_clear_permission(struct ssh *, int, int);
367 void	 channel_disable_admin(struct ssh *, int);
368 void	 channel_update_permission(struct ssh *, int, int);
369 Channel	*channel_connect_to_port(struct ssh *, const char *, u_short,
370 	    char *, char *, int *, const char **);
371 Channel *channel_connect_to_path(struct ssh *, const char *, char *, char *);
372 Channel	*channel_connect_stdio_fwd(struct ssh *, const char*,
373 	    int, int, int, int);
374 Channel	*channel_connect_by_listen_address(struct ssh *, const char *,
375 	    u_short, char *, char *);
376 Channel	*channel_connect_by_listen_path(struct ssh *, const char *,
377 	    char *, char *);
378 int	 channel_request_remote_forwarding(struct ssh *, struct Forward *);
379 int	 channel_setup_local_fwd_listener(struct ssh *, struct Forward *,
380 	    struct ForwardOptions *);
381 int	 channel_request_rforward_cancel(struct ssh *, struct Forward *);
382 int	 channel_setup_remote_fwd_listener(struct ssh *, struct Forward *,
383 	    int *, struct ForwardOptions *);
384 int	 channel_cancel_rport_listener(struct ssh *, struct Forward *);
385 int	 channel_cancel_lport_listener(struct ssh *, struct Forward *,
386 	    int, struct ForwardOptions *);
387 int	 permitopen_port(const char *);
388 
389 /* x11 forwarding */
390 
391 void	 channel_set_x11_refuse_time(struct ssh *, time_t);
392 int	 x11_connect_display(struct ssh *);
393 int	 x11_create_display_inet(struct ssh *, int, int, int, u_int *, int **);
394 void	 x11_request_forwarding_with_spoofing(struct ssh *, int,
395 	    const char *, const char *, const char *, int);
396 int      x11_channel_used_recently(struct ssh *ssh);
397 
398 /* channel close */
399 
400 int	 chan_is_dead(struct ssh *, Channel *, int);
401 void	 chan_mark_dead(struct ssh *, Channel *);
402 
403 /* agent forwarding */
404 void	 client_channel_reqest_agent_forwarding(struct ssh *, int);
405 
406 /* channel events */
407 
408 void	 chan_rcvd_oclose(struct ssh *, Channel *);
409 void	 chan_rcvd_eow(struct ssh *, Channel *);
410 void	 chan_read_failed(struct ssh *, Channel *);
411 void	 chan_ibuf_empty(struct ssh *, Channel *);
412 void	 chan_rcvd_ieof(struct ssh *, Channel *);
413 void	 chan_write_failed(struct ssh *, Channel *);
414 void	 chan_obuf_empty(struct ssh *, Channel *);
415 
416 #endif
417