summaryrefslogtreecommitdiff
path: root/src/modules/ssl/m_ssl.cpp
diff options
context:
space:
mode:
authorAdam <Adam@drink-coca-cola.info>2010-05-07 14:11:21 -0400
committerAdam <Adam@anope.org>2010-06-18 20:58:55 -0400
commit9439cac6b126254bc488c2375b9e7ff5fd4fce74 (patch)
treed0f6bba4de5b0a4131a6b91eb711b6bf1960def8 /src/modules/ssl/m_ssl.cpp
parenta93be9ff1c417d73015fd53a9ee778ea2a642328 (diff)
Added m_ssl.cpp which allows Anope to use SSL when connecting to its uplink
Diffstat (limited to 'src/modules/ssl/m_ssl.cpp')
-rw-r--r--src/modules/ssl/m_ssl.cpp150
1 files changed, 150 insertions, 0 deletions
diff --git a/src/modules/ssl/m_ssl.cpp b/src/modules/ssl/m_ssl.cpp
new file mode 100644
index 000000000..8036de6ce
--- /dev/null
+++ b/src/modules/ssl/m_ssl.cpp
@@ -0,0 +1,150 @@
+/* RequiredLibraries: ssl,crypt */
+
+#include "module.h"
+
+#include <openssl/bio.h>
+#include <openssl/ssl.h>
+#include <openssl/err.h>
+#include <openssl/crypto.h>
+#include <openssl/evp.h>
+
+#define CERTFILE "anope.cert"
+#define KEYFILE "anope.key"
+
+static SSL_CTX *ctx;
+
+class SSLSocket : public Socket
+{
+ private:
+ SSL *sslsock;
+
+ int RecvInternal(char *buf, size_t sz) const
+ {
+ return SSL_read(sslsock, buf, sz);
+ }
+
+ int SendInternal(const std::string &buf) const
+ {
+ return SSL_write(sslsock, buf.c_str(), buf.size());
+ }
+ public:
+ SSLSocket(const std::string &nTargetHost, int nPort, const std::string &nBindHost = "", bool nIPv6 = false) : Socket(nTargetHost, nPort, nBindHost, nIPv6)
+ {
+ sslsock = SSL_new(ctx);
+
+ if (!sslsock)
+ throw CoreException("Unable to initialize SSL socket");
+
+ SSL_set_connect_state(sslsock);
+ SSL_set_fd(sslsock, Sock);
+ SSL_connect(sslsock);
+
+ UplinkSock = this;
+ }
+
+ ~SSLSocket()
+ {
+ SSL_shutdown(sslsock);
+ SSL_free(sslsock);
+
+ UplinkSock = NULL;
+ }
+
+ bool Read(const std::string &buf)
+ {
+ process(buf);
+ return true;
+ }
+};
+
+class SSLModule : public Module
+{
+ public:
+ SSLModule(const std::string &modname, const std::string &creator) : Module(modname, creator)
+ {
+ this->SetAuthor("Anope");
+ this->SetVersion("$Id$");
+ this->SetType(SUPPORTED);
+
+ SSL_load_error_strings();
+ SSLeay_add_ssl_algorithms();
+
+ ctx = SSL_CTX_new(SSLv23_client_method());
+
+ if (!ctx)
+ {
+ throw ModuleException("Error initializing SSL CTX");
+ }
+
+ if (IsFile(CERTFILE))
+ {
+ if (!SSL_CTX_use_certificate_file(ctx, CERTFILE, SSL_FILETYPE_PEM))
+ {
+ SSL_CTX_free(ctx);
+ throw ModuleException("Error loading certificate");
+ }
+ }
+ else
+ {
+ Alog() << "m_ssl: No certificate file found";
+ }
+
+ if (IsFile(KEYFILE))
+ {
+ if (!SSL_CTX_use_PrivateKey_file(ctx, KEYFILE, SSL_FILETYPE_PEM))
+ {
+ SSL_CTX_free(ctx);
+ throw ModuleException("Error loading private key");
+ }
+ }
+ else
+ {
+ if (IsFile(CERTFILE))
+ {
+ SSL_CTX_free(ctx);
+ throw ModuleException("Error loading private key - file not found");
+ }
+ else
+ {
+ Alog() << "m_ssl: No private key found";
+ }
+ }
+
+ SSL_CTX_set_options(ctx, SSL_OP_NO_SSLv2);
+ SSL_CTX_set_options(ctx, SSL_OP_TLS_ROLLBACK_BUG | SSL_OP_ALL);
+// SSL_CTX_set_verify(ctx, SSL_VERIFY_PEER, always_accept_verify_cb);
+
+ ModuleManager::Attach(I_OnPreServerConnect, this);
+ }
+
+ ~SSLModule()
+ {
+ SSL_CTX_free(ctx);
+ }
+
+ EventReturn OnPreServerConnect()
+ {
+ int servernum = 1;
+ for (std::list<Uplink *>::iterator curr_uplink = Config.Uplinks.begin(); curr_uplink != Config.Uplinks.end(); ++curr_uplink, ++servernum)
+ {
+ uplink_server = *curr_uplink;
+
+ try
+ {
+ new SSLSocket(uplink_server->host, uplink_server->port, Config.LocalHost ? Config.LocalHost : "", uplink_server->ipv6);
+ }
+ catch (SocketException& ex)
+ {
+ Alog() << "Unable to connect to server" << servernum << " (" << uplink_server->host << ":" << uplink_server->port << "), " << ex.GetReason();
+ continue;
+ }
+
+ Alog() << "Connected to Server " << servernum << " (" << uplink_server->host << ":" << uplink_server->port << ")";
+ return EVENT_ALLOW;
+ }
+
+ return EVENT_STOP;
+ }
+};
+
+MODULE_INIT(SSLModule)