Mercurial > 510Connectbot
comparison src/ch/ethz/ssh2/channel/RemoteX11AcceptThread.java @ 307:071eccdff8ea ganymed
fix java formatting
author | Carl Byington <carl@five-ten-sg.com> |
---|---|
date | Wed, 30 Jul 2014 14:16:58 -0700 |
parents | 91a31873c42a |
children |
comparison
equal
deleted
inserted
replaced
305:d2b303406d63 | 307:071eccdff8ea |
---|---|
16 * RemoteX11AcceptThread. | 16 * RemoteX11AcceptThread. |
17 * | 17 * |
18 * @author Christian Plattner | 18 * @author Christian Plattner |
19 * @version $Id: RemoteX11AcceptThread.java 119 2014-04-12 20:30:58Z dkocher@sudo.ch $ | 19 * @version $Id: RemoteX11AcceptThread.java 119 2014-04-12 20:30:58Z dkocher@sudo.ch $ |
20 */ | 20 */ |
21 public class RemoteX11AcceptThread extends Thread | 21 public class RemoteX11AcceptThread extends Thread { |
22 { | 22 private static final Logger log = Logger.getLogger(RemoteX11AcceptThread.class); |
23 private static final Logger log = Logger.getLogger(RemoteX11AcceptThread.class); | 23 |
24 | 24 Channel c; |
25 Channel c; | 25 |
26 | 26 String remoteOriginatorAddress; |
27 String remoteOriginatorAddress; | 27 int remoteOriginatorPort; |
28 int remoteOriginatorPort; | 28 |
29 | 29 Socket s; |
30 Socket s; | 30 |
31 | 31 public RemoteX11AcceptThread(Channel c, String remoteOriginatorAddress, int remoteOriginatorPort) { |
32 public RemoteX11AcceptThread(Channel c, String remoteOriginatorAddress, int remoteOriginatorPort) | 32 this.c = c; |
33 { | 33 this.remoteOriginatorAddress = remoteOriginatorAddress; |
34 this.c = c; | 34 this.remoteOriginatorPort = remoteOriginatorPort; |
35 this.remoteOriginatorAddress = remoteOriginatorAddress; | 35 } |
36 this.remoteOriginatorPort = remoteOriginatorPort; | 36 |
37 } | 37 @Override |
38 | 38 public void run() { |
39 @Override | 39 try { |
40 public void run() | 40 /* Send Open Confirmation */ |
41 { | 41 c.cm.sendOpenConfirmation(c); |
42 try | 42 /* Read startup packet from client */ |
43 { | 43 OutputStream remote_os = c.getStdinStream(); |
44 /* Send Open Confirmation */ | 44 InputStream remote_is = c.getStdoutStream(); |
45 | 45 /* The following code is based on the protocol description given in: |
46 c.cm.sendOpenConfirmation(c); | 46 * Scheifler/Gettys, |
47 | 47 * X Windows System: Core and Extension Protocols: |
48 /* Read startup packet from client */ | 48 * X Version 11, Releases 6 and 6.1 ISBN 1-55558-148-X |
49 | 49 * (from the ETH library - after being here for almost ten |
50 OutputStream remote_os = c.getStdinStream(); | 50 * years one of the few books I borrowed... sad but true =) |
51 InputStream remote_is = c.getStdoutStream(); | 51 */ |
52 | 52 /* |
53 /* The following code is based on the protocol description given in: | 53 * Client startup: |
54 * Scheifler/Gettys, | 54 * |
55 * X Windows System: Core and Extension Protocols: | 55 * 1 0X42 MSB first/0x6c lSB first - byteorder |
56 * X Version 11, Releases 6 and 6.1 ISBN 1-55558-148-X | 56 * 1 - unused |
57 * (from the ETH library - after being here for almost ten | 57 * 2 card16 - protocol-major-version |
58 * years one of the few books I borrowed... sad but true =) | 58 * 2 card16 - protocol-minor-version |
59 */ | 59 * 2 n - lenght of authorization-protocol-name |
60 | 60 * 2 d - lenght of authorization-protocol-data |
61 /* | 61 * 2 - unused |
62 * Client startup: | 62 * string8 - authorization-protocol-name |
63 * | 63 * p - unused, p=pad(n) |
64 * 1 0X42 MSB first/0x6c lSB first - byteorder | 64 * string8 - authorization-protocol-data |
65 * 1 - unused | 65 * q - unused, q=pad(d) |
66 * 2 card16 - protocol-major-version | 66 * |
67 * 2 card16 - protocol-minor-version | 67 * pad(X) = (4 - (X mod 4)) mod 4 |
68 * 2 n - lenght of authorization-protocol-name | 68 * |
69 * 2 d - lenght of authorization-protocol-data | 69 * Server response: |
70 * 2 - unused | 70 * |
71 * string8 - authorization-protocol-name | 71 * 1 (0 failed, 2 authenticate, 1 success) |
72 * p - unused, p=pad(n) | 72 * ... |
73 * string8 - authorization-protocol-data | 73 * |
74 * q - unused, q=pad(d) | 74 */ |
75 * | 75 /* Later on we will simply forward the first 6 header bytes to the "real" X11 server */ |
76 * pad(X) = (4 - (X mod 4)) mod 4 | 76 byte[] header = new byte[6]; |
77 * | 77 |
78 * Server response: | 78 if (remote_is.read(header) != 6) |
79 * | 79 throw new IOException("Unexpected EOF on X11 startup!"); |
80 * 1 (0 failed, 2 authenticate, 1 success) | 80 |
81 * ... | 81 if ((header[0] != 0x42) && (header[0] != 0x6c)) // 0x42 MSB first, 0x6C LSB first |
82 * | 82 throw new IOException("Unknown endian format in X11 message!"); |
83 */ | 83 |
84 | 84 /* Yes, I came up with this myself - shall I file an application for a patent? =) */ |
85 /* Later on we will simply forward the first 6 header bytes to the "real" X11 server */ | 85 int idxMSB = (header[0] == 0x42) ? 0 : 1; |
86 | 86 /* Read authorization data header */ |
87 byte[] header = new byte[6]; | 87 byte[] auth_buff = new byte[6]; |
88 | 88 |
89 if (remote_is.read(header) != 6) | 89 if (remote_is.read(auth_buff) != 6) |
90 throw new IOException("Unexpected EOF on X11 startup!"); | 90 throw new IOException("Unexpected EOF on X11 startup!"); |
91 | 91 |
92 if ((header[0] != 0x42) && (header[0] != 0x6c)) // 0x42 MSB first, 0x6C LSB first | 92 int authProtocolNameLength = ((auth_buff[idxMSB] & 0xff) << 8) | (auth_buff[1 - idxMSB] & 0xff); |
93 throw new IOException("Unknown endian format in X11 message!"); | 93 int authProtocolDataLength = ((auth_buff[2 + idxMSB] & 0xff) << 8) | (auth_buff[3 - idxMSB] & 0xff); |
94 | 94 |
95 /* Yes, I came up with this myself - shall I file an application for a patent? =) */ | 95 if ((authProtocolNameLength > 256) || (authProtocolDataLength > 256)) |
96 | 96 throw new IOException("Buggy X11 authorization data"); |
97 int idxMSB = (header[0] == 0x42) ? 0 : 1; | 97 |
98 | 98 int authProtocolNamePadding = ((4 - (authProtocolNameLength % 4)) % 4); |
99 /* Read authorization data header */ | 99 int authProtocolDataPadding = ((4 - (authProtocolDataLength % 4)) % 4); |
100 | 100 byte[] authProtocolName = new byte[authProtocolNameLength]; |
101 byte[] auth_buff = new byte[6]; | 101 byte[] authProtocolData = new byte[authProtocolDataLength]; |
102 | 102 byte[] paddingBuffer = new byte[4]; |
103 if (remote_is.read(auth_buff) != 6) | 103 |
104 throw new IOException("Unexpected EOF on X11 startup!"); | 104 if (remote_is.read(authProtocolName) != authProtocolNameLength) |
105 | 105 throw new IOException("Unexpected EOF on X11 startup! (authProtocolName)"); |
106 int authProtocolNameLength = ((auth_buff[idxMSB] & 0xff) << 8) | (auth_buff[1 - idxMSB] & 0xff); | 106 |
107 int authProtocolDataLength = ((auth_buff[2 + idxMSB] & 0xff) << 8) | (auth_buff[3 - idxMSB] & 0xff); | 107 if (remote_is.read(paddingBuffer, 0, authProtocolNamePadding) != authProtocolNamePadding) |
108 | 108 throw new IOException("Unexpected EOF on X11 startup! (authProtocolNamePadding)"); |
109 if ((authProtocolNameLength > 256) || (authProtocolDataLength > 256)) | 109 |
110 throw new IOException("Buggy X11 authorization data"); | 110 if (remote_is.read(authProtocolData) != authProtocolDataLength) |
111 | 111 throw new IOException("Unexpected EOF on X11 startup! (authProtocolData)"); |
112 int authProtocolNamePadding = ((4 - (authProtocolNameLength % 4)) % 4); | 112 |
113 int authProtocolDataPadding = ((4 - (authProtocolDataLength % 4)) % 4); | 113 if (remote_is.read(paddingBuffer, 0, authProtocolDataPadding) != authProtocolDataPadding) |
114 | 114 throw new IOException("Unexpected EOF on X11 startup! (authProtocolDataPadding)"); |
115 byte[] authProtocolName = new byte[authProtocolNameLength]; | 115 |
116 byte[] authProtocolData = new byte[authProtocolDataLength]; | 116 if ("MIT-MAGIC-COOKIE-1".equals(StringEncoder.GetString(authProtocolName)) == false) |
117 | 117 throw new IOException("Unknown X11 authorization protocol!"); |
118 byte[] paddingBuffer = new byte[4]; | 118 |
119 | 119 if (authProtocolDataLength != 16) |
120 if (remote_is.read(authProtocolName) != authProtocolNameLength) | 120 throw new IOException("Wrong data length for X11 authorization data!"); |
121 throw new IOException("Unexpected EOF on X11 startup! (authProtocolName)"); | 121 |
122 | 122 StringBuilder tmp = new StringBuilder(32); |
123 if (remote_is.read(paddingBuffer, 0, authProtocolNamePadding) != authProtocolNamePadding) | 123 |
124 throw new IOException("Unexpected EOF on X11 startup! (authProtocolNamePadding)"); | 124 for (int i = 0; i < authProtocolData.length; i++) { |
125 | 125 String digit2 = Integer.toHexString(authProtocolData[i] & 0xff); |
126 if (remote_is.read(authProtocolData) != authProtocolDataLength) | 126 tmp.append((digit2.length() == 2) ? digit2 : "0" + digit2); |
127 throw new IOException("Unexpected EOF on X11 startup! (authProtocolData)"); | 127 } |
128 | 128 |
129 if (remote_is.read(paddingBuffer, 0, authProtocolDataPadding) != authProtocolDataPadding) | 129 String hexEncodedFakeCookie = tmp.toString(); |
130 throw new IOException("Unexpected EOF on X11 startup! (authProtocolDataPadding)"); | 130 |
131 | 131 /* Order is very important here - it may be that a certain x11 forwarding |
132 if ("MIT-MAGIC-COOKIE-1".equals(StringEncoder.GetString(authProtocolName)) == false) | 132 * gets disabled right in the moment when we check and register our connection |
133 throw new IOException("Unknown X11 authorization protocol!"); | 133 * */ |
134 | 134 |
135 if (authProtocolDataLength != 16) | 135 synchronized (c) { |
136 throw new IOException("Wrong data length for X11 authorization data!"); | 136 /* Please read the comment in Channel.java */ |
137 | 137 c.hexX11FakeCookie = hexEncodedFakeCookie; |
138 StringBuilder tmp = new StringBuilder(32); | 138 } |
139 for (int i = 0; i < authProtocolData.length; i++) | 139 |
140 { | 140 /* Now check our fake cookie directory to see if we produced this cookie */ |
141 String digit2 = Integer.toHexString(authProtocolData[i] & 0xff); | 141 X11ServerData sd = c.cm.checkX11Cookie(hexEncodedFakeCookie); |
142 tmp.append((digit2.length() == 2) ? digit2 : "0" + digit2); | 142 |
143 } | 143 if (sd == null) |
144 String hexEncodedFakeCookie = tmp.toString(); | 144 throw new IOException("Invalid X11 cookie received."); |
145 | 145 |
146 /* Order is very important here - it may be that a certain x11 forwarding | 146 /* If the session which corresponds to this cookie is closed then we will |
147 * gets disabled right in the moment when we check and register our connection | 147 * detect this: the session's close code will close all channels |
148 * */ | 148 * with the session's assigned x11 fake cookie. |
149 | 149 */ |
150 synchronized (c) | 150 s = new Socket(sd.hostname, sd.port); |
151 { | 151 OutputStream x11_os = s.getOutputStream(); |
152 /* Please read the comment in Channel.java */ | 152 InputStream x11_is = s.getInputStream(); |
153 c.hexX11FakeCookie = hexEncodedFakeCookie; | 153 /* Now we are sending the startup packet to the real X11 server */ |
154 } | 154 x11_os.write(header); |
155 | 155 |
156 /* Now check our fake cookie directory to see if we produced this cookie */ | 156 if (sd.x11_magic_cookie == null) { |
157 | 157 byte[] emptyAuthData = new byte[6]; |
158 X11ServerData sd = c.cm.checkX11Cookie(hexEncodedFakeCookie); | 158 /* empty auth data, hopefully you are connecting to localhost =) */ |
159 | 159 x11_os.write(emptyAuthData); |
160 if (sd == null) | 160 } |
161 throw new IOException("Invalid X11 cookie received."); | 161 else { |
162 | 162 if (sd.x11_magic_cookie.length != 16) |
163 /* If the session which corresponds to this cookie is closed then we will | 163 throw new IOException("The real X11 cookie has an invalid length!"); |
164 * detect this: the session's close code will close all channels | 164 |
165 * with the session's assigned x11 fake cookie. | 165 /* send X11 cookie specified by client */ |
166 */ | 166 x11_os.write(auth_buff); |
167 | 167 x11_os.write(authProtocolName); /* re-use */ |
168 s = new Socket(sd.hostname, sd.port); | 168 x11_os.write(paddingBuffer, 0, authProtocolNamePadding); |
169 | 169 x11_os.write(sd.x11_magic_cookie); |
170 OutputStream x11_os = s.getOutputStream(); | 170 x11_os.write(paddingBuffer, 0, authProtocolDataPadding); |
171 InputStream x11_is = s.getInputStream(); | 171 } |
172 | 172 |
173 /* Now we are sending the startup packet to the real X11 server */ | 173 x11_os.flush(); |
174 | 174 /* Start forwarding traffic */ |
175 x11_os.write(header); | 175 StreamForwarder r2l = new StreamForwarder(c, null, null, remote_is, x11_os, "RemoteToX11"); |
176 | 176 StreamForwarder l2r = new StreamForwarder(c, null, null, x11_is, remote_os, "X11ToRemote"); |
177 if (sd.x11_magic_cookie == null) | 177 /* No need to start two threads, one can be executed in the current thread */ |
178 { | 178 r2l.setDaemon(true); |
179 byte[] emptyAuthData = new byte[6]; | 179 r2l.start(); |
180 /* empty auth data, hopefully you are connecting to localhost =) */ | 180 l2r.run(); |
181 x11_os.write(emptyAuthData); | 181 |
182 } | 182 while (r2l.isAlive()) { |
183 else | 183 try { |
184 { | 184 r2l.join(); |
185 if (sd.x11_magic_cookie.length != 16) | 185 } |
186 throw new IOException("The real X11 cookie has an invalid length!"); | 186 catch (InterruptedException ignored) { |
187 | 187 } |
188 /* send X11 cookie specified by client */ | 188 } |
189 x11_os.write(auth_buff); | 189 |
190 x11_os.write(authProtocolName); /* re-use */ | 190 /* If the channel is already closed, then this is a no-op */ |
191 x11_os.write(paddingBuffer, 0, authProtocolNamePadding); | 191 c.cm.closeChannel(c, "EOF on both X11 streams reached.", true); |
192 x11_os.write(sd.x11_magic_cookie); | 192 s.close(); |
193 x11_os.write(paddingBuffer, 0, authProtocolDataPadding); | 193 } |
194 } | 194 catch (IOException e) { |
195 | 195 log.warning("IOException in X11 proxy code: " + e.getMessage()); |
196 x11_os.flush(); | 196 |
197 | 197 try { |
198 /* Start forwarding traffic */ | 198 c.cm.closeChannel(c, e, true); |
199 | 199 } |
200 StreamForwarder r2l = new StreamForwarder(c, null, null, remote_is, x11_os, "RemoteToX11"); | 200 catch (IOException ignored) { |
201 StreamForwarder l2r = new StreamForwarder(c, null, null, x11_is, remote_os, "X11ToRemote"); | 201 } |
202 | 202 |
203 /* No need to start two threads, one can be executed in the current thread */ | 203 try { |
204 | 204 if (s != null) |
205 r2l.setDaemon(true); | 205 s.close(); |
206 r2l.start(); | 206 } |
207 l2r.run(); | 207 catch (IOException ignored) { |
208 | 208 } |
209 while (r2l.isAlive()) | 209 } |
210 { | 210 } |
211 try | |
212 { | |
213 r2l.join(); | |
214 } | |
215 catch (InterruptedException ignored) | |
216 { | |
217 } | |
218 } | |
219 | |
220 /* If the channel is already closed, then this is a no-op */ | |
221 | |
222 c.cm.closeChannel(c, "EOF on both X11 streams reached.", true); | |
223 s.close(); | |
224 } | |
225 catch (IOException e) | |
226 { | |
227 log.warning("IOException in X11 proxy code: " + e.getMessage()); | |
228 | |
229 try | |
230 { | |
231 c.cm.closeChannel(c, e, true); | |
232 } | |
233 catch (IOException ignored) | |
234 { | |
235 } | |
236 try | |
237 { | |
238 if (s != null) | |
239 s.close(); | |
240 } | |
241 catch (IOException ignored) | |
242 { | |
243 } | |
244 } | |
245 } | |
246 } | 211 } |