| OLD | NEW |
| 1 // Copyright 2016 The Chromium Authors. All rights reserved. | 1 // Copyright 2016 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "remoting/host/security_key/gnubby_auth_handler.h" | 5 #include "remoting/host/security_key/security_key_auth_handler.h" |
| 6 | 6 |
| 7 #include <cstdint> | 7 #include <cstdint> |
| 8 #include <map> | 8 #include <map> |
| 9 #include <memory> | 9 #include <memory> |
| 10 #include <string> | 10 #include <string> |
| 11 | 11 |
| 12 #include "base/bind.h" | 12 #include "base/bind.h" |
| 13 #include "base/location.h" | 13 #include "base/location.h" |
| 14 #include "base/logging.h" | 14 #include "base/logging.h" |
| 15 #include "base/memory/weak_ptr.h" | 15 #include "base/memory/weak_ptr.h" |
| 16 #include "base/strings/stringprintf.h" | 16 #include "base/strings/stringprintf.h" |
| 17 #include "base/strings/utf_string_conversions.h" | 17 #include "base/strings/utf_string_conversions.h" |
| 18 #include "base/threading/thread_checker.h" | 18 #include "base/threading/thread_checker.h" |
| 19 #include "base/threading/thread_task_runner_handle.h" | 19 #include "base/threading/thread_task_runner_handle.h" |
| 20 #include "base/time/time.h" | 20 #include "base/time/time.h" |
| 21 #include "base/timer/timer.h" | 21 #include "base/timer/timer.h" |
| 22 #include "base/win/win_util.h" | 22 #include "base/win/win_util.h" |
| 23 #include "ipc/ipc_channel.h" | 23 #include "ipc/ipc_channel.h" |
| 24 #include "ipc/ipc_listener.h" | 24 #include "ipc/ipc_listener.h" |
| 25 #include "ipc/ipc_message.h" | 25 #include "ipc/ipc_message.h" |
| 26 #include "ipc/ipc_message_macros.h" | 26 #include "ipc/ipc_message_macros.h" |
| 27 #include "remoting/base/logging.h" | 27 #include "remoting/base/logging.h" |
| 28 #include "remoting/host/chromoting_messages.h" | 28 #include "remoting/host/chromoting_messages.h" |
| 29 #include "remoting/host/client_session_details.h" | 29 #include "remoting/host/client_session_details.h" |
| 30 #include "remoting/host/ipc_util.h" | 30 #include "remoting/host/ipc_util.h" |
| 31 #include "remoting/host/security_key/remote_security_key_ipc_constants.h" | 31 #include "remoting/host/security_key/security_key_ipc_constants.h" |
| 32 #include "remoting/host/security_key/remote_security_key_ipc_server.h" | 32 #include "remoting/host/security_key/security_key_ipc_server.h" |
| 33 | 33 |
| 34 namespace { | 34 namespace { |
| 35 | 35 |
| 36 // The timeout used to disconnect a client from the IPC Server channel if it | 36 // The timeout used to disconnect a client from the IPC Server channel if it |
| 37 // forgets to do so. This ensures the server channel is not blocked forever. | 37 // forgets to do so. This ensures the server channel is not blocked forever. |
| 38 const int kInitialRequestTimeoutSeconds = 5; | 38 const int kInitialRequestTimeoutSeconds = 5; |
| 39 | 39 |
| 40 // This value represents the amount of time to wait for a gnubby request from | 40 // This value represents the amount of time to wait for a security key request |
| 41 // the client before terminating the connection. | 41 // from the client before terminating the connection. |
| 42 const int kGnubbyRequestTimeoutSeconds = 60; | 42 const int kSecurityKeyRequestTimeoutSeconds = 60; |
| 43 | 43 |
| 44 } // namespace | 44 } // namespace |
| 45 | 45 |
| 46 namespace remoting { | 46 namespace remoting { |
| 47 | 47 |
| 48 // Creates an IPC server channel which services IPC clients that want to start | 48 // Creates an IPC server channel which services IPC clients that want to start |
| 49 // a security key forwarding session. Once an IPC Client connects to the | 49 // a security key forwarding session. Once an IPC Client connects to the |
| 50 // server, the GnubbyAuthHandlerWin class will create a new | 50 // server, the SecurityKeyAuthHandlerWin class will create a new |
| 51 // RemoteSecurityKeyIpcServer instance that will service that request. The new | 51 // SecurityKeyIpcServer instance that will service that request. The new |
| 52 // instance will exist for the lifetime of the security key request and will be | 52 // instance will exist for the lifetime of the security key request and will be |
| 53 // assigned a unique IPC channel name and connection id. The channel name is | 53 // assigned a unique IPC channel name and connection id. The channel name is |
| 54 // sent to the client which should disconnect the IPC server channel and | 54 // sent to the client which should disconnect the IPC server channel and |
| 55 // connect to the security key forwarding session IPC channel to send/receive | 55 // connect to the security key forwarding session IPC channel to send/receive |
| 56 // security key messages. The IPC server channel will then be reset so it can | 56 // security key messages. The IPC server channel will then be reset so it can |
| 57 // can service the next client/request. This system allows multiple security | 57 // can service the next client/request. This system allows multiple security |
| 58 // key forwarding sessions to occur concurrently. | 58 // key forwarding sessions to occur concurrently. |
| 59 // TODO(joedow): Update GnubbyAuthHandler impls to run on a separate IO thread | 59 // TODO(joedow): Update SecurityKeyAuthHandler impls to run on a separate IO |
| 60 // instead of the thread it was created on: crbug.com/591739 | 60 // thread instead of the thread it was created on: crbug.com/591739 |
| 61 class GnubbyAuthHandlerWin : public GnubbyAuthHandler, public IPC::Listener { | 61 class SecurityKeyAuthHandlerWin : public SecurityKeyAuthHandler, |
| 62 public IPC::Listener { |
| 62 public: | 63 public: |
| 63 explicit GnubbyAuthHandlerWin(ClientSessionDetails* client_session_details); | 64 explicit SecurityKeyAuthHandlerWin( |
| 64 ~GnubbyAuthHandlerWin() override; | 65 ClientSessionDetails* client_session_details); |
| 66 ~SecurityKeyAuthHandlerWin() override; |
| 65 | 67 |
| 66 private: | 68 private: |
| 67 typedef std::map<int, std::unique_ptr<RemoteSecurityKeyIpcServer>> | 69 typedef std::map<int, std::unique_ptr<SecurityKeyIpcServer>> ActiveChannels; |
| 68 ActiveChannels; | |
| 69 | 70 |
| 70 // GnubbyAuthHandler interface. | 71 // SecurityKeyAuthHandler interface. |
| 71 void CreateGnubbyConnection() override; | 72 void CreateSecurityKeyConnection() override; |
| 72 bool IsValidConnectionId(int gnubby_connection_id) const override; | 73 bool IsValidConnectionId(int security_key_connection_id) const override; |
| 73 void SendClientResponse(int gnubby_connection_id, | 74 void SendClientResponse(int security_key_connection_id, |
| 74 const std::string& response) override; | 75 const std::string& response) override; |
| 75 void SendErrorAndCloseConnection(int gnubby_connection_id) override; | 76 void SendErrorAndCloseConnection(int security_key_connection_id) override; |
| 76 void SetSendMessageCallback(const SendMessageCallback& callback) override; | 77 void SetSendMessageCallback(const SendMessageCallback& callback) override; |
| 77 size_t GetActiveConnectionCountForTest() const override; | 78 size_t GetActiveConnectionCountForTest() const override; |
| 78 void SetRequestTimeoutForTest(base::TimeDelta timeout) override; | 79 void SetRequestTimeoutForTest(base::TimeDelta timeout) override; |
| 79 | 80 |
| 80 // IPC::Listener implementation. | 81 // IPC::Listener implementation. |
| 81 bool OnMessageReceived(const IPC::Message& message) override; | 82 bool OnMessageReceived(const IPC::Message& message) override; |
| 82 void OnChannelConnected(int32_t peer_pid) override; | 83 void OnChannelConnected(int32_t peer_pid) override; |
| 83 void OnChannelError() override; | 84 void OnChannelError() override; |
| 84 | 85 |
| 85 // Creates the IPC server channel and waits for a connection using | 86 // Creates the IPC server channel and waits for a connection using |
| 86 // |ipc_server_channel_name_|. | 87 // |ipc_server_channel_name_|. |
| 87 void StartIpcServerChannel(); | 88 void StartIpcServerChannel(); |
| 88 | 89 |
| 89 // Restarts the IPC server channel to prepare for another connection. | 90 // Restarts the IPC server channel to prepare for another connection. |
| 90 void RecreateIpcServerChannel(); | 91 void RecreateIpcServerChannel(); |
| 91 | 92 |
| 92 // Closes the IPC channel created for a security key forwarding session. | 93 // Closes the IPC channel created for a security key forwarding session. |
| 93 void CloseSecurityKeyRequestIpcChannel(int connection_id); | 94 void CloseSecurityKeyRequestIpcChannel(int connection_id); |
| 94 | 95 |
| 95 // Returns the IPC Channel instance created for |connection_id|. | 96 // Returns the IPC Channel instance created for |connection_id|. |
| 96 ActiveChannels::const_iterator GetChannelForConnectionId( | 97 ActiveChannels::const_iterator GetChannelForConnectionId( |
| 97 int connection_id) const; | 98 int connection_id) const; |
| 98 | 99 |
| 99 // Creates a unique name based on the well-known IPC channel name. | 100 // Creates a unique name based on the well-known IPC channel name. |
| 100 std::string GenerateUniqueChannelName(); | 101 std::string GenerateUniqueChannelName(); |
| 101 | 102 |
| 102 // Represents the last id assigned to a new security key request IPC channel. | 103 // Represents the last id assigned to a new security key request IPC channel. |
| 103 int last_connection_id_ = 0; | 104 int last_connection_id_ = 0; |
| 104 | 105 |
| 105 // Sends a gnubby extension messages to the remote client when called. | 106 // Sends a security key extension message to the client when called. |
| 106 SendMessageCallback send_message_callback_; | 107 SendMessageCallback send_message_callback_; |
| 107 | 108 |
| 108 // Interface which provides details about the client session. | 109 // Interface which provides details about the client session. |
| 109 ClientSessionDetails* client_session_details_ = nullptr; | 110 ClientSessionDetails* client_session_details_ = nullptr; |
| 110 | 111 |
| 111 // Tracks the IPC channel created for each security key forwarding session. | 112 // Tracks the IPC channel created for each security key forwarding session. |
| 112 ActiveChannels active_channels_; | 113 ActiveChannels active_channels_; |
| 113 | 114 |
| 114 // The amount of time to wait for a client to process the connection details | 115 // The amount of time to wait for a client to process the connection details |
| 115 // message and disconnect from the IPC server channel before disconnecting it. | 116 // message and disconnect from the IPC server channel before disconnecting it. |
| 116 base::TimeDelta disconnect_timeout_; | 117 base::TimeDelta disconnect_timeout_; |
| 117 | 118 |
| 118 // Used to recreate the IPC server channel if a client forgets to disconnect. | 119 // Used to recreate the IPC server channel if a client forgets to disconnect. |
| 119 base::OneShotTimer timer_; | 120 base::OneShotTimer timer_; |
| 120 | 121 |
| 121 // IPC Clients connect to this channel first to receive their own IPC | 122 // IPC Clients connect to this channel first to receive their own IPC |
| 122 // channel to start a security key forwarding session on. | 123 // channel to start a security key forwarding session on. |
| 123 std::unique_ptr<IPC::Channel> ipc_server_channel_; | 124 std::unique_ptr<IPC::Channel> ipc_server_channel_; |
| 124 | 125 |
| 125 // Ensures GnubbyAuthHandlerWin methods are called on the same thread. | 126 // Ensures SecurityKeyAuthHandlerWin methods are called on the same thread. |
| 126 base::ThreadChecker thread_checker_; | 127 base::ThreadChecker thread_checker_; |
| 127 | 128 |
| 128 base::WeakPtrFactory<GnubbyAuthHandlerWin> weak_factory_; | 129 base::WeakPtrFactory<SecurityKeyAuthHandlerWin> weak_factory_; |
| 129 | 130 |
| 130 DISALLOW_COPY_AND_ASSIGN(GnubbyAuthHandlerWin); | 131 DISALLOW_COPY_AND_ASSIGN(SecurityKeyAuthHandlerWin); |
| 131 }; | 132 }; |
| 132 | 133 |
| 133 std::unique_ptr<GnubbyAuthHandler> GnubbyAuthHandler::Create( | 134 std::unique_ptr<SecurityKeyAuthHandler> SecurityKeyAuthHandler::Create( |
| 134 ClientSessionDetails* client_session_details, | 135 ClientSessionDetails* client_session_details, |
| 135 const SendMessageCallback& send_message_callback) { | 136 const SendMessageCallback& send_message_callback) { |
| 136 std::unique_ptr<GnubbyAuthHandler> auth_handler( | 137 std::unique_ptr<SecurityKeyAuthHandler> auth_handler( |
| 137 new GnubbyAuthHandlerWin(client_session_details)); | 138 new SecurityKeyAuthHandlerWin(client_session_details)); |
| 138 auth_handler->SetSendMessageCallback(send_message_callback); | 139 auth_handler->SetSendMessageCallback(send_message_callback); |
| 139 return auth_handler; | 140 return auth_handler; |
| 140 } | 141 } |
| 141 | 142 |
| 142 GnubbyAuthHandlerWin::GnubbyAuthHandlerWin( | 143 SecurityKeyAuthHandlerWin::SecurityKeyAuthHandlerWin( |
| 143 ClientSessionDetails* client_session_details) | 144 ClientSessionDetails* client_session_details) |
| 144 : client_session_details_(client_session_details), | 145 : client_session_details_(client_session_details), |
| 145 disconnect_timeout_( | 146 disconnect_timeout_( |
| 146 base::TimeDelta::FromSeconds(kInitialRequestTimeoutSeconds)), | 147 base::TimeDelta::FromSeconds(kInitialRequestTimeoutSeconds)), |
| 147 weak_factory_(this) { | 148 weak_factory_(this) { |
| 148 DCHECK(client_session_details_); | 149 DCHECK(client_session_details_); |
| 149 } | 150 } |
| 150 | 151 |
| 151 GnubbyAuthHandlerWin::~GnubbyAuthHandlerWin() {} | 152 SecurityKeyAuthHandlerWin::~SecurityKeyAuthHandlerWin() {} |
| 152 | 153 |
| 153 void GnubbyAuthHandlerWin::CreateGnubbyConnection() { | 154 void SecurityKeyAuthHandlerWin::CreateSecurityKeyConnection() { |
| 154 DCHECK(thread_checker_.CalledOnValidThread()); | 155 DCHECK(thread_checker_.CalledOnValidThread()); |
| 155 StartIpcServerChannel(); | 156 StartIpcServerChannel(); |
| 156 } | 157 } |
| 157 | 158 |
| 158 bool GnubbyAuthHandlerWin::IsValidConnectionId(int connection_id) const { | 159 bool SecurityKeyAuthHandlerWin::IsValidConnectionId(int connection_id) const { |
| 159 DCHECK(thread_checker_.CalledOnValidThread()); | 160 DCHECK(thread_checker_.CalledOnValidThread()); |
| 160 return (GetChannelForConnectionId(connection_id) != active_channels_.end()); | 161 return (GetChannelForConnectionId(connection_id) != active_channels_.end()); |
| 161 } | 162 } |
| 162 | 163 |
| 163 void GnubbyAuthHandlerWin::SendClientResponse( | 164 void SecurityKeyAuthHandlerWin::SendClientResponse( |
| 164 int connection_id, | 165 int connection_id, |
| 165 const std::string& response_data) { | 166 const std::string& response_data) { |
| 166 DCHECK(thread_checker_.CalledOnValidThread()); | 167 DCHECK(thread_checker_.CalledOnValidThread()); |
| 167 | 168 |
| 168 ActiveChannels::const_iterator iter = | 169 ActiveChannels::const_iterator iter = |
| 169 GetChannelForConnectionId(connection_id); | 170 GetChannelForConnectionId(connection_id); |
| 170 if (iter == active_channels_.end()) { | 171 if (iter == active_channels_.end()) { |
| 171 HOST_LOG << "Invalid gnubby connection ID received: " << connection_id; | 172 HOST_LOG << "Invalid security key connection ID received: " |
| 173 << connection_id; |
| 172 return; | 174 return; |
| 173 } | 175 } |
| 174 | 176 |
| 175 if (!iter->second->SendResponse(response_data)) { | 177 if (!iter->second->SendResponse(response_data)) { |
| 176 CloseSecurityKeyRequestIpcChannel(connection_id); | 178 CloseSecurityKeyRequestIpcChannel(connection_id); |
| 177 } | 179 } |
| 178 } | 180 } |
| 179 | 181 |
| 180 void GnubbyAuthHandlerWin::SendErrorAndCloseConnection(int connection_id) { | 182 void SecurityKeyAuthHandlerWin::SendErrorAndCloseConnection(int connection_id) { |
| 181 DCHECK(thread_checker_.CalledOnValidThread()); | 183 DCHECK(thread_checker_.CalledOnValidThread()); |
| 182 | 184 |
| 183 SendClientResponse(connection_id, kRemoteSecurityKeyConnectionError); | 185 SendClientResponse(connection_id, kSecurityKeyConnectionError); |
| 184 CloseSecurityKeyRequestIpcChannel(connection_id); | 186 CloseSecurityKeyRequestIpcChannel(connection_id); |
| 185 } | 187 } |
| 186 | 188 |
| 187 void GnubbyAuthHandlerWin::SetSendMessageCallback( | 189 void SecurityKeyAuthHandlerWin::SetSendMessageCallback( |
| 188 const SendMessageCallback& callback) { | 190 const SendMessageCallback& callback) { |
| 189 DCHECK(thread_checker_.CalledOnValidThread()); | 191 DCHECK(thread_checker_.CalledOnValidThread()); |
| 190 send_message_callback_ = callback; | 192 send_message_callback_ = callback; |
| 191 } | 193 } |
| 192 | 194 |
| 193 size_t GnubbyAuthHandlerWin::GetActiveConnectionCountForTest() const { | 195 size_t SecurityKeyAuthHandlerWin::GetActiveConnectionCountForTest() const { |
| 194 return active_channels_.size(); | 196 return active_channels_.size(); |
| 195 } | 197 } |
| 196 | 198 |
| 197 void GnubbyAuthHandlerWin::SetRequestTimeoutForTest(base::TimeDelta timeout) { | 199 void SecurityKeyAuthHandlerWin::SetRequestTimeoutForTest( |
| 200 base::TimeDelta timeout) { |
| 198 disconnect_timeout_ = timeout; | 201 disconnect_timeout_ = timeout; |
| 199 } | 202 } |
| 200 | 203 |
| 201 void GnubbyAuthHandlerWin::StartIpcServerChannel() { | 204 void SecurityKeyAuthHandlerWin::StartIpcServerChannel() { |
| 202 DCHECK(thread_checker_.CalledOnValidThread()); | 205 DCHECK(thread_checker_.CalledOnValidThread()); |
| 203 | 206 |
| 204 // Create a named pipe owned by the current user (the LocalService account | 207 // Create a named pipe owned by the current user (the LocalService account |
| 205 // (SID: S-1-5-19) when running in the network process) which is available to | 208 // (SID: S-1-5-19) when running in the network process) which is available to |
| 206 // all authenticated users. | 209 // all authenticated users. |
| 207 // presubmit: allow wstring | 210 // presubmit: allow wstring |
| 208 std::wstring user_sid; | 211 std::wstring user_sid; |
| 209 CHECK(base::win::GetUserSidString(&user_sid)); | 212 CHECK(base::win::GetUserSidString(&user_sid)); |
| 210 std::string user_sid_utf8 = base::WideToUTF8(user_sid); | 213 std::string user_sid_utf8 = base::WideToUTF8(user_sid); |
| 211 std::string security_descriptor = base::StringPrintf( | 214 std::string security_descriptor = base::StringPrintf( |
| 212 "O:%sG:%sD:(A;;GA;;;AU)", user_sid_utf8.c_str(), user_sid_utf8.c_str()); | 215 "O:%sG:%sD:(A;;GA;;;AU)", user_sid_utf8.c_str(), user_sid_utf8.c_str()); |
| 213 | 216 |
| 214 base::win::ScopedHandle pipe; | 217 base::win::ScopedHandle pipe; |
| 215 CHECK(CreateIpcChannel(remoting::GetRemoteSecurityKeyIpcChannelName(), | 218 CHECK(CreateIpcChannel(remoting::GetSecurityKeyIpcChannelName(), |
| 216 security_descriptor, &pipe)); | 219 security_descriptor, &pipe)); |
| 217 ipc_server_channel_ = | 220 ipc_server_channel_ = |
| 218 IPC::Channel::CreateNamedServer(IPC::ChannelHandle(pipe.Get()), this); | 221 IPC::Channel::CreateNamedServer(IPC::ChannelHandle(pipe.Get()), this); |
| 219 CHECK(ipc_server_channel_->Connect()); | 222 CHECK(ipc_server_channel_->Connect()); |
| 220 } | 223 } |
| 221 | 224 |
| 222 void GnubbyAuthHandlerWin::RecreateIpcServerChannel() { | 225 void SecurityKeyAuthHandlerWin::RecreateIpcServerChannel() { |
| 223 DCHECK(thread_checker_.CalledOnValidThread()); | 226 DCHECK(thread_checker_.CalledOnValidThread()); |
| 224 | 227 |
| 225 timer_.Stop(); | 228 timer_.Stop(); |
| 226 ipc_server_channel_.reset(); | 229 ipc_server_channel_.reset(); |
| 227 | 230 |
| 228 StartIpcServerChannel(); | 231 StartIpcServerChannel(); |
| 229 } | 232 } |
| 230 | 233 |
| 231 void GnubbyAuthHandlerWin::CloseSecurityKeyRequestIpcChannel( | 234 void SecurityKeyAuthHandlerWin::CloseSecurityKeyRequestIpcChannel( |
| 232 int connection_id) { | 235 int connection_id) { |
| 233 active_channels_.erase(connection_id); | 236 active_channels_.erase(connection_id); |
| 234 } | 237 } |
| 235 | 238 |
| 236 GnubbyAuthHandlerWin::ActiveChannels::const_iterator | 239 SecurityKeyAuthHandlerWin::ActiveChannels::const_iterator |
| 237 GnubbyAuthHandlerWin::GetChannelForConnectionId(int connection_id) const { | 240 SecurityKeyAuthHandlerWin::GetChannelForConnectionId(int connection_id) const { |
| 238 return active_channels_.find(connection_id); | 241 return active_channels_.find(connection_id); |
| 239 } | 242 } |
| 240 | 243 |
| 241 std::string GnubbyAuthHandlerWin::GenerateUniqueChannelName() { | 244 std::string SecurityKeyAuthHandlerWin::GenerateUniqueChannelName() { |
| 242 return GetRemoteSecurityKeyIpcChannelName() + "." + | 245 return GetSecurityKeyIpcChannelName() + "." + |
| 243 IPC::Channel::GenerateUniqueRandomChannelID(); | 246 IPC::Channel::GenerateUniqueRandomChannelID(); |
| 244 } | 247 } |
| 245 | 248 |
| 246 bool GnubbyAuthHandlerWin::OnMessageReceived(const IPC::Message& message) { | 249 bool SecurityKeyAuthHandlerWin::OnMessageReceived(const IPC::Message& message) { |
| 247 DCHECK(thread_checker_.CalledOnValidThread()); | 250 DCHECK(thread_checker_.CalledOnValidThread()); |
| 248 // This class does handle any IPC messages sent by the client. | 251 // This class does handle any IPC messages sent by the client. |
| 249 return false; | 252 return false; |
| 250 } | 253 } |
| 251 | 254 |
| 252 void GnubbyAuthHandlerWin::OnChannelConnected(int32_t peer_pid) { | 255 void SecurityKeyAuthHandlerWin::OnChannelConnected(int32_t peer_pid) { |
| 253 DCHECK(thread_checker_.CalledOnValidThread()); | 256 DCHECK(thread_checker_.CalledOnValidThread()); |
| 254 | 257 |
| 255 timer_.Start(FROM_HERE, disconnect_timeout_, | 258 timer_.Start(FROM_HERE, disconnect_timeout_, |
| 256 base::Bind(&GnubbyAuthHandlerWin::OnChannelError, | 259 base::Bind(&SecurityKeyAuthHandlerWin::OnChannelError, |
| 257 base::Unretained(this))); | 260 base::Unretained(this))); |
| 258 | 261 |
| 259 // Verify the IPC connection attempt originated from the session we are | 262 // Verify the IPC connection attempt originated from the session we are |
| 260 // currently remoting. We don't want to service requests from arbitrary | 263 // currently remoting. We don't want to service requests from arbitrary |
| 261 // Windows sessions. | 264 // Windows sessions. |
| 262 bool close_connection = false; | 265 bool close_connection = false; |
| 263 DWORD peer_session_id; | 266 DWORD peer_session_id; |
| 264 if (!ProcessIdToSessionId(peer_pid, &peer_session_id)) { | 267 if (!ProcessIdToSessionId(peer_pid, &peer_session_id)) { |
| 265 PLOG(ERROR) << "ProcessIdToSessionId() failed"; | 268 PLOG(ERROR) << "ProcessIdToSessionId() failed"; |
| 266 close_connection = true; | 269 close_connection = true; |
| 267 } else if (peer_session_id != client_session_details_->desktop_session_id()) { | 270 } else if (peer_session_id != client_session_details_->desktop_session_id()) { |
| 268 LOG(INFO) << "Ignoring connection attempt from outside remoted session."; | 271 LOG(INFO) << "Ignoring connection attempt from outside remoted session."; |
| 269 close_connection = true; | 272 close_connection = true; |
| 270 } | 273 } |
| 271 if (close_connection) { | 274 if (close_connection) { |
| 272 base::ThreadTaskRunnerHandle::Get()->PostTask( | 275 base::ThreadTaskRunnerHandle::Get()->PostTask( |
| 273 FROM_HERE, base::Bind(&GnubbyAuthHandlerWin::OnChannelError, | 276 FROM_HERE, base::Bind(&SecurityKeyAuthHandlerWin::OnChannelError, |
| 274 weak_factory_.GetWeakPtr())); | 277 weak_factory_.GetWeakPtr())); |
| 275 return; | 278 return; |
| 276 } | 279 } |
| 277 | 280 |
| 278 int new_connection_id = ++last_connection_id_; | 281 int new_connection_id = ++last_connection_id_; |
| 279 std::unique_ptr<RemoteSecurityKeyIpcServer> ipc_server( | 282 std::unique_ptr<SecurityKeyIpcServer> ipc_server(SecurityKeyIpcServer::Create( |
| 280 RemoteSecurityKeyIpcServer::Create( | 283 new_connection_id, peer_session_id, disconnect_timeout_, |
| 281 new_connection_id, peer_session_id, disconnect_timeout_, | 284 send_message_callback_, |
| 282 send_message_callback_, | 285 base::Bind(&SecurityKeyAuthHandlerWin::CloseSecurityKeyRequestIpcChannel, |
| 283 base::Bind(&GnubbyAuthHandlerWin::CloseSecurityKeyRequestIpcChannel, | 286 base::Unretained(this), new_connection_id))); |
| 284 base::Unretained(this), new_connection_id))); | |
| 285 | 287 |
| 286 std::string unique_channel_name = GenerateUniqueChannelName(); | 288 std::string unique_channel_name = GenerateUniqueChannelName(); |
| 287 if (ipc_server->CreateChannel( | 289 if (ipc_server->CreateChannel( |
| 288 unique_channel_name, | 290 unique_channel_name, |
| 289 base::TimeDelta::FromSeconds(kGnubbyRequestTimeoutSeconds))) { | 291 base::TimeDelta::FromSeconds(kSecurityKeyRequestTimeoutSeconds))) { |
| 290 active_channels_[new_connection_id] = std::move(ipc_server); | 292 active_channels_[new_connection_id] = std::move(ipc_server); |
| 291 ipc_server_channel_->Send( | 293 ipc_server_channel_->Send( |
| 292 new ChromotingNetworkToRemoteSecurityKeyMsg_ConnectionDetails( | 294 new ChromotingNetworkToRemoteSecurityKeyMsg_ConnectionDetails( |
| 293 unique_channel_name)); | 295 unique_channel_name)); |
| 294 } | 296 } |
| 295 } | 297 } |
| 296 | 298 |
| 297 void GnubbyAuthHandlerWin::OnChannelError() { | 299 void SecurityKeyAuthHandlerWin::OnChannelError() { |
| 298 DCHECK(thread_checker_.CalledOnValidThread()); | 300 DCHECK(thread_checker_.CalledOnValidThread()); |
| 299 | 301 |
| 300 // Could be an error, most likely the client disconnected though. Either way | 302 // Could be an error, most likely the client disconnected though. Either way |
| 301 // we should restart the server to prepare for the next connection. | 303 // we should restart the server to prepare for the next connection. |
| 302 RecreateIpcServerChannel(); | 304 RecreateIpcServerChannel(); |
| 303 } | 305 } |
| 304 | 306 |
| 305 } // namespace remoting | 307 } // namespace remoting |
| OLD | NEW |