summaryrefslogtreecommitdiff
path: root/packet-detector/src/bin/tls_server.rs
blob: 7f6806259ee390e010e533a8e7872850bd1d5d82 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
//! TLS 1.2 Test Server with Client Tracking (mTLS Enabled)
//!
//! A mutual TLS (mTLS) HTTPS server for testing the eBPF TLS certificate validator.
//! Requires client certificates signed by the CA for authentication.
//! Tracks connected clients and displays their status.

use std::collections::HashMap;
use std::env;
use std::fs;
use std::net::SocketAddr;
use std::path::Path;
use std::sync::Arc;

use packet_detector::tls_util::{dn, parse_pem};
use rcgen::{BasicConstraints, CertificateParams, IsCa, Issuer, KeyPair, KeyUsagePurpose, SanType};
use rustls::pki_types::{CertificateDer, PrivateKeyDer};
use rustls::server::{ServerConfig, WebPkiClientVerifier};
use rustls::version::TLS12;
use rustls::RootCertStore;
use tokio::io::{AsyncReadExt, AsyncWriteExt};
use tokio::net::TcpListener;
use tokio::sync::RwLock;
use tokio_rustls::TlsAcceptor;

const DEFAULT_PORT: u16 = 8443;
const CA_CERT_PATH: &str = "ca_cert.pem";
const CA_KEY_PATH: &str = "ca_key.pem";
const SERVER_CERT_PATH: &str = "server_cert.pem";
const SERVER_KEY_PATH: &str = "server_key.pem";
const CLIENT_CERT_PATH: &str = "client_cert.pem";
const CLIENT_KEY_PATH: &str = "client_key.pem";

#[derive(Clone, Debug, serde::Serialize)]
struct Client {
    ip: String,
    connected_at: chrono::DateTime<chrono::Utc>,
    #[serde(skip)]
    last_seen: chrono::DateTime<chrono::Utc>,
    requests: u64,
}

#[derive(Default)]
struct State {
    clients: HashMap<String, Client>,
    connections: u64,
    requests: u64,
}

/// Generate a CA certificate for signing server and client certificates
fn generate_ca_certificate() -> Result<(String, String, KeyPair), Box<dyn std::error::Error>> {
    println!("Generating CA certificate...");

    let mut params = CertificateParams::default();
    params.distinguished_name = dn("eBPF Test CA", "Zero Trust Network");
    params.is_ca = IsCa::Ca(BasicConstraints::Unconstrained);
    params.key_usages = vec![
        KeyUsagePurpose::KeyCertSign,
        KeyUsagePurpose::CrlSign,
    ];

    let key_pair = KeyPair::generate()?;
    let cert = params.self_signed(&key_pair)?;

    Ok((cert.pem(), key_pair.serialize_pem(), key_pair))
}

/// Generate a server certificate signed by the CA
fn generate_server_certificate(
    ca_cert_pem: &str,
    ca_key_pem: &str,
) -> Result<(String, String), Box<dyn std::error::Error>> {
    println!("Generating server certificate signed by CA...");

    let ca_key = KeyPair::from_pem(ca_key_pem)?;
    let issuer = Issuer::from_ca_cert_pem(ca_cert_pem, ca_key)?;

    let mut params = CertificateParams::default();
    params.distinguished_name = dn("localhost", "eBPF Test Server");
    params.subject_alt_names = vec![
        SanType::DnsName("localhost".try_into()?),
        SanType::IpAddress(std::net::IpAddr::V4(std::net::Ipv4Addr::new(127, 0, 0, 1))),
    ];
    params.key_usages = vec![
        KeyUsagePurpose::DigitalSignature,
        KeyUsagePurpose::KeyEncipherment,
    ];

    let key_pair = KeyPair::generate()?;
    let cert = params.signed_by(&key_pair, &issuer)?;

    Ok((cert.pem(), key_pair.serialize_pem()))
}

/// Generate a client certificate signed by the CA
fn generate_client_certificate(
    client_name: &str,
    ca_cert_pem: &str,
    ca_key_pem: &str,
) -> Result<(String, String), Box<dyn std::error::Error>> {
    println!("Generating client certificate for: {}", client_name);

    let ca_key = KeyPair::from_pem(ca_key_pem)?;
    let issuer = Issuer::from_ca_cert_pem(ca_cert_pem, ca_key)?;

    let mut params = CertificateParams::default();
    params.distinguished_name = dn(client_name, "eBPF Test Client");
    params.key_usages = vec![
        KeyUsagePurpose::DigitalSignature,
    ];

    let key_pair = KeyPair::generate()?;
    let cert = params.signed_by(&key_pair, &issuer)?;

    Ok((cert.pem(), key_pair.serialize_pem()))
}

/// PKI setup result
struct PkiSetup {
    ca_cert_pem: String,
    server_cert: Vec<CertificateDer<'static>>,
    server_key: PrivateKeyDer<'static>,
}

/// Load or generate the full PKI (CA, server cert, client cert)
fn setup_pki() -> Result<PkiSetup, Box<dyn std::error::Error>> {
    let ca_cert_pem: String;
    let ca_key_pem: String;

    // Load or generate CA
    if Path::new(CA_CERT_PATH).exists() && Path::new(CA_KEY_PATH).exists() {
        println!("Loading existing CA from {} and {}", CA_CERT_PATH, CA_KEY_PATH);
        ca_cert_pem = fs::read_to_string(CA_CERT_PATH)?;
        ca_key_pem = fs::read_to_string(CA_KEY_PATH)?;
    } else {
        println!("Generating new PKI infrastructure...");
        let (cert, key, _) = generate_ca_certificate()?;
        fs::write(CA_CERT_PATH, &cert)?;
        fs::write(CA_KEY_PATH, &key)?;
        println!("Saved CA to {} and {}", CA_CERT_PATH, CA_KEY_PATH);
        ca_cert_pem = cert;
        ca_key_pem = key;
    }

    // Load or generate server certificate
    let server_cert_pem: String;
    let server_key_pem: String;

    if Path::new(SERVER_CERT_PATH).exists() && Path::new(SERVER_KEY_PATH).exists() {
        println!("Loading existing server certificate...");
        server_cert_pem = fs::read_to_string(SERVER_CERT_PATH)?;
        server_key_pem = fs::read_to_string(SERVER_KEY_PATH)?;
    } else {
        let (cert, key) = generate_server_certificate(&ca_cert_pem, &ca_key_pem)?;
        fs::write(SERVER_CERT_PATH, &cert)?;
        fs::write(SERVER_KEY_PATH, &key)?;
        println!("Saved server cert to {} and {}", SERVER_CERT_PATH, SERVER_KEY_PATH);
        server_cert_pem = cert;
        server_key_pem = key;
    }

    // Load or generate client certificate
    if !Path::new(CLIENT_CERT_PATH).exists() || !Path::new(CLIENT_KEY_PATH).exists() {
        let (cert, key) = generate_client_certificate("test-client", &ca_cert_pem, &ca_key_pem)?;
        fs::write(CLIENT_CERT_PATH, &cert)?;
        fs::write(CLIENT_KEY_PATH, &key)?;
        println!("Saved client cert to {} and {}", CLIENT_CERT_PATH, CLIENT_KEY_PATH);
    }

    // Parse certificates
    let server_certs = parse_pem(&server_cert_pem)?;

    let server_key = rustls_pemfile::private_key(&mut server_key_pem.as_bytes())?
        .ok_or("No server private key found")?;

    Ok(PkiSetup {
        ca_cert_pem,
        server_cert: server_certs,
        server_key,
    })
}

fn parse_request(data: &[u8]) -> (&str, Option<String>) {
    let req = std::str::from_utf8(data).unwrap_or("");
    let first_line = req.lines().next().unwrap_or("");

    // Check X-Client-Name header
    let client = req.lines()
        .find(|l| l.to_lowercase().starts_with("x-client-name:"))
        .map(|l| l.split(':').nth(1).unwrap_or("").trim().to_string())
        .or_else(|| {
            // Check ?client= query param
            first_line.find("client=").map(|i| {
                let rest = &first_line[i + 7..];
                rest[..rest.find(|c| c == '&' || c == ' ').unwrap_or(rest.len())].to_string()
            })
        });

    (first_line, client)
}

async fn handle_connection(
    mut stream: tokio_rustls::server::TlsStream<tokio::net::TcpStream>,
    peer: SocketAddr,
    state: Arc<RwLock<State>>,
) {
    state.write().await.connections += 1;

    let mut buf = vec![0u8; 4096];
    let n = match stream.read(&mut buf).await {
        Ok(0) => return,
        Ok(n) => n,
        Err(_) => return,
    };

    let (path, client_name) = parse_request(&buf[..n]);

    // Track client if name provided
    if let Some(name) = &client_name {
        let mut s = state.write().await;
        s.requests += 1;
        let now = chrono::Utc::now();
        s.clients.entry(name.clone())
            .and_modify(|c| { c.last_seen = now; c.requests += 1; })
            .or_insert(Client {
                ip: peer.ip().to_string(),
                connected_at: now,
                last_seen: now,
                requests: 1,
            });
    }

    // Route request
    let (ctype, body) = if path.contains("/status") || path.contains("/clients") {
        let s = state.read().await;
        ("application/json", serde_json::json!({
            "clients": s.clients.len(),
            "connections": s.connections,
            "requests": s.requests,
            "list": &s.clients
        }).to_string())
    } else if path.contains("/register") {
        ("application/json", serde_json::json!({
            "status": "ok",
            "client": client_name.as_deref().unwrap_or("unknown")
        }).to_string())
    } else {
        ("text/plain", format!("TLS Server OK - {} clients", state.read().await.clients.len()))
    };

    let resp = format!(
        "HTTP/1.1 200 OK\r\nContent-Type: {}\r\nContent-Length: {}\r\nConnection: close\r\n\r\n{}",
        ctype, body.len(), body
    );
    let _ = stream.write_all(resp.as_bytes()).await;
    let _ = stream.shutdown().await;
}


#[tokio::main]
async fn main() -> Result<(), Box<dyn std::error::Error>> {
    rustls::crypto::ring::default_provider().install_default().ok();

    let port: u16 = env::args().nth(1).and_then(|s| s.parse().ok()).unwrap_or(DEFAULT_PORT);

    let pki = setup_pki()?;

    // Build root store with CA
    let mut root_store = RootCertStore::empty();
    for cert in parse_pem(&pki.ca_cert_pem)? {
        root_store.add(cert)?;
    }

    let verifier = WebPkiClientVerifier::builder(Arc::new(root_store)).build()?;
    let config = ServerConfig::builder_with_protocol_versions(&[&TLS12])
        .with_client_cert_verifier(verifier)
        .with_single_cert(pki.server_cert, pki.server_key)?;

    let acceptor = TlsAcceptor::from(Arc::new(config));
    let listener = TcpListener::bind(SocketAddr::from(([0, 0, 0, 0], port))).await?;
    let state = Arc::new(RwLock::new(State::default()));

    println!("mTLS server on :{} (endpoints: /, /status, /register)", port);
    println!("Test: curl -k --tlsv1.2 --cert {} --key {} https://127.0.0.1:{}", CLIENT_CERT_PATH, CLIENT_KEY_PATH, port);

    loop {
        let Ok((stream, peer)) = listener.accept().await else { continue };
        let acceptor = acceptor.clone();
        let state = state.clone();
        tokio::spawn(async move {
            if let Ok(tls) = acceptor.accept(stream).await {
                handle_connection(tls, peer, state).await;
            }
        });
    }
}