| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171 |
- use dns_lookup::{lookup_addr, lookup_host};
- use hbb_common::{bail, ResultType};
- use sodiumoxide::crypto::sign;
- use std::{
- env,
- net::{IpAddr, TcpStream},
- process, str,
- };
- fn print_help() {
- println!(
- "Usage:
- rustdesk-util [command]\n
- Available Commands:
- genkeypair Generate a new keypair
- validatekeypair [public key] [secret key] Validate an existing keypair
- doctor [rustdesk-server] Check for server connection problems"
- );
- process::exit(0x0001);
- }
- fn error_then_help(msg: &str) {
- println!("ERROR: {msg}\n");
- print_help();
- }
- fn gen_keypair() {
- let (pk, sk) = sign::gen_keypair();
- let public_key = base64::encode(pk);
- let secret_key = base64::encode(sk);
- println!("Public Key: {public_key}");
- println!("Secret Key: {secret_key}");
- }
- fn validate_keypair(pk: &str, sk: &str) -> ResultType<()> {
- let sk1 = base64::decode(sk);
- if sk1.is_err() {
- bail!("Invalid secret key");
- }
- let sk1 = sk1.unwrap();
- let secret_key = sign::SecretKey::from_slice(sk1.as_slice());
- if secret_key.is_none() {
- bail!("Invalid Secret key");
- }
- let secret_key = secret_key.unwrap();
- let pk1 = base64::decode(pk);
- if pk1.is_err() {
- bail!("Invalid public key");
- }
- let pk1 = pk1.unwrap();
- let public_key = sign::PublicKey::from_slice(pk1.as_slice());
- if public_key.is_none() {
- bail!("Invalid Public key");
- }
- let public_key = public_key.unwrap();
- let random_data_to_test = b"This is meh.";
- let signed_data = sign::sign(random_data_to_test, &secret_key);
- let verified_data = sign::verify(&signed_data, &public_key);
- if verified_data.is_err() {
- bail!("Key pair is INVALID");
- }
- let verified_data = verified_data.unwrap();
- if random_data_to_test != &verified_data[..] {
- bail!("Key pair is INVALID");
- }
- Ok(())
- }
- fn doctor_tcp(address: std::net::IpAddr, port: &str, desc: &str) {
- let start = std::time::Instant::now();
- let conn = format!("{address}:{port}");
- if let Ok(_stream) = TcpStream::connect(conn.as_str()) {
- let elapsed = std::time::Instant::now().duration_since(start);
- println!(
- "TCP Port {} ({}): OK in {} ms",
- port,
- desc,
- elapsed.as_millis()
- );
- } else {
- println!("TCP Port {port} ({desc}): ERROR");
- }
- }
- fn doctor_ip(server_ip_address: std::net::IpAddr, server_address: Option<&str>) {
- println!("\nChecking IP address: {server_ip_address}");
- println!("Is IPV4: {}", server_ip_address.is_ipv4());
- println!("Is IPV6: {}", server_ip_address.is_ipv6());
- // reverse dns lookup
- // TODO: (check) doesn't seem to do reverse lookup on OSX...
- let reverse = lookup_addr(&server_ip_address).unwrap();
- if let Some(server_address) = server_address {
- if reverse == server_address {
- println!("Reverse DNS lookup: '{reverse}' MATCHES server address");
- } else {
- println!(
- "Reverse DNS lookup: '{reverse}' DOESN'T MATCH server address '{server_address}'"
- );
- }
- }
- // TODO: ICMP ping?
- // port check TCP (UDP is hard to check)
- doctor_tcp(server_ip_address, "21114", "API");
- doctor_tcp(server_ip_address, "21115", "hbbs extra port for nat test");
- doctor_tcp(server_ip_address, "21116", "hbbs");
- doctor_tcp(server_ip_address, "21117", "hbbr tcp");
- doctor_tcp(server_ip_address, "21118", "hbbs websocket");
- doctor_tcp(server_ip_address, "21119", "hbbr websocket");
- // TODO: key check
- }
- fn doctor(server_address_unclean: &str) {
- let server_address3 = server_address_unclean.trim();
- let server_address2 = server_address3.to_lowercase();
- let server_address = server_address2.as_str();
- println!("Checking server: {server_address}\n");
- if let Ok(server_ipaddr) = server_address.parse::<IpAddr>() {
- // user requested an ip address
- doctor_ip(server_ipaddr, None);
- } else {
- // the passed string is not an ip address
- let ips: Vec<std::net::IpAddr> = lookup_host(server_address).unwrap();
- println!("Found {} IP addresses: ", ips.len());
- ips.iter().for_each(|ip| println!(" - {ip}"));
- ips.iter()
- .for_each(|ip| doctor_ip(*ip, Some(server_address)));
- }
- }
- fn main() {
- let args: Vec<_> = env::args().collect();
- if args.len() <= 1 {
- print_help();
- }
- let command = args[1].to_lowercase();
- match command.as_str() {
- "genkeypair" => gen_keypair(),
- "validatekeypair" => {
- if args.len() <= 3 {
- error_then_help("You must supply both the public and the secret key");
- }
- let res = validate_keypair(args[2].as_str(), args[3].as_str());
- if let Err(e) = res {
- println!("{e}");
- process::exit(0x0001);
- }
- println!("Key pair is VALID");
- }
- "doctor" => {
- if args.len() <= 2 {
- error_then_help("You must supply the rustdesk-server address");
- }
- doctor(args[2].as_str());
- }
- _ => print_help(),
- }
- }
|