utils.rs 5.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172
  1. use dns_lookup::{lookup_addr, lookup_host};
  2. use hbb_common::{bail, ResultType};
  3. use sodiumoxide::crypto::sign;
  4. use std::{
  5. env,
  6. net::{IpAddr, TcpStream},
  7. process, str,
  8. };
  9. fn print_help() {
  10. println!(
  11. "Usage:
  12. rustdesk-util [command]\n
  13. Available Commands:
  14. genkeypair Generate a new keypair
  15. validatekeypair [public key] [secret key] Validate an existing keypair
  16. doctor [rustdesk-server] Check for server connection problems"
  17. );
  18. process::exit(0x0001);
  19. }
  20. fn error_then_help(msg: &str) {
  21. println!("ERROR: {}\n", msg);
  22. print_help();
  23. }
  24. fn gen_keypair() {
  25. let (pk, sk) = sign::gen_keypair();
  26. let public_key = base64::encode(pk);
  27. let secret_key = base64::encode(sk);
  28. println!("Public Key: {public_key}");
  29. println!("Secret Key: {secret_key}");
  30. }
  31. fn validate_keypair(pk: &str, sk: &str) -> ResultType<()> {
  32. let sk1 = base64::decode(sk);
  33. if sk1.is_err() {
  34. bail!("Invalid secret key");
  35. }
  36. let sk1 = sk1.unwrap();
  37. let secret_key = sign::SecretKey::from_slice(sk1.as_slice());
  38. if secret_key.is_none() {
  39. bail!("Invalid Secret key");
  40. }
  41. let secret_key = secret_key.unwrap();
  42. let pk1 = base64::decode(pk);
  43. if pk1.is_err() {
  44. bail!("Invalid public key");
  45. }
  46. let pk1 = pk1.unwrap();
  47. let public_key = sign::PublicKey::from_slice(pk1.as_slice());
  48. if public_key.is_none() {
  49. bail!("Invalid Public key");
  50. }
  51. let public_key = public_key.unwrap();
  52. let random_data_to_test = b"This is meh.";
  53. let signed_data = sign::sign(random_data_to_test, &secret_key);
  54. let verified_data = sign::verify(&signed_data, &public_key);
  55. if verified_data.is_err() {
  56. bail!("Key pair is INVALID");
  57. }
  58. let verified_data = verified_data.unwrap();
  59. if random_data_to_test != &verified_data[..] {
  60. bail!("Key pair is INVALID");
  61. }
  62. Ok(())
  63. }
  64. fn doctor_tcp(address: std::net::IpAddr, port: &str, desc: &str) {
  65. let start = std::time::Instant::now();
  66. let conn = format!("{}:{}", address, port);
  67. if let Ok(_stream) = TcpStream::connect(conn.as_str()) {
  68. let elapsed = std::time::Instant::now().duration_since(start);
  69. println!(
  70. "TCP Port {} ({}): OK in {} ms",
  71. port,
  72. desc,
  73. elapsed.as_millis()
  74. );
  75. } else {
  76. println!("TCP Port {} ({}): ERROR", port, desc);
  77. }
  78. }
  79. fn doctor_ip(server_ip_address: std::net::IpAddr, server_address: Option<&str>) {
  80. println!("\nChecking IP address: {}", server_ip_address);
  81. println!("Is IPV4: {}", server_ip_address.is_ipv4());
  82. println!("Is IPV6: {}", server_ip_address.is_ipv6());
  83. // reverse dns lookup
  84. // TODO: (check) doesn't seem to do reverse lookup on OSX...
  85. let reverse = lookup_addr(&server_ip_address).unwrap();
  86. if let Some(server_address) = server_address {
  87. if reverse == server_address {
  88. println!("Reverse DNS lookup: '{}' MATCHES server address", reverse);
  89. } else {
  90. println!(
  91. "Reverse DNS lookup: '{}' DOESN'T MATCH server address '{}'",
  92. reverse, server_address
  93. );
  94. }
  95. }
  96. // TODO: ICMP ping?
  97. // port check TCP (UDP is hard to check)
  98. doctor_tcp(server_ip_address, "21114", "API");
  99. doctor_tcp(server_ip_address, "21115", "hbbs extra port for nat test");
  100. doctor_tcp(server_ip_address, "21116", "hbbs");
  101. doctor_tcp(server_ip_address, "21117", "hbbr tcp");
  102. doctor_tcp(server_ip_address, "21118", "hbbs websocket");
  103. doctor_tcp(server_ip_address, "21119", "hbbr websocket");
  104. // TODO: key check
  105. }
  106. fn doctor(server_address_unclean: &str) {
  107. let server_address3 = server_address_unclean.trim();
  108. let server_address2 = server_address3.to_lowercase();
  109. let server_address = server_address2.as_str();
  110. println!("Checking server: {}\n", server_address);
  111. if let Ok(server_ipaddr) = server_address.parse::<IpAddr>() {
  112. // user requested an ip address
  113. doctor_ip(server_ipaddr, None);
  114. } else {
  115. // the passed string is not an ip address
  116. let ips: Vec<std::net::IpAddr> = lookup_host(server_address).unwrap();
  117. println!("Found {} IP addresses: ", ips.len());
  118. ips.iter().for_each(|ip| println!(" - {ip}"));
  119. ips.iter()
  120. .for_each(|ip| doctor_ip(*ip, Some(server_address)));
  121. }
  122. }
  123. fn main() {
  124. let args: Vec<_> = env::args().collect();
  125. if args.len() <= 1 {
  126. print_help();
  127. }
  128. let command = args[1].to_lowercase();
  129. match command.as_str() {
  130. "genkeypair" => gen_keypair(),
  131. "validatekeypair" => {
  132. if args.len() <= 3 {
  133. error_then_help("You must supply both the public and the secret key");
  134. }
  135. let res = validate_keypair(args[2].as_str(), args[3].as_str());
  136. if let Err(e) = res {
  137. println!("{}", e);
  138. process::exit(0x0001);
  139. }
  140. println!("Key pair is VALID");
  141. }
  142. "doctor" => {
  143. if args.len() <= 2 {
  144. error_then_help("You must supply the rustdesk-server address");
  145. }
  146. doctor(args[2].as_str());
  147. }
  148. _ => print_help(),
  149. }
  150. }