Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

hts is not detecting when htc terminates #28

Open
VA1DER opened this issue Aug 26, 2023 · 1 comment
Open

hts is not detecting when htc terminates #28

VA1DER opened this issue Aug 26, 2023 · 1 comment

Comments

@VA1DER
Copy link

VA1DER commented Aug 26, 2023

After connection from htc to hts is terminated, hts does not detect that the incoming connection has been lost. It will keep waiting inside its inner loop for the tunnel to come back, which means hts never closes its connection to its upstream device, port, or pipe. This has implications for when hts is itself connected to something stateful, say like ssh.

Steps to reproduce:
In this example, hts is forwarding to an ssh server:
$ hts -D 5 -F sshserver:22 listenaddress:8080

  1. Run hts in the above example configuration
  2. Connect htc to hts with a simple redirect to stdout. The ssh server that hts connects to will respond by sending its initial connection string which you will see on stdout:
    $ htc -s -P httpproxyserver:8888 htsserver:8080
    SSH-2.0-dropbear
    ������-��_m���curve25519-sha256,[email protected],d, <etc>
  3. Hit CTRL-C to break out of htc
  4. Try again from step 1. The upstream ssh server will now not respond because hts never closed its connection when htc terminated.

hts is detecting the disconnect at step 2 as you can tell from the log. Below, CTRL-C was hit to terminate htc at 1043333:

20230826 104324             tunnel_write_request: TUNNEL_DATA (410)
20230826 104324                 tunnel_write_data: out_total_raw = 413
20230826 104324             tunnel_write: out_total_data = 410
20230826 104324                 tunnel_write (0x5606b4f8ed30, 0x7ffcf3991c90, 410) = 410
20230826 104324                 poll () ...
20230826 104333                 ... = 1
20230826 104333                 revents[0] = 0, revents[1] = 1, POLLIN = 1
20230826 104333                 read (4, 0x7ffcf3991bed, 1) ...
20230826 104333                 ... = 0
20230826 104333         tunnel_read_request: connection closed by peer
20230826 104333         tunnel_in_disconnect: input disconnected
20230826 104333                 tunnel_read_request returned <= 0, returning -1
20230826 104333                 handle_tunnel_input: tunnel_read() = -1

20230826 104333             tunnel_pollin_fd: in_fd = -1; returning server_socket = 3
20230826 104333                 poll () ...
20230826 104339                 ... = 0
20230826 104339             poll() timed out
20230826 104339                 write (5, 0x7ffcf3994484, 1) ...
20230826 104339                 ... = 1
20230826 104339         tunnel_write_request: TUNNEL_PAD1
20230826 104339                 tunnel_write_data: out_total_raw = 414
20230826 104339             tunnel_pollin_fd: in_fd = -1; returning server_socket = 3
20230826 104339                 poll () ...
20230826 104354                 ... = 0
20230826 104354             poll() timed out
20230826 104354                 write (5, 0x7ffcf3994484, 1) ...
20230826 104354         caught SIGPIPE
20230826 104354                 ... = -1
20230826 104354     tunnel_write_data: write error: Broken pipe
20230826 104354         tunnel_out_disconnect: output disconnected
20230826 104354     tunnel_write_request: couldn't write request: output is disconnected
20230826 104354             tunnel_pollin_fd: in_fd = -1; returning server_socket = 3
20230826 104354                 poll () ...
20230826 104409                 ... = 0
20230826 104409             poll() timed out

You can see that hts detects that htc was terminated, however it never breaks out of its inner loop and keeps polling, which causes it to maintain its connection to the ssh server which never resets.

This seems to be related to handle_input() (common.h:154) which ignores EAGAIN errors, and to tunnel_read_request() (tunnel.c:802) which, when it detects a connection has been terminated is explcitly setting errno to EAGAIN. This seems to be forcing hts to treat a terminated connection the same way as a poll timeout.

The following patch seems to correct the problem:

--- tunnel.c.orig	2023-08-26 10:55:56.287510606 -0300
+++ tunnel.c	2023-08-26 10:55:19.755465737 -0300
@@ -823,11 +823,12 @@
 
       if (tunnel_is_client (tunnel)
 	  && tunnel_in_connect (tunnel) == -1)
 	return -1;
 
-      errno = EAGAIN;
+      /*errno = EAGAIN; Why EAGAIN?  This seems to treat a connection closed on the other side the same way as a missed poll*/
+      errno = ECANCELED;
       return -1;
     }
   *request = req;
   tunnel->in_total_raw += n;
   log_annoying ("request = 0x%x (%s)", req, REQ_TO_STRING (req));

I haven't made this a pull request because I'm not sure the ramifications on what this will do on temporary proxy issues. The same fix can be done on detecting when the tunnel output is closed, but this requires some changes to the way tunnel padding occurs, since it's during tunnel padding that it gets detects.

@larsbrinkhoff
Copy link
Owner

Thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants