このページの2つのバージョン間の差分を表示します。
両方とも前のリビジョン前のリビジョン次のリビジョン | 前のリビジョン | ||
mae3xx_tips:use_socat:start [2014/09/04 15:27] – admin | mae3xx_tips:use_socat:start [2014/09/04 16:51] (現在) – admin | ||
---|---|---|---|
行 1: | 行 1: | ||
+ | ====== socat を使う (シリアル-TCP変換, | ||
+ | [[http:// | ||
+ | たとえば、 | ||
+ | |||
+ | * シリアルポート <-> SSH | ||
+ | * TCP <-> シリアルポート | ||
+ | |||
+ | などが簡単に接続できます。 | ||
+ | |||
+ | ※ LAN のように信頼できるネットワーク環境ならよいですが、3G/ | ||
+ | |||
+ | \\ | ||
+ | |||
+ | ===== 設定 ===== | ||
+ | |||
+ | ==== シリアルポート → SSH ==== | ||
+ | |||
+ | MA-E3xx のシリアルポート "PORT 0" を、server.example.com の SSH へ中継します。\\ | ||
+ | 事前に下記を済ませておきます。 | ||
+ | |||
+ | * /dev/ttyO1 を一般ユーザ権限で使用するため、user1 を tty グループに所属させる(# | ||
+ | * SSH の秘密鍵・公開鍵ペアを作成する (ssh-keygen) | ||
+ | * SSH の公開鍵を、server.example.com の user アカウントの authorized_keys ファイルに登録しておく | ||
+ | |||
+ | < | ||
+ | user1@plum: | ||
+ | </ | ||
+ | |||
+ | シリアルポートからログインできますが、シェルを exit で抜けると socat も終了してしまうため、\\ | ||
+ | while ループなどで再度実行するようにしたほうが実用上は良いと思います。 | ||
+ | |||
+ | SSH でリモート側でシリアルポートのデータを処理するプログラムを実行することで、\\ | ||
+ | セキュアなシリアルポートの Forwarding が実現できます。 | ||
+ | |||
+ | <file syslog syslog> | ||
+ | 2014/09/04 12:51:55 socat[2549] N opening character device "/ | ||
+ | 2014/09/04 12:51:55 socat[2549] N forking off child, using pty for reading and writing | ||
+ | 2014/09/04 12:51:55 socat[2549] N forked off child process 2550 | ||
+ | 2014/09/04 12:51:55 socat[2549] N forked off child process 2550 | ||
+ | 2014/09/04 12:51:55 socat[2549] N starting data transfer loop with FDs [3,3] and [4,4] | ||
+ | 2014/09/04 12:51:55 socat[2550] W open("/ | ||
+ | 2014/09/04 12:51:55 socat[2550] N execvp' | ||
+ | </ | ||
+ | |||
+ | \\ | ||
+ | |||
+ | ==== 仮想シリアルポート ==== | ||
+ | |||
+ | 他のマシンのシリアルポートに、ネットワーク経由で接続する。\\ | ||
+ | ネタ元は[[http:// | ||
+ | |||
+ | {{: | ||
+ | |||
+ | |||
+ | \\ | ||
+ | |||
+ | === サーバ側 === | ||
+ | |||
+ | < | ||
+ | user1@plum: | ||
+ | </ | ||
+ | |||
+ | TCP:54321 で待ち受け、接続してきたクライアントのデータを / | ||
+ | |||
+ | \\ | ||
+ | |||
+ | === クライアント側 === | ||
+ | |||
+ | < | ||
+ | user1@plum: | ||
+ | </ | ||
+ | |||
+ | / | ||
+ | |||
+ | \\ | ||
+ | |||
+ | === 接続 === | ||
+ | |||
+ | クライアント側から、/ | ||
+ | |||
+ | < | ||
+ | Welcome to minicom 2.6.2 | ||
+ | |||
+ | OPTIONS: I18n | ||
+ | Compiled on Feb 8 2013, 07: | ||
+ | Port / | ||
+ | |||
+ | Press CTRL-A Z for help on special keys | ||
+ | |||
+ | AT | ||
+ | OK | ||
+ | AT | ||
+ | OK | ||
+ | ATI | ||
+ | 56000 | ||
+ | | ||
+ | OK | ||
+ | AT+GMI | ||
+ | +GMI: CONEXANT | ||
+ | | ||
+ | OK | ||
+ | AT+GMM | ||
+ | +GMM: V90 | ||
+ | |||
+ | OK | ||
+ | </ | ||
+ | |||
+ | TCP で接続していますが、インターネット経由の場合 SSL を使ったほうが良いかと思います。 | ||
+ | |||
+ | \\ | ||
+ | |||
+ | === 接続 (Telnet) === | ||
+ | |||
+ | 上の接続例では作成した仮想シリアルポート経由で接続しましたが、Telnet で TCP:54321 に直接接続することもできます。\\ | ||
+ | |||
+ | ※ MA-E3xx には telnet client が入っていませんので、PC から直接接続しています。 | ||
+ | |||
+ | < | ||
+ | % telnet 192.168.253.49 54321 | ||
+ | Trying 192.168.253.49... | ||
+ | Connected to 192.168.253.49. | ||
+ | Escape character is ' | ||
+ | ATE0 | ||
+ | |||
+ | OK | ||
+ | AT | ||
+ | |||
+ | OK | ||
+ | AT+GMM | ||
+ | |||
+ | +GMM: V90 | ||
+ | |||
+ | OK | ||
+ | AT+GMI | ||
+ | |||
+ | +GMI: CONEXANT | ||
+ | |||
+ | OK | ||
+ | AT+GMS | ||
+ | |||
+ | ERROR | ||
+ | ^] | ||
+ | |||
+ | telnet> quit | ||
+ | Connection closed. | ||
+ | </ | ||
+ | |||
+ | \\ | ||
+ | |||
+ | ==== Java からシリアルポートへ簡単にアクセスする ==== | ||
+ | |||
+ | [[mae3xx_devel: | ||
+ | socat を使用してソケットプログラミングにより簡単にアクセスする方法もあるようです。 | ||
+ | |||
+ | * [[http:// | ||
+ | |||
+ | このような問題があるから、という理由だそうです。 | ||
+ | |||
+ | * The Java Communications 3.0 API looks awfully old and unmaintained. It is available for Solaris SPARC, Solaris x86, and Linux x86. | ||
+ | |||
+ | * RXTX is a mix between Java code and C code accessed through the Java native interface. It is hosted on a CVS server and it looks like the 2.2 release will never go out since it got stuck on version 2.2pre2 released in 2009. The last stable version is 2.1.7 from 2006. | ||
+ | |||
+ | * PureJavaComm is a drop-in replacement for those two libraries, written in Java and using JNA to interface with the system. It is simpler to setup than RXTX, is hosted on GitHub and is actively maintained. | ||
+ | |||
+ | |||
+ | |||
+ | \\ | ||
+ | |||
+ | ===== 設定事例集 ===== | ||
+ | |||
+ | * [[http:// | ||
+ | * [[https:// | ||
+ | |||
+ | < | ||
+ | |||
+ | // Examples for using socat (and filan) | ||
+ | |||
+ | |||
+ | //" | ||
+ | |||
+ | /////////////////////////////////////////////////////////////////////////////// | ||
+ | // similar to netcat | ||
+ | |||
+ | // connect to 10.1.1.1 on port 80 and relay to and from stdio | ||
+ | $ socat - TCP: | ||
+ | |||
+ | // listen on port 25, wait for an incoming connection, use CR+NL on this | ||
+ | // connection, relay data to and from stdio; | ||
+ | // then emulate a mailserver by hand :-) | ||
+ | # socat - TCP-LISTEN: | ||
+ | |||
+ | // listen on port 25, wait for an incoming connection, use CR+NL on this | ||
+ | // connection, relay data to and from stdio, but have line editing and history; | ||
+ | // then emulate a mailserver by hand :-) | ||
+ | # socat readline TCP-LISTEN: | ||
+ | |||
+ | // provide a transient history enabled front end to stupid line based | ||
+ | // interactive programs | ||
+ | $ socat readline exec:" | ||
+ | // same works for ftp (but password is not hidden) | ||
+ | |||
+ | // you may also use a file based history list | ||
+ | $ socat readline, | ||
+ | // using ~ as abbreviation for $HOME does not work! | ||
+ | |||
+ | // poor mans ' | ||
+ | # socat tcp-l: | ||
+ | // and here an appropriate client: | ||
+ | $ socat -, | ||
+ | // use ssl with client and server certificate for improved security; | ||
+ | // replace /bin/login by /bin/bash when using SSL client authentication, | ||
+ | // run without root then | ||
+ | |||
+ | // this is a cool trick, proposed by Christophe Lohr, to dump communications to | ||
+ | // two files; it would also work for other manipulations (recode, compress...) | ||
+ | // and it might also work with netcat ;-) | ||
+ | $ socat TCP-LISTEN: | ||
+ | |||
+ | /////////////////////////////////////////////////////////////////////////////// | ||
+ | // emergence solution because usleep(1) is not always available | ||
+ | // this will " | ||
+ | $ socat -T 0.1 pipe pipe | ||
+ | |||
+ | /////////////////////////////////////////////////////////////////////////////// | ||
+ | // a very primitive HTTP/1.0 echo server (problems: sends reply headers before | ||
+ | // request; hangs if client does not shutdown - HTTP keep-alive) | ||
+ | // wait for a connection on port 8000; do not wait for request, but immediately | ||
+ | // start a shell that sends reply headers and an empty line; then echo all | ||
+ | // incoming data back to client | ||
+ | $ socat TCP-LISTEN: | ||
+ | |||
+ | // a less primitive HTTP echo server that sends back not only the reqest but | ||
+ | // also server and client address and port. Might have portability issues with | ||
+ | // echo | ||
+ | ./socat -T 1 -d -d tcp-l: | ||
+ | |||
+ | /////////////////////////////////////////////////////////////////////////////// | ||
+ | // for communicating with an attached modem, I had reasonable results with | ||
+ | // following command line. Required privileges depend on device mode. | ||
+ | // after leaving socat, type " | ||
+ | // replace /dev/ttyS0 by the correct serial line or with /dev/modem | ||
+ | $ socat readline / | ||
+ | // or | ||
+ | $ socat readline / | ||
+ | // then enter " | ||
+ | |||
+ | /////////////////////////////////////////////////////////////////////////////// | ||
+ | // relay TCP port 80 from everywhere (internet, intranet, dmz) through your | ||
+ | // firewall to your DMZ webserver (like plug-gw) | ||
+ | // listen on port 80; whenever a connection is made, fork a new process (parent | ||
+ | // process keeps accepting connections), | ||
+ | // www.dmz.mydomain.org on port 80. | ||
+ | // attention: this is a substitute for a reverse proxy without providing | ||
+ | // application level security. | ||
+ | # socat TCP-LISTEN: | ||
+ | // Note: parent process keeps running as root, su after forking | ||
+ | |||
+ | /////////////////////////////////////////////////////////////////////////////// | ||
+ | // relay mail from your DMZ server through your firewall. | ||
+ | // accept connections only on dmz interface and allow connections only from | ||
+ | // smtp.dmz.mydomain.org. | ||
+ | // the advantages over plug-gw and other relays are: | ||
+ | // * you can bind to an IP address (even an alias), therefore enhance security | ||
+ | // * in your OS you can create several IP aliases and bind another socat daemon | ||
+ | // to each, making several application servers addressable | ||
+ | // * lots of options, like switching user, chroot, IP performance tuning | ||
+ | // * no need for inetd | ||
+ | # socat -lm -d -d TCP-LISTEN: | ||
+ | |||
+ | /////////////////////////////////////////////////////////////////////////////// | ||
+ | // convert line terminator in ascii streams, stdin to stdout | ||
+ | // use unidirectional mode, convert nl to crnl | ||
+ | $ socat -u - -,crlf | ||
+ | // or cr to nl | ||
+ | $ socat -u -,cr - | ||
+ | |||
+ | // save piped data similar to ' | ||
+ | // copies stdin to stdout, but writes everything to the file too | ||
+ | $ socat -,echo=0 open:/ | ||
+ | |||
+ | /////////////////////////////////////////////////////////////////////////////// | ||
+ | // intrusion testing | ||
+ | |||
+ | // found an XWindow Server behind IP filters with FTP data hole? (you are | ||
+ | // lucky!) | ||
+ | // prepare your host: | ||
+ | # rm -f / | ||
+ | // relay a pseudo display :1 on your machine to victim:0 | ||
+ | # socat UNIX-LISTEN:/ | ||
+ | // and try to take a screendump (must be very lucky - when server has not even | ||
+ | // host based authentication!) | ||
+ | # xwd -root -display :1 -silent > | ||
+ | |||
+ | // you sit behind a socks firewall that has IP filters but lazily allows socks | ||
+ | // connections to loopback and has only host based X11 security. | ||
+ | // like above, but from your inside client: | ||
+ | # socat UNIX-LISTEN:/ | ||
+ | // or for the HTTP proxy: | ||
+ | # socat UNIX-LISTEN:/ | ||
+ | |||
+ | /////////////////////////////////////////////////////////////////////////////// | ||
+ | // forms of stdin with stdout, all equivalent | ||
+ | $ socat echo - | ||
+ | $ socat echo STDIO | ||
+ | $ socat echo STDIN!!STDOUT | ||
+ | $ socat echo STDIO!!STDIO | ||
+ | $ socat echo -!!- | ||
+ | $ socat echo FD:0!!FD:1 | ||
+ | $ socat echo 0!!1 | ||
+ | $ socat echo / | ||
+ | |||
+ | /////////////////////////////////////////////////////////////////////////////// | ||
+ | // some echo address examples | ||
+ | $ socat - PIPE | ||
+ | $ socat - PIPE:/ | ||
+ | $ socat - PIPE:/ | ||
+ | $ socat - EXEC:/ | ||
+ | $ socat - SYSTEM:/ | ||
+ | $ socat - TCP: | ||
+ | $ socat - UDP: | ||
+ | $ socat - / | ||
+ | $ socat - UDP: | ||
+ | $ socat - TCP: | ||
+ | # socat - IP: | ||
+ | // Linux might drop packets with less than 8 bytes payload) | ||
+ | |||
+ | /////////////////////////////////////////////////////////////////////////////// | ||
+ | // unidirectional data transfer | ||
+ | $ socat -u - - | ||
+ | // like "tail -f", but start with showing all file contents | ||
+ | $ socat -u FILE:/ | ||
+ | // like "tail -f", but do not show existing file contents | ||
+ | $ socat -u FILE:/ | ||
+ | // write to new file, create with given permission and group (must be member) - race condition with group!!! | ||
+ | $ socat -u - CREATE:/ | ||
+ | // | ||
+ | // for an existing file / | ||
+ | # socat -u - FILE:/ | ||
+ | |||
+ | |||
+ | /////////////////////////////////////////////////////////////////////////////// | ||
+ | // file handling | ||
+ | $ socat - FILE:/ | ||
+ | |||
+ | /////////////////////////////////////////////////////////////////////////////// | ||
+ | // unix socket handling | ||
+ | |||
+ | // create a listening unix socket | ||
+ | $ rm -f / | ||
+ | // from another terminal, connect to this socket | ||
+ | $ socat UNIX:/ | ||
+ | // then transfer data bidirectionally | ||
+ | |||
+ | |||
+ | /////////////////////////////////////////////////////////////////////////////// | ||
+ | // transport examples | ||
+ | |||
+ | // socks relay (externally socksify applications); | ||
+ | // your ssh client and OS are not socksified, but you want to pass a socks | ||
+ | // server with ssh: | ||
+ | $ socat TCP-LISTEN: | ||
+ | $ ssh -p 10022 loopback | ||
+ | // or better define a ProxyCommand in ~/ | ||
+ | ProxyCommand socat - SOCKS: | ||
+ | // and with proxy: | ||
+ | ProxyCommand socat - PROXY: | ||
+ | |||
+ | /////////////////////////////////////////////////////////////////////////////// | ||
+ | // application examples | ||
+ | |||
+ | // run sendmail daemon with your favorite network options | ||
+ | # socat TCP-LISTEN: | ||
+ | |||
+ | // local mail delivery over UNIX socket - no SUID program required | ||
+ | # socat UNIX-LISTEN:/ | ||
+ | $ socat - / | ||
+ | |||
+ | /////////////////////////////////////////////////////////////////////////////// | ||
+ | // uses of filan | ||
+ | // see what your operating system opens for you | ||
+ | $ filan | ||
+ | // or if that was too detailled | ||
+ | $ filan -s | ||
+ | // see what file descriptors are passed via exec function | ||
+ | $ socat - EXEC: | ||
+ | $ socat - EXEC:filan | ||
+ | $ socat - EXEC: | ||
+ | $ socat - EXEC: | ||
+ | $ socat - EXEC: | ||
+ | // see what's done by your shell and with option " | ||
+ | $ socat - SYSTEM: | ||
+ | // see if gdb gives you an equivalent environment or opens some files for your program | ||
+ | $ gdb ./filan | ||
+ | (gdb) r | ||
+ | (gdb) r -s | ||
+ | |||
+ | /////////////////////////////////////////////////////////////////////////////// | ||
+ | // want to use chat from the ppp package? | ||
+ | // note: some OS's do not need " | ||
+ | // note: chat might send bytes one by one | ||
+ | // with AIX, a similar program is available under the name " | ||
+ | $ socat -d -d tcp: | ||
+ | |||
+ | ////////////////////////////////////////////////////////////////////////////// | ||
+ | // IP6 | ||
+ | |||
+ | # socat readline TCP6: | ||
+ | |||
+ | |||
+ | /////////////////////////////////////////////////////////////////////////////// | ||
+ | // application server solutions | ||
+ | // run a program (here: /bin/sh) chrooted, unprivileged; | ||
+ | // parent process stays in real / running as root | ||
+ | # socat -d -d - EXEC:/ | ||
+ | |||
+ | // make a program available on the network chrooted, unprivileged; | ||
+ | // parent process stays in / running as root | ||
+ | // script path is already chrooted | ||
+ | # ./socat -lm -d -d TCP-LISTEN: | ||
+ | // to avoid terminal problems, you might - instead of telnet - connect using | ||
+ | $ socat -, | ||
+ | |||
+ | |||
+ | // access local display from ssh server, when ssh port forwarding is disabled | ||
+ | // socat must be installed on ssh server host | ||
+ | // might have to use xauth... | ||
+ | // this example is one-shot because ssh can handle only one channel | ||
+ | xterm1$ socat -d -d exec:" | ||
+ | xterm2$ ssh target | ||
+ | target$ DISPLAY=:9 myxapplication | ||
+ | |||
+ | // touch with perms: | ||
+ | // no race condition for perms (applied with creat() call) | ||
+ | $ socat -u /dev/null creat:/ | ||
+ | |||
+ | // touch with owner and perms: | ||
+ | // race condition before changing owner, but who cares - only root may access | ||
+ | # socat -u /dev/null creat:/ | ||
+ | |||
+ | // invoke an interactive ssh with exec | ||
+ | // first example passes control chars (^C etc.) to remote server as usual | ||
+ | socat -, | ||
+ | // second example interprets control chars on local command line | ||
+ | socat -, | ||
+ | // afterwards, type " | ||
+ | |||
+ | // convince ssh to provide an " | ||
+ | // three main versions for entering password: | ||
+ | // 1) from your TTY; have 10 seconds to enter password: | ||
+ | (sleep 10; echo " | ||
+ | // 2) from XWindows (DISPLAY !); again 10 seconds | ||
+ | (sleep 10; echo " | ||
+ | // 3) from script | ||
+ | (sleep 5; echo PASSWORD; echo ls; sleep 1) |./socat - exec:' | ||
+ | |||
+ | |||
+ | // download with proxy CONNECT | ||
+ | // use echo -e if required for \n | ||
+ | $ (echo -e " | ||
+ | / | ||
+ | |||
+ | // retrieve a file from an sshd site with sourceforge style entry menu; | ||
+ | // fill in your personal values; cat lets you enter your password (will be | ||
+ | // visible on screen) | ||
+ | $ (sleep 10; read pass; echo $pass; sleep 10; echo M; sleep 5; echo cat FILENAME; sleep 10) |./socat -d -d -ly - EXEC:' | ||
+ | |||
+ | // multicast community on local network: start the following command on all | ||
+ | // participating hosts; like a conference call: | ||
+ | # socat -d -d -d -d - udp-datagram: | ||
+ | // or | ||
+ | $ socat -d -d -d -d - udp-datagram: | ||
+ | // possible reasons for failure: | ||
+ | // iptables or other filters (open your filters as required) | ||
+ | // packets leave via wrong interface (set route: ...) | ||
+ | // socket bound to specific address | ||
+ | |||
+ | // | ||
+ | // GENERIC FUNCTION CALLS | ||
+ | |||
+ | // ioctl(): open CD drive (given value valid on Linux) | ||
+ | // on my Linux system I find in / | ||
+ | // #define CDROMEJECT | ||
+ | // the following command makes something like ioctl(fd, CDROMEJECT, NULL) | ||
+ | // (don't care about the read error): | ||
+ | $ socat / | ||
+ | |||
+ | // setsockopt(): | ||
+ | // the following command performs - beyond lots of overhead - something like: | ||
+ | // myint=1; setsockopt(fd, | ||
+ | $ socat -u udp-recv: | ||
+ | // setsockopt(): | ||
+ | |||
+ | // ways to apply SO_BINDTODEVICE without using the special socat address option | ||
+ | // so-bindtodevice: | ||
+ | // with string argument: | ||
+ | $ sudo ./socat tcp-l: | ||
+ | // with binary argument: | ||
+ | $ sudo ./socat tcp-l: | ||
+ | |||
+ | =============================================================================== | ||
+ | |||
+ | // not tested, just ideas, or have problems | ||
+ | |||
+ | |||
+ | // traverse firewall for making internal telnet server accessible for outside | ||
+ | // telnet client, when only outbound traffic (syn-filter) is allowed: | ||
+ | // on external client run " | ||
+ | // connection from localhost on port 10023, and, when it is established, | ||
+ | // for a connection from anywhere to port 20023: | ||
+ | ext$ socat -d TCP-LISTEN: | ||
+ | // on internal server run double client: | ||
+ | int$ socat -d TCP: | ||
+ | // or, with socks firewall: | ||
+ | int$ socat -d TCP: | ||
+ | // login with: | ||
+ | ext$ telnet localhost 20023 | ||
+ | |||
+ | // you can make a double server capable of handling multiple instances: | ||
+ | ext$ socat -d TCP-LISTEN: | ||
+ | |||
+ | // access remote display via ssh, when ssh port forwarding is disabled | ||
+ | $ socat -d -d EXEC:" | ||
+ | $ xclock -display localhost: | ||
+ | |||
+ | // relay multiple webserver addresses through your firewall into your DMZ: | ||
+ | // make IP aliases on your firewall, and then: | ||
+ | # socat -d -d TCP-L: | ||
+ | # socat -d -d TCP-L: | ||
+ | // and for improved security: | ||
+ | # socat -d -d TCP-L: | ||
+ | |||
+ | // proxy an arbitrary IP protocol over your firewall (answers won't work) | ||
+ | # socat -d -d IP: | ||
+ | |||
+ | // proxy an unsupported IP protocol over your firewall, point to point | ||
+ | // end points see firewall interfaces as IP peers! | ||
+ | # socat -d -d IP: | ||
+ | // note that, for IPsec, you might face problems that are known with NAT | ||
+ | </ | ||
+ | |||
+ | \\ | ||
+ | |||
+ | ====== その他情報 ====== | ||
+ | |||
+ | * [[http:// | ||
+ | * [[http:// | ||
+ | * [[http:// |