summaryrefslogtreecommitdiffstats
path: root/examples/network/doc/src/secureudpserver.qdoc
blob: 3d224d91bc7fdcd77457796428d2474abfe628ae (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
// Copyright (C) 2018 The Qt Company Ltd.
// SPDX-License-Identifier: LicenseRef-Qt-Commercial OR GFDL-1.3-no-invariants-only

/*!
    \example secureudpserver
    \title DTLS server
    \examplecategory {Networking}
    \ingroup examples-network
    \brief This examples demonstrates how to implement a simple DTLS server.

    \image secureudpserver-example.png Screenshot of the DTLS server example.

    \note The DTLS server example is intended to be run alongside the \l{secureudpclient}{DTLS client} example.

    The server is implemented by the DtlsServer class. It uses QUdpSocket,
    QDtlsClientVerifier, and QDtls to test each client's reachability, complete a handshake,
    and read and write encrypted messages.

    \snippet secureudpserver/server.h 0

    The constructor connects the QUdpSocket::readyRead() signal to its
    readyRead() slot and sets the minimal needed TLS configuration:

    \snippet secureudpserver/server.cpp 1

    \note The server is not using a certificate and is relying on Pre-Shared
    Key (PSK) handshake.

    listen() binds QUdpSocket:

    \snippet secureudpserver/server.cpp 2

    The readyRead() slot processes incoming datagrams:

    \dots
    \snippet secureudpserver/server.cpp 3
    \dots

    After extracting an address and a port number, the server first tests
    if it's a datagram from an already known peer:

    \dots
    \snippet secureudpserver/server.cpp 4
    \dots

    If it is a new, unknown address and port, the datagram is processed as a
    potential ClientHello message, sent by a DTLS client:

    \dots
    \snippet secureudpserver/server.cpp 5
    \dots

    If it's a known DTLS client, the server either decrypts the datagram:

    \dots
    \snippet secureudpserver/server.cpp 6
    \dots

    or continues a handshake with this peer:

    \dots
    \snippet secureudpserver/server.cpp 7
    \dots

    handleNewConnection() verifies it's a reachable DTLS client, or sends a
    HelloVerifyRequest:

    \snippet secureudpserver/server.cpp 8
    \dots

    If the new client was verified to be a reachable DTLS client, the server creates
    and configures a new QDtls object, and starts a server-side handshake:

    \dots
    \snippet secureudpserver/server.cpp 9
    \dots

    doHandshake() progresses through the handshake phase:

    \snippet secureudpserver/server.cpp 11

    During the handshake phase, the QDtls::pskRequired() signal is emitted and
    the pskRequired() slot provides the preshared key:

    \snippet secureudpserver/server.cpp 13

    \note For the sake of brevity, the definition of pskRequired() is oversimplified.
    The documentation for the QSslPreSharedKeyAuthenticator class explains in detail
    how this slot can be properly implemented.

    After the handshake is completed for the network peer, an encrypted DTLS
    connection is considered to be established and the server decrypts subsequent
    datagrams, sent by the peer, by calling decryptDatagram(). The server also
    sends an encrypted response to the peer:

    \snippet secureudpserver/server.cpp 12

    The server closes its DTLS connections by calling QDtls::shutdown():

    \snippet secureudpserver/server.cpp 14

    During its operation, the server reports errors, informational messages, and
    decrypted datagrams, by emitting signals errorMessage(), warningMessage(),
    infoMessage(), and datagramReceived(). These messages are logged by the server's
    UI:

    \snippet secureudpserver/mainwindow.cpp 0
*/