proxy.c 8.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366
  1. /*
  2. proxy.c -- Proxy handling functions.
  3. Copyright (C) 2015-2017 Guus Sliepen <guus@tinc-vpn.org>
  4. This program is free software; you can redistribute it and/or modify
  5. it under the terms of the GNU General Public License as published by
  6. the Free Software Foundation; either version 2 of the License, or
  7. (at your option) any later version.
  8. This program is distributed in the hope that it will be useful,
  9. but WITHOUT ANY WARRANTY; without even the implied warranty of
  10. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  11. GNU General Public License for more details.
  12. You should have received a copy of the GNU General Public License along
  13. with this program; if not, write to the Free Software Foundation, Inc.,
  14. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
  15. */
  16. #include "system.h"
  17. #include "connection.h"
  18. #include "logger.h"
  19. #include "meta.h"
  20. #include "netutl.h"
  21. #include "protocol.h"
  22. #include "proxy.h"
  23. #include "utils.h" //
  24. proxytype_t proxytype;
  25. char *proxyhost;
  26. char *proxyport;
  27. char *proxyuser;
  28. char *proxypass;
  29. static void update_address_ipv4(connection_t *c, void *address, void *port) {
  30. sockaddrfree(&c->address);
  31. memset(&c->address, 0, sizeof(c->address));
  32. c->address.sa.sa_family = AF_INET;
  33. if(address) {
  34. memcpy(&c->address.in.sin_addr, address, sizeof(ipv4_t));
  35. }
  36. if(port) {
  37. memcpy(&c->address.in.sin_port, port, sizeof(uint16_t));
  38. }
  39. // OpenSSH -D returns all zero address, set it to 0.0.0.1 to prevent spamming ourselves.
  40. if(!memcmp(&c->address.in.sin_addr, "\0\0\0\0", 4)) {
  41. memcpy(&c->address.in.sin_addr, "\0\0\0\01", 4);
  42. }
  43. }
  44. static void update_address_ipv6(connection_t *c, void *address, void *port) {
  45. sockaddrfree(&c->address);
  46. memset(&c->address, 0, sizeof(c->address));
  47. c->address.sa.sa_family = AF_INET6;
  48. if(address) {
  49. memcpy(&c->address.in6.sin6_addr, address, sizeof(ipv6_t));
  50. }
  51. if(port) {
  52. memcpy(&c->address.in6.sin6_port, port, sizeof(uint16_t));
  53. }
  54. // OpenSSH -D returns all zero address, set it to 0100:: to prevent spamming ourselves.
  55. if(!memcmp(&c->address.in6.sin6_addr, "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 16)) {
  56. memcpy(&c->address.in6.sin6_addr, "\01\0\0\0\0\0\0\0", 8);
  57. }
  58. }
  59. bool send_proxyrequest(connection_t *c) {
  60. switch(proxytype) {
  61. case PROXY_SOCKS4:
  62. if(c->address.sa.sa_family != AF_INET) {
  63. logger(LOG_ERR, "Can only connect to numeric IPv4 addresses through a SOCKS 4 proxy!");
  64. return false;
  65. }
  66. // fallthrough
  67. case PROXY_SOCKS4A: {
  68. if(c->address.sa.sa_family != AF_INET && c->address.sa.sa_family != AF_UNKNOWN) {
  69. logger(LOG_ERR, "Can only connect to IPv4 addresses or hostnames through a SOCKS 4a proxy!");
  70. return false;
  71. }
  72. int len = 9;
  73. if(proxyuser) {
  74. len += strlen(proxyuser);
  75. }
  76. if(c->address.sa.sa_family == AF_UNKNOWN) {
  77. len += 1 + strlen(c->address.unknown.address);
  78. }
  79. char s4req[len];
  80. s4req[0] = 4;
  81. s4req[1] = 1;
  82. if(c->address.sa.sa_family == AF_INET) {
  83. memcpy(s4req + 2, &c->address.in.sin_port, 2);
  84. memcpy(s4req + 4, &c->address.in.sin_addr, 4);
  85. } else {
  86. uint16_t port = htons(atoi(c->address.unknown.port));
  87. memcpy(s4req + 2, &port, 2);
  88. memcpy(s4req + 4, "\0\0\0\1", 4);
  89. strcpy(s4req + (9 + (proxyuser ? strlen(proxyuser) : 0)), c->address.unknown.address);
  90. }
  91. if(proxyuser) {
  92. strcpy(s4req + 8, proxyuser);
  93. } else {
  94. s4req[8] = 0;
  95. }
  96. s4req[sizeof(s4req) - 1] = 0;
  97. c->allow_request = PROXY;
  98. return send_meta(c, s4req, sizeof(s4req));
  99. }
  100. case PROXY_SOCKS5: {
  101. int len = 3 + 6;
  102. if(c->address.sa.sa_family == AF_INET) {
  103. len += 4;
  104. } else if(c->address.sa.sa_family == AF_INET6) {
  105. len += 16;
  106. } else if(c->address.sa.sa_family == AF_UNKNOWN) {
  107. len += 1 + strlen(c->address.unknown.address);
  108. } else {
  109. logger(LOG_ERR, "Address family %x not supported for SOCKS 5 proxies!", c->address.sa.sa_family);
  110. return false;
  111. }
  112. if(proxypass) {
  113. len += 3 + strlen(proxyuser) + strlen(proxypass);
  114. }
  115. char s5req[len];
  116. int i = 0;
  117. s5req[i++] = 5;
  118. s5req[i++] = 1;
  119. if(proxypass) {
  120. s5req[i++] = 2;
  121. s5req[i++] = 1;
  122. s5req[i++] = strlen(proxyuser);
  123. strcpy(s5req + i, proxyuser);
  124. i += strlen(proxyuser);
  125. s5req[i++] = strlen(proxypass);
  126. strcpy(s5req + i, proxypass);
  127. i += strlen(proxypass);
  128. } else {
  129. s5req[i++] = 0;
  130. }
  131. s5req[i++] = 5;
  132. s5req[i++] = 1;
  133. s5req[i++] = 0;
  134. if(c->address.sa.sa_family == AF_INET) {
  135. s5req[i++] = 1;
  136. memcpy(s5req + i, &c->address.in.sin_addr, 4);
  137. i += 4;
  138. memcpy(s5req + i, &c->address.in.sin_port, 2);
  139. i += 2;
  140. } else if(c->address.sa.sa_family == AF_INET6) {
  141. s5req[i++] = 4;
  142. memcpy(s5req + i, &c->address.in6.sin6_addr, 16);
  143. i += 16;
  144. memcpy(s5req + i, &c->address.in6.sin6_port, 2);
  145. i += 2;
  146. } else if(c->address.sa.sa_family == AF_UNKNOWN) {
  147. s5req[i++] = 3;
  148. int len = strlen(c->address.unknown.address);
  149. s5req[i++] = len;
  150. memcpy(s5req + i, c->address.unknown.address, len);
  151. i += len;
  152. uint16_t port = htons(atoi(c->address.unknown.port));
  153. memcpy(s5req + i, &port, 2);
  154. i += 2;
  155. } else {
  156. logger(LOG_ERR, "Unknown address family while trying to connect to SOCKS5 proxy");
  157. return false;
  158. }
  159. if(i > len) {
  160. abort();
  161. }
  162. c->allow_request = PROXY;
  163. return send_meta(c, s5req, sizeof(s5req));
  164. }
  165. case PROXY_HTTP: {
  166. char *host;
  167. char *port;
  168. sockaddr2str(&c->address, &host, &port);
  169. send_request(c, "CONNECT %s:%s HTTP/1.1\r\n\r", host, port);
  170. free(host);
  171. free(port);
  172. c->allow_request = PROXY;
  173. return true;
  174. }
  175. case PROXY_EXEC:
  176. abort();
  177. default:
  178. logger(LOG_ERR, "Unknown proxy type");
  179. return false;
  180. }
  181. }
  182. int receive_proxy_meta(connection_t *c) {
  183. switch(proxytype) {
  184. case PROXY_SOCKS4:
  185. case PROXY_SOCKS4A:
  186. if(c->buflen < 8) {
  187. return 0;
  188. }
  189. if(c->buffer[0] == 0 && c->buffer[1] == 0x5a) {
  190. if(c->address.sa.sa_family == AF_UNKNOWN) {
  191. update_address_ipv4(c, c->buffer + 4, c->buffer + 2);
  192. }
  193. ifdebug(CONNECTIONS) logger(LOG_DEBUG, "Proxy request granted");
  194. c->allow_request = ID;
  195. c->status.proxy_passed = true;
  196. send_id(c);
  197. return 8;
  198. } else {
  199. logger(LOG_ERR, "Proxy request rejected");
  200. return -1;
  201. }
  202. case PROXY_SOCKS5:
  203. if(c->buflen < 2) {
  204. return 0;
  205. }
  206. if(c->buffer[0] != 0x05 || c->buffer[1] == (char)0xff) {
  207. logger(LOG_ERR, "Proxy authentication method rejected");
  208. return -1;
  209. }
  210. int offset = 2;
  211. if(c->buffer[1] == 0x02) {
  212. if(c->buflen < 4) {
  213. return 0;
  214. }
  215. if(c->buffer[2] != 0x05 || c->buffer[3] != 0x00) {
  216. logger(LOG_ERR, "Proxy username/password rejected");
  217. return -1;
  218. }
  219. offset += 2;
  220. }
  221. if(c->buflen - offset < 7) {
  222. return 0;
  223. }
  224. if(c->buffer[offset] != 0x05 || c->buffer[offset + 1] != 0x00) {
  225. logger(LOG_ERR, "Proxy request rejected");
  226. return -1;
  227. }
  228. int replen = offset + 6;
  229. switch(c->buffer[offset + 3]) {
  230. case 0x01: // IPv4
  231. if(c->address.sa.sa_family == AF_UNKNOWN) {
  232. update_address_ipv4(c, c->buffer + offset + 4, c->buffer + offset + 8);
  233. }
  234. replen += 4;
  235. break;
  236. case 0x03: // Hostname
  237. if(c->address.sa.sa_family == AF_UNKNOWN) {
  238. update_address_ipv4(c, "\0\0\0\1", "\0\0");
  239. }
  240. replen += ((uint8_t *)c->buffer)[offset + 4];
  241. break;
  242. case 0x04: // IPv6
  243. if(c->address.sa.sa_family == AF_UNKNOWN) {
  244. update_address_ipv6(c, c->buffer + offset + 4, c->buffer + offset + 20);
  245. }
  246. replen += 16;
  247. break;
  248. default:
  249. logger(LOG_ERR, "Proxy reply malformed");
  250. return -1;
  251. }
  252. if(c->buflen < replen) {
  253. return 0;
  254. } else {
  255. ifdebug(CONNECTIONS) logger(LOG_DEBUG, "Proxy request granted");
  256. c->allow_request = ID;
  257. c->status.proxy_passed = true;
  258. send_id(c);
  259. return replen;
  260. }
  261. case PROXY_HTTP: {
  262. char *p = memchr(c->buffer, '\n', c->buflen);
  263. if(!p || p - c->buffer >= c->buflen) {
  264. return 0;
  265. }
  266. while((p = memchr(p + 1, '\n', c->buflen - (p + 1 - c->buffer)))) {
  267. if(p > c->buffer + 3 && !memcmp(p - 3, "\r\n\r\n", 4)) {
  268. break;
  269. }
  270. }
  271. if(!p) {
  272. return 0;
  273. }
  274. if(c->buflen < 9) {
  275. return 0;
  276. }
  277. if(!strncasecmp(c->buffer, "HTTP/1.1 ", 9)) {
  278. if(!strncmp(c->buffer + 9, "200", 3)) {
  279. if(c->address.sa.sa_family == AF_UNKNOWN) {
  280. update_address_ipv4(c, "\0\0\0\1", "\0\0");
  281. }
  282. logger(LOG_DEBUG, "Proxy request granted");
  283. replen = p + 1 - c->buffer;
  284. c->allow_request = ID;
  285. c->status.proxy_passed = true;
  286. send_id(c);
  287. return replen;
  288. } else {
  289. p = memchr(c->buffer, '\n', c->buflen);
  290. p[-1] = 0;
  291. logger(LOG_ERR, "Proxy request rejected: %s", c->buffer + 9);
  292. return false;
  293. }
  294. } else {
  295. logger(LOG_ERR, "Proxy reply malformed");
  296. return -1;
  297. }
  298. }
  299. default:
  300. abort();
  301. }
  302. }