|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#include "server_setup.h" |
|
|
#include <stdlib.h> |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#include <signal.h> |
|
|
#ifdef HAVE_NETINET_IN_H |
|
|
#include <netinet/in.h> |
|
|
#endif |
|
|
#ifdef HAVE_NETINET_IN6_H |
|
|
#include <netinet/in6.h> |
|
|
#endif |
|
|
#ifdef HAVE_ARPA_INET_H |
|
|
#include <arpa/inet.h> |
|
|
#endif |
|
|
#ifdef HAVE_NETDB_H |
|
|
#include <netdb.h> |
|
|
#endif |
|
|
|
|
|
#include "curlx.h" |
|
|
#include "getpart.h" |
|
|
#include "inet_pton.h" |
|
|
#include "util.h" |
|
|
#include "server_sockaddr.h" |
|
|
#include "warnless.h" |
|
|
|
|
|
|
|
|
#include "memdebug.h" |
|
|
|
|
|
#ifdef USE_WINSOCK |
|
|
#undef EINTR |
|
|
#define EINTR 4 |
|
|
#undef EAGAIN |
|
|
#define EAGAIN 11 |
|
|
#undef ENOMEM |
|
|
#define ENOMEM 12 |
|
|
#undef EINVAL |
|
|
#define EINVAL 22 |
|
|
#endif |
|
|
|
|
|
#define DEFAULT_PORT 8905 |
|
|
|
|
|
#ifndef DEFAULT_LOGFILE |
|
|
#define DEFAULT_LOGFILE "log/socksd.log" |
|
|
#endif |
|
|
|
|
|
#ifndef DEFAULT_REQFILE |
|
|
#define DEFAULT_REQFILE "log/socksd-request.log" |
|
|
#endif |
|
|
|
|
|
#ifndef DEFAULT_CONFIG |
|
|
#define DEFAULT_CONFIG "socksd.config" |
|
|
#endif |
|
|
|
|
|
static const char *backendaddr = "127.0.0.1"; |
|
|
static unsigned short backendport = 0; |
|
|
|
|
|
struct configurable { |
|
|
unsigned char version; |
|
|
|
|
|
unsigned char nmethods_min; |
|
|
unsigned char nmethods_max; |
|
|
unsigned char responseversion; |
|
|
unsigned char responsemethod; |
|
|
unsigned char reqcmd; |
|
|
unsigned char connectrep; |
|
|
unsigned short port; |
|
|
char addr[32]; |
|
|
char user[256]; |
|
|
char password[256]; |
|
|
}; |
|
|
|
|
|
#define CONFIG_VERSION 5 |
|
|
#define CONFIG_NMETHODS_MIN 1 |
|
|
#define CONFIG_NMETHODS_MAX 3 |
|
|
#define CONFIG_RESPONSEVERSION CONFIG_VERSION |
|
|
#define CONFIG_RESPONSEMETHOD 0 |
|
|
#define CONFIG_REQCMD 1 |
|
|
#define CONFIG_PORT backendport |
|
|
#define CONFIG_ADDR backendaddr |
|
|
#define CONFIG_CONNECTREP 0 |
|
|
|
|
|
static struct configurable config; |
|
|
|
|
|
const char *serverlogfile = DEFAULT_LOGFILE; |
|
|
static const char *reqlogfile = DEFAULT_REQFILE; |
|
|
static const char *configfile = DEFAULT_CONFIG; |
|
|
|
|
|
static const char *socket_type = "IPv4"; |
|
|
static unsigned short port = DEFAULT_PORT; |
|
|
|
|
|
static void resetdefaults(void) |
|
|
{ |
|
|
logmsg("Reset to defaults"); |
|
|
config.version = CONFIG_VERSION; |
|
|
config.nmethods_min = CONFIG_NMETHODS_MIN; |
|
|
config.nmethods_max = CONFIG_NMETHODS_MAX; |
|
|
config.responseversion = CONFIG_RESPONSEVERSION; |
|
|
config.responsemethod = CONFIG_RESPONSEMETHOD; |
|
|
config.reqcmd = CONFIG_REQCMD; |
|
|
config.connectrep = CONFIG_CONNECTREP; |
|
|
config.port = CONFIG_PORT; |
|
|
strcpy(config.addr, CONFIG_ADDR); |
|
|
strcpy(config.user, "user"); |
|
|
strcpy(config.password, "password"); |
|
|
} |
|
|
|
|
|
static unsigned char byteval(char *value) |
|
|
{ |
|
|
unsigned long num = strtoul(value, NULL, 10); |
|
|
return num & 0xff; |
|
|
} |
|
|
|
|
|
static unsigned short shortval(char *value) |
|
|
{ |
|
|
unsigned long num = strtoul(value, NULL, 10); |
|
|
return num & 0xffff; |
|
|
} |
|
|
|
|
|
static enum { |
|
|
socket_domain_inet = AF_INET |
|
|
#ifdef USE_IPV6 |
|
|
, socket_domain_inet6 = AF_INET6 |
|
|
#endif |
|
|
#ifdef USE_UNIX_SOCKETS |
|
|
, socket_domain_unix = AF_UNIX |
|
|
#endif |
|
|
} socket_domain = AF_INET; |
|
|
|
|
|
static void getconfig(void) |
|
|
{ |
|
|
FILE *fp = fopen(configfile, FOPEN_READTEXT); |
|
|
resetdefaults(); |
|
|
if(fp) { |
|
|
char buffer[512]; |
|
|
logmsg("parse config file"); |
|
|
while(fgets(buffer, sizeof(buffer), fp)) { |
|
|
char key[32]; |
|
|
char value[260]; |
|
|
if(2 == sscanf(buffer, "%31s %259s", key, value)) { |
|
|
if(!strcmp(key, "version")) { |
|
|
config.version = byteval(value); |
|
|
logmsg("version [%d] set", config.version); |
|
|
} |
|
|
else if(!strcmp(key, "nmethods_min")) { |
|
|
config.nmethods_min = byteval(value); |
|
|
logmsg("nmethods_min [%d] set", config.nmethods_min); |
|
|
} |
|
|
else if(!strcmp(key, "nmethods_max")) { |
|
|
config.nmethods_max = byteval(value); |
|
|
logmsg("nmethods_max [%d] set", config.nmethods_max); |
|
|
} |
|
|
else if(!strcmp(key, "backend")) { |
|
|
strcpy(config.addr, value); |
|
|
logmsg("backend [%s] set", config.addr); |
|
|
} |
|
|
else if(!strcmp(key, "backendport")) { |
|
|
config.port = shortval(value); |
|
|
logmsg("backendport [%d] set", config.port); |
|
|
} |
|
|
else if(!strcmp(key, "user")) { |
|
|
strcpy(config.user, value); |
|
|
logmsg("user [%s] set", config.user); |
|
|
} |
|
|
else if(!strcmp(key, "password")) { |
|
|
strcpy(config.password, value); |
|
|
logmsg("password [%s] set", config.password); |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
else if(!strcmp(key, "method")) { |
|
|
config.responsemethod = byteval(value); |
|
|
logmsg("method [%d] set", config.responsemethod); |
|
|
} |
|
|
else if(!strcmp(key, "response")) { |
|
|
config.connectrep = byteval(value); |
|
|
logmsg("response [%d] set", config.connectrep); |
|
|
} |
|
|
} |
|
|
} |
|
|
fclose(fp); |
|
|
} |
|
|
} |
|
|
|
|
|
static void loghex(unsigned char *buffer, ssize_t len) |
|
|
{ |
|
|
char data[1200]; |
|
|
ssize_t i; |
|
|
unsigned char *ptr = buffer; |
|
|
char *optr = data; |
|
|
ssize_t width = 0; |
|
|
int left = sizeof(data); |
|
|
|
|
|
for(i = 0; i < len && (left >= 0); i++) { |
|
|
msnprintf(optr, left, "%02x", ptr[i]); |
|
|
width += 2; |
|
|
optr += 2; |
|
|
left -= 2; |
|
|
} |
|
|
if(width) |
|
|
logmsg("'%s'", data); |
|
|
} |
|
|
|
|
|
|
|
|
#define SOCKS5_VERSION 0 |
|
|
#define SOCKS5_NMETHODS 1 |
|
|
|
|
|
|
|
|
#define SOCKS5_REQCMD 1 |
|
|
#define SOCKS5_RESERVED 2 |
|
|
#define SOCKS5_ATYP 3 |
|
|
#define SOCKS5_DSTADDR 4 |
|
|
|
|
|
|
|
|
#define SOCKS5_REP 1 |
|
|
#define SOCKS5_BNDADDR 4 |
|
|
|
|
|
|
|
|
#define SOCKS5_ULEN 1 |
|
|
#define SOCKS5_UNAME 2 |
|
|
|
|
|
#define SOCKS4_CD 1 |
|
|
#define SOCKS4_DSTPORT 2 |
|
|
|
|
|
|
|
|
static curl_socket_t socksconnect(unsigned short connectport, |
|
|
const char *connectaddr) |
|
|
{ |
|
|
int rc; |
|
|
srvr_sockaddr_union_t me; |
|
|
curl_socket_t sock = socket(AF_INET, SOCK_STREAM, 0); |
|
|
if(sock == CURL_SOCKET_BAD) |
|
|
return CURL_SOCKET_BAD; |
|
|
memset(&me.sa4, 0, sizeof(me.sa4)); |
|
|
me.sa4.sin_family = AF_INET; |
|
|
me.sa4.sin_port = htons(connectport); |
|
|
me.sa4.sin_addr.s_addr = INADDR_ANY; |
|
|
Curl_inet_pton(AF_INET, connectaddr, &me.sa4.sin_addr); |
|
|
|
|
|
rc = connect(sock, &me.sa, sizeof(me.sa4)); |
|
|
|
|
|
if(rc) { |
|
|
int error = SOCKERRNO; |
|
|
logmsg("Error connecting to %s:%hu: (%d) %s", |
|
|
connectaddr, connectport, error, sstrerror(error)); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
logmsg("Connected fine to %s:%d", connectaddr, connectport); |
|
|
return sock; |
|
|
} |
|
|
|
|
|
static curl_socket_t socks4(curl_socket_t fd, |
|
|
unsigned char *buffer, |
|
|
ssize_t rc) |
|
|
{ |
|
|
unsigned char response[256 + 16]; |
|
|
curl_socket_t connfd; |
|
|
unsigned char cd; |
|
|
unsigned short s4port; |
|
|
|
|
|
if(buffer[SOCKS4_CD] != 1) { |
|
|
logmsg("SOCKS4 CD is not 1: %d", buffer[SOCKS4_CD]); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
if(rc < 9) { |
|
|
logmsg("SOCKS4 connect message too short: %zd", rc); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
if(!config.port) |
|
|
s4port = (unsigned short)((buffer[SOCKS4_DSTPORT] << 8) | |
|
|
(buffer[SOCKS4_DSTPORT + 1])); |
|
|
else |
|
|
s4port = config.port; |
|
|
|
|
|
connfd = socksconnect(s4port, config.addr); |
|
|
if(connfd == CURL_SOCKET_BAD) { |
|
|
|
|
|
cd = 91; |
|
|
} |
|
|
else { |
|
|
|
|
|
cd = 90; |
|
|
} |
|
|
response[0] = 0; |
|
|
response[1] = cd; |
|
|
|
|
|
memcpy(&response[2], &buffer[SOCKS4_DSTPORT], 6); |
|
|
rc = (send)(fd, (char *)response, 8, 0); |
|
|
if(rc != 8) { |
|
|
logmsg("Sending SOCKS4 response failed!"); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
logmsg("Sent %zd bytes", rc); |
|
|
loghex(response, rc); |
|
|
|
|
|
if(cd == 90) |
|
|
|
|
|
return connfd; |
|
|
|
|
|
if(connfd != CURL_SOCKET_BAD) |
|
|
sclose(connfd); |
|
|
|
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
|
|
|
static curl_socket_t sockit(curl_socket_t fd) |
|
|
{ |
|
|
unsigned char buffer[2*256 + 16]; |
|
|
unsigned char response[2*256 + 16]; |
|
|
ssize_t rc; |
|
|
unsigned char len; |
|
|
unsigned char type; |
|
|
unsigned char rep = 0; |
|
|
unsigned char *address; |
|
|
unsigned short socksport; |
|
|
curl_socket_t connfd = CURL_SOCKET_BAD; |
|
|
unsigned short s5port; |
|
|
|
|
|
getconfig(); |
|
|
|
|
|
rc = recv(fd, (char *)buffer, sizeof(buffer), 0); |
|
|
if(rc <= 0) { |
|
|
logmsg("SOCKS identifier message missing, recv returned %zd", rc); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
|
|
|
logmsg("READ %zd bytes", rc); |
|
|
loghex(buffer, rc); |
|
|
|
|
|
if(buffer[SOCKS5_VERSION] == 4) |
|
|
return socks4(fd, buffer, rc); |
|
|
|
|
|
if(rc < 3) { |
|
|
logmsg("SOCKS5 identifier message too short: %zd", rc); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
|
|
|
if(buffer[SOCKS5_VERSION] != config.version) { |
|
|
logmsg("VERSION byte not %d", config.version); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
if((buffer[SOCKS5_NMETHODS] < config.nmethods_min) || |
|
|
(buffer[SOCKS5_NMETHODS] > config.nmethods_max)) { |
|
|
logmsg("NMETHODS byte not within %d - %d ", |
|
|
config.nmethods_min, config.nmethods_max); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
|
|
|
|
|
|
if(rc != (buffer[SOCKS5_NMETHODS] + 2)) { |
|
|
logmsg("Expected %d bytes, got %zd", buffer[SOCKS5_NMETHODS] + 2, rc); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
logmsg("Incoming request deemed fine!"); |
|
|
|
|
|
|
|
|
response[0] = config.responseversion; |
|
|
response[1] = config.responsemethod; |
|
|
rc = (send)(fd, (char *)response, 2, 0); |
|
|
if(rc != 2) { |
|
|
logmsg("Sending response failed!"); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
logmsg("Sent %zd bytes", rc); |
|
|
loghex(response, rc); |
|
|
|
|
|
|
|
|
rc = recv(fd, (char *)buffer, sizeof(buffer), 0); |
|
|
if(rc <= 0) { |
|
|
logmsg("SOCKS5 request or auth message missing, recv returned %zd", rc); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
|
|
|
logmsg("READ %zd bytes", rc); |
|
|
loghex(buffer, rc); |
|
|
|
|
|
if(config.responsemethod == 2) { |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
unsigned char ulen; |
|
|
unsigned char plen; |
|
|
bool login = TRUE; |
|
|
if(rc < 5) { |
|
|
logmsg("Too short auth input: %zd", rc); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
if(buffer[SOCKS5_VERSION] != 1) { |
|
|
logmsg("Auth VERSION byte not 1, got %d", buffer[SOCKS5_VERSION]); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
ulen = buffer[SOCKS5_ULEN]; |
|
|
if(rc < 4 + ulen) { |
|
|
logmsg("Too short packet for username: %zd", rc); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
plen = buffer[SOCKS5_ULEN + ulen + 1]; |
|
|
if(rc < 3 + ulen + plen) { |
|
|
logmsg("Too short packet for ulen %d plen %d: %zd", ulen, plen, rc); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
if((ulen != strlen(config.user)) || |
|
|
(plen != strlen(config.password)) || |
|
|
memcmp(&buffer[SOCKS5_UNAME], config.user, ulen) || |
|
|
memcmp(&buffer[SOCKS5_UNAME + ulen + 1], config.password, plen)) { |
|
|
|
|
|
logmsg("mismatched credentials!"); |
|
|
login = FALSE; |
|
|
} |
|
|
response[0] = 1; |
|
|
response[1] = login ? 0 : 1; |
|
|
rc = (send)(fd, (char *)response, 2, 0); |
|
|
if(rc != 2) { |
|
|
logmsg("Sending auth response failed!"); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
logmsg("Sent %zd bytes", rc); |
|
|
loghex(response, rc); |
|
|
if(!login) |
|
|
return CURL_SOCKET_BAD; |
|
|
|
|
|
|
|
|
rc = recv(fd, (char *)buffer, sizeof(buffer), 0); |
|
|
if(rc <= 0) { |
|
|
logmsg("SOCKS5 request message missing, recv returned %zd", rc); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
|
|
|
logmsg("READ %zd bytes", rc); |
|
|
loghex(buffer, rc); |
|
|
} |
|
|
if(rc < 6) { |
|
|
logmsg("Too short for request: %zd", rc); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
|
|
|
if(buffer[SOCKS5_VERSION] != config.version) { |
|
|
logmsg("Request VERSION byte not %d", config.version); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
|
|
|
if(buffer[SOCKS5_REQCMD] != config.reqcmd) { |
|
|
logmsg("Request COMMAND byte not %d", config.reqcmd); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
|
|
|
if(buffer[SOCKS5_RESERVED]) { |
|
|
logmsg("Request COMMAND byte not %d", config.reqcmd); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
type = buffer[SOCKS5_ATYP]; |
|
|
address = &buffer[SOCKS5_DSTADDR]; |
|
|
switch(type) { |
|
|
case 1: |
|
|
|
|
|
len = 4; |
|
|
break; |
|
|
case 3: |
|
|
|
|
|
|
|
|
len = buffer[SOCKS5_DSTADDR]; |
|
|
len++; |
|
|
break; |
|
|
case 4: |
|
|
|
|
|
len = 16; |
|
|
break; |
|
|
default: |
|
|
logmsg("Unknown ATYP %d", type); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
if(rc < (4 + len + 2)) { |
|
|
logmsg("Request too short: %zd, expected %d", rc, 4 + len + 2); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
logmsg("Received ATYP %d", type); |
|
|
|
|
|
{ |
|
|
FILE *dump; |
|
|
dump = fopen(reqlogfile, "ab"); |
|
|
if(dump) { |
|
|
int i; |
|
|
fprintf(dump, "atyp %u =>", type); |
|
|
switch(type) { |
|
|
case 1: |
|
|
|
|
|
fprintf(dump, " %u.%u.%u.%u\n", |
|
|
address[0], address[1], address[2], address[3]); |
|
|
break; |
|
|
case 3: |
|
|
|
|
|
|
|
|
fprintf(dump, " %.*s\n", len-1, &address[1]); |
|
|
break; |
|
|
case 4: |
|
|
|
|
|
for(i = 0; i < 16; i++) { |
|
|
fprintf(dump, " %02x", address[i]); |
|
|
} |
|
|
fprintf(dump, "\n"); |
|
|
break; |
|
|
} |
|
|
fclose(dump); |
|
|
} |
|
|
} |
|
|
|
|
|
if(!config.port) { |
|
|
unsigned char *portp = &buffer[SOCKS5_DSTADDR + len]; |
|
|
s5port = (unsigned short)((portp[0] << 8) | (portp[1])); |
|
|
} |
|
|
else |
|
|
s5port = config.port; |
|
|
|
|
|
if(!config.connectrep) |
|
|
connfd = socksconnect(s5port, config.addr); |
|
|
|
|
|
if(connfd == CURL_SOCKET_BAD) { |
|
|
|
|
|
rep = 1; |
|
|
} |
|
|
else { |
|
|
rep = config.connectrep; |
|
|
} |
|
|
|
|
|
|
|
|
response[SOCKS5_VERSION] = config.responseversion; |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
response[SOCKS5_REP] = rep; |
|
|
response[SOCKS5_RESERVED] = 0; |
|
|
response[SOCKS5_ATYP] = type; |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
memcpy(&response[SOCKS5_BNDADDR], address, len); |
|
|
|
|
|
|
|
|
memcpy(&response[SOCKS5_BNDADDR + len], |
|
|
&buffer[SOCKS5_DSTADDR + len], sizeof(socksport)); |
|
|
|
|
|
rc = (send)(fd, (char *)response, (SEND_TYPE_ARG3)(len + 6), 0); |
|
|
if(rc != (len + 6)) { |
|
|
logmsg("Sending connect response failed!"); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
logmsg("Sent %zd bytes", rc); |
|
|
loghex(response, rc); |
|
|
|
|
|
if(!rep) |
|
|
return connfd; |
|
|
|
|
|
if(connfd != CURL_SOCKET_BAD) |
|
|
sclose(connfd); |
|
|
|
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
|
|
|
struct perclient { |
|
|
size_t fromremote; |
|
|
size_t fromclient; |
|
|
curl_socket_t remotefd; |
|
|
curl_socket_t clientfd; |
|
|
bool used; |
|
|
}; |
|
|
|
|
|
|
|
|
static int tunnel(struct perclient *cp, fd_set *fds) |
|
|
{ |
|
|
ssize_t nread; |
|
|
ssize_t nwrite; |
|
|
char buffer[512]; |
|
|
if(FD_ISSET(cp->clientfd, fds)) { |
|
|
|
|
|
nread = recv(cp->clientfd, buffer, sizeof(buffer), 0); |
|
|
if(nread > 0) { |
|
|
nwrite = send(cp->remotefd, (char *)buffer, |
|
|
(SEND_TYPE_ARG3)nread, 0); |
|
|
if(nwrite != nread) |
|
|
return 1; |
|
|
cp->fromclient += nwrite; |
|
|
} |
|
|
else |
|
|
return 1; |
|
|
} |
|
|
if(FD_ISSET(cp->remotefd, fds)) { |
|
|
|
|
|
nread = recv(cp->remotefd, buffer, sizeof(buffer), 0); |
|
|
if(nread > 0) { |
|
|
nwrite = send(cp->clientfd, (char *)buffer, |
|
|
(SEND_TYPE_ARG3)nread, 0); |
|
|
if(nwrite != nread) |
|
|
return 1; |
|
|
cp->fromremote += nwrite; |
|
|
} |
|
|
else |
|
|
return 1; |
|
|
} |
|
|
return 0; |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
static bool incoming(curl_socket_t listenfd) |
|
|
{ |
|
|
fd_set fds_read; |
|
|
fd_set fds_write; |
|
|
fd_set fds_err; |
|
|
int clients = 0; |
|
|
struct perclient c[2]; |
|
|
|
|
|
memset(c, 0, sizeof(c)); |
|
|
if(got_exit_signal) { |
|
|
logmsg("signalled to die, exiting..."); |
|
|
return FALSE; |
|
|
} |
|
|
|
|
|
#ifdef HAVE_GETPPID |
|
|
|
|
|
if(getppid() <= 1) { |
|
|
logmsg("process becomes orphan, exiting"); |
|
|
return FALSE; |
|
|
} |
|
|
#endif |
|
|
|
|
|
do { |
|
|
int i; |
|
|
ssize_t rc; |
|
|
int error = 0; |
|
|
curl_socket_t sockfd = listenfd; |
|
|
int maxfd = (int)sockfd; |
|
|
|
|
|
FD_ZERO(&fds_read); |
|
|
FD_ZERO(&fds_write); |
|
|
FD_ZERO(&fds_err); |
|
|
|
|
|
|
|
|
FD_SET(sockfd, &fds_read); |
|
|
|
|
|
for(i = 0; i < 2; i++) { |
|
|
if(c[i].used) { |
|
|
curl_socket_t fd = c[i].clientfd; |
|
|
FD_SET(fd, &fds_read); |
|
|
if((int)fd > maxfd) |
|
|
maxfd = (int)fd; |
|
|
fd = c[i].remotefd; |
|
|
FD_SET(fd, &fds_read); |
|
|
if((int)fd > maxfd) |
|
|
maxfd = (int)fd; |
|
|
} |
|
|
} |
|
|
|
|
|
do { |
|
|
|
|
|
rc = select(maxfd + 1, &fds_read, &fds_write, &fds_err, NULL); |
|
|
if(got_exit_signal) { |
|
|
logmsg("signalled to die, exiting..."); |
|
|
return FALSE; |
|
|
} |
|
|
} while((rc == -1) && ((error = errno) == EINTR)); |
|
|
|
|
|
if(rc < 0) { |
|
|
logmsg("select() failed with error: (%d) %s", |
|
|
error, strerror(error)); |
|
|
return FALSE; |
|
|
} |
|
|
|
|
|
if((clients < 2) && FD_ISSET(sockfd, &fds_read)) { |
|
|
curl_socket_t newfd = accept(sockfd, NULL, NULL); |
|
|
if(CURL_SOCKET_BAD == newfd) { |
|
|
error = SOCKERRNO; |
|
|
logmsg("accept(%" FMT_SOCKET_T ", NULL, NULL) " |
|
|
"failed with error: (%d) %s", |
|
|
sockfd, error, sstrerror(error)); |
|
|
} |
|
|
else { |
|
|
curl_socket_t remotefd; |
|
|
logmsg("====> Client connect, fd %" FMT_SOCKET_T ". " |
|
|
"Read config from %s", newfd, configfile); |
|
|
remotefd = sockit(newfd); |
|
|
if(remotefd == CURL_SOCKET_BAD) { |
|
|
logmsg("====> Client disconnect"); |
|
|
sclose(newfd); |
|
|
} |
|
|
else { |
|
|
struct perclient *cp = &c[0]; |
|
|
logmsg("====> Tunnel transfer"); |
|
|
|
|
|
if(c[0].used) |
|
|
cp = &c[1]; |
|
|
cp->fromremote = 0; |
|
|
cp->fromclient = 0; |
|
|
cp->clientfd = newfd; |
|
|
cp->remotefd = remotefd; |
|
|
cp->used = TRUE; |
|
|
clients++; |
|
|
} |
|
|
|
|
|
} |
|
|
} |
|
|
for(i = 0; i < 2; i++) { |
|
|
struct perclient *cp = &c[i]; |
|
|
if(cp->used) { |
|
|
if(tunnel(cp, &fds_read)) { |
|
|
logmsg("SOCKS transfer completed. Bytes: < %zu > %zu", |
|
|
cp->fromremote, cp->fromclient); |
|
|
sclose(cp->clientfd); |
|
|
sclose(cp->remotefd); |
|
|
cp->used = FALSE; |
|
|
clients--; |
|
|
} |
|
|
} |
|
|
} |
|
|
} while(clients); |
|
|
|
|
|
return TRUE; |
|
|
} |
|
|
|
|
|
static curl_socket_t sockdaemon(curl_socket_t sock, |
|
|
unsigned short *listenport |
|
|
#ifdef USE_UNIX_SOCKETS |
|
|
, const char *unix_socket |
|
|
#endif |
|
|
) |
|
|
{ |
|
|
|
|
|
srvr_sockaddr_union_t listener; |
|
|
int flag; |
|
|
int rc; |
|
|
int totdelay = 0; |
|
|
int maxretr = 10; |
|
|
int delay = 20; |
|
|
int attempt = 0; |
|
|
int error = 0; |
|
|
|
|
|
do { |
|
|
attempt++; |
|
|
flag = 1; |
|
|
rc = setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, |
|
|
(void *)&flag, sizeof(flag)); |
|
|
if(rc) { |
|
|
error = SOCKERRNO; |
|
|
logmsg("setsockopt(SO_REUSEADDR) failed with error: (%d) %s", |
|
|
error, sstrerror(error)); |
|
|
if(maxretr) { |
|
|
rc = wait_ms(delay); |
|
|
if(rc) { |
|
|
|
|
|
error = errno; |
|
|
logmsg("wait_ms() failed with error: (%d) %s", |
|
|
error, strerror(error)); |
|
|
sclose(sock); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
if(got_exit_signal) { |
|
|
logmsg("signalled to die, exiting..."); |
|
|
sclose(sock); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
totdelay += delay; |
|
|
delay *= 2; |
|
|
} |
|
|
} |
|
|
} while(rc && maxretr--); |
|
|
|
|
|
if(rc) { |
|
|
logmsg("setsockopt(SO_REUSEADDR) failed %d times in %d ms. Error: (%d) %s", |
|
|
attempt, totdelay, error, strerror(error)); |
|
|
logmsg("Continuing anyway..."); |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
switch(socket_domain) { |
|
|
case AF_INET: |
|
|
memset(&listener.sa4, 0, sizeof(listener.sa4)); |
|
|
listener.sa4.sin_family = AF_INET; |
|
|
listener.sa4.sin_addr.s_addr = INADDR_ANY; |
|
|
listener.sa4.sin_port = htons(*listenport); |
|
|
rc = bind(sock, &listener.sa, sizeof(listener.sa4)); |
|
|
break; |
|
|
#ifdef USE_IPV6 |
|
|
case AF_INET6: |
|
|
memset(&listener.sa6, 0, sizeof(listener.sa6)); |
|
|
listener.sa6.sin6_family = AF_INET6; |
|
|
listener.sa6.sin6_addr = in6addr_any; |
|
|
listener.sa6.sin6_port = htons(*listenport); |
|
|
rc = bind(sock, &listener.sa, sizeof(listener.sa6)); |
|
|
break; |
|
|
#endif |
|
|
#ifdef USE_UNIX_SOCKETS |
|
|
case AF_UNIX: |
|
|
rc = bind_unix_socket(sock, unix_socket, &listener.sau); |
|
|
#endif |
|
|
} |
|
|
|
|
|
if(rc) { |
|
|
error = SOCKERRNO; |
|
|
#ifdef USE_UNIX_SOCKETS |
|
|
if(socket_domain == AF_UNIX) |
|
|
logmsg("Error binding socket on path %s: (%d) %s", |
|
|
unix_socket, error, sstrerror(error)); |
|
|
else |
|
|
#endif |
|
|
logmsg("Error binding socket on port %hu: (%d) %s", |
|
|
*listenport, error, sstrerror(error)); |
|
|
sclose(sock); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
|
|
|
if(!*listenport |
|
|
#ifdef USE_UNIX_SOCKETS |
|
|
&& !unix_socket |
|
|
#endif |
|
|
) { |
|
|
|
|
|
|
|
|
curl_socklen_t la_size; |
|
|
srvr_sockaddr_union_t localaddr; |
|
|
#ifdef USE_IPV6 |
|
|
if(socket_domain == AF_INET6) |
|
|
la_size = sizeof(localaddr.sa6); |
|
|
else |
|
|
#endif |
|
|
la_size = sizeof(localaddr.sa4); |
|
|
memset(&localaddr.sa, 0, (size_t)la_size); |
|
|
if(getsockname(sock, &localaddr.sa, &la_size) < 0) { |
|
|
error = SOCKERRNO; |
|
|
logmsg("getsockname() failed with error: (%d) %s", |
|
|
error, sstrerror(error)); |
|
|
sclose(sock); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
switch(localaddr.sa.sa_family) { |
|
|
case AF_INET: |
|
|
*listenport = ntohs(localaddr.sa4.sin_port); |
|
|
break; |
|
|
#ifdef USE_IPV6 |
|
|
case AF_INET6: |
|
|
*listenport = ntohs(localaddr.sa6.sin6_port); |
|
|
break; |
|
|
#endif |
|
|
default: |
|
|
break; |
|
|
} |
|
|
if(!*listenport) { |
|
|
|
|
|
logmsg("Apparently getsockname() succeeded, with listener port zero."); |
|
|
logmsg("A valid reason for this failure is a binary built without"); |
|
|
logmsg("proper network library linkage. This might not be the only"); |
|
|
logmsg("reason, but double check it before anything else."); |
|
|
sclose(sock); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
rc = listen(sock, 5); |
|
|
if(0 != rc) { |
|
|
error = SOCKERRNO; |
|
|
logmsg("listen(%" FMT_SOCKET_T ", 5) failed with error: (%d) %s", |
|
|
sock, error, sstrerror(error)); |
|
|
sclose(sock); |
|
|
return CURL_SOCKET_BAD; |
|
|
} |
|
|
|
|
|
return sock; |
|
|
} |
|
|
|
|
|
|
|
|
int main(int argc, char *argv[]) |
|
|
{ |
|
|
curl_socket_t sock = CURL_SOCKET_BAD; |
|
|
curl_socket_t msgsock = CURL_SOCKET_BAD; |
|
|
int wrotepidfile = 0; |
|
|
int wroteportfile = 0; |
|
|
const char *pidname = ".socksd.pid"; |
|
|
const char *portname = NULL; |
|
|
bool juggle_again; |
|
|
int error; |
|
|
int arg = 1; |
|
|
|
|
|
#ifdef USE_UNIX_SOCKETS |
|
|
const char *unix_socket = NULL; |
|
|
bool unlink_socket = false; |
|
|
#endif |
|
|
|
|
|
while(argc > arg) { |
|
|
if(!strcmp("--version", argv[arg])) { |
|
|
printf("socksd IPv4%s\n", |
|
|
#ifdef USE_IPV6 |
|
|
"/IPv6" |
|
|
#else |
|
|
"" |
|
|
#endif |
|
|
); |
|
|
return 0; |
|
|
} |
|
|
else if(!strcmp("--pidfile", argv[arg])) { |
|
|
arg++; |
|
|
if(argc > arg) |
|
|
pidname = argv[arg++]; |
|
|
} |
|
|
else if(!strcmp("--portfile", argv[arg])) { |
|
|
arg++; |
|
|
if(argc > arg) |
|
|
portname = argv[arg++]; |
|
|
} |
|
|
else if(!strcmp("--config", argv[arg])) { |
|
|
arg++; |
|
|
if(argc > arg) |
|
|
configfile = argv[arg++]; |
|
|
} |
|
|
else if(!strcmp("--backend", argv[arg])) { |
|
|
arg++; |
|
|
if(argc > arg) |
|
|
backendaddr = argv[arg++]; |
|
|
} |
|
|
else if(!strcmp("--backendport", argv[arg])) { |
|
|
arg++; |
|
|
if(argc > arg) |
|
|
backendport = (unsigned short)atoi(argv[arg++]); |
|
|
} |
|
|
else if(!strcmp("--logfile", argv[arg])) { |
|
|
arg++; |
|
|
if(argc > arg) |
|
|
serverlogfile = argv[arg++]; |
|
|
} |
|
|
else if(!strcmp("--reqfile", argv[arg])) { |
|
|
arg++; |
|
|
if(argc > arg) |
|
|
reqlogfile = argv[arg++]; |
|
|
} |
|
|
else if(!strcmp("--ipv6", argv[arg])) { |
|
|
#ifdef USE_IPV6 |
|
|
socket_domain = AF_INET6; |
|
|
socket_type = "IPv6"; |
|
|
#endif |
|
|
arg++; |
|
|
} |
|
|
else if(!strcmp("--ipv4", argv[arg])) { |
|
|
|
|
|
#ifdef USE_IPV6 |
|
|
socket_type = "IPv4"; |
|
|
#endif |
|
|
arg++; |
|
|
} |
|
|
else if(!strcmp("--unix-socket", argv[arg])) { |
|
|
arg++; |
|
|
if(argc > arg) { |
|
|
#ifdef USE_UNIX_SOCKETS |
|
|
struct sockaddr_un sau; |
|
|
unix_socket = argv[arg]; |
|
|
if(strlen(unix_socket) >= sizeof(sau.sun_path)) { |
|
|
fprintf(stderr, |
|
|
"socksd: socket path must be shorter than %zu chars: %s\n", |
|
|
sizeof(sau.sun_path), unix_socket); |
|
|
return 0; |
|
|
} |
|
|
socket_domain = AF_UNIX; |
|
|
socket_type = "unix"; |
|
|
#endif |
|
|
arg++; |
|
|
} |
|
|
} |
|
|
else if(!strcmp("--port", argv[arg])) { |
|
|
arg++; |
|
|
if(argc > arg) { |
|
|
char *endptr; |
|
|
unsigned long ulnum = strtoul(argv[arg], &endptr, 10); |
|
|
port = curlx_ultous(ulnum); |
|
|
arg++; |
|
|
} |
|
|
} |
|
|
else { |
|
|
puts("Usage: socksd [option]\n" |
|
|
" --backend [ipv4 addr]\n" |
|
|
" --backendport [TCP port]\n" |
|
|
" --config [file]\n" |
|
|
" --version\n" |
|
|
" --logfile [file]\n" |
|
|
" --pidfile [file]\n" |
|
|
" --portfile [file]\n" |
|
|
" --reqfile [file]\n" |
|
|
" --ipv4\n" |
|
|
" --ipv6\n" |
|
|
" --unix-socket [file]\n" |
|
|
" --bindonly\n" |
|
|
" --port [port]\n"); |
|
|
return 0; |
|
|
} |
|
|
} |
|
|
|
|
|
#ifdef _WIN32 |
|
|
win32_init(); |
|
|
atexit(win32_cleanup); |
|
|
|
|
|
setmode(fileno(stdin), O_BINARY); |
|
|
setmode(fileno(stdout), O_BINARY); |
|
|
setmode(fileno(stderr), O_BINARY); |
|
|
#endif |
|
|
|
|
|
install_signal_handlers(false); |
|
|
|
|
|
sock = socket(socket_domain, SOCK_STREAM, 0); |
|
|
|
|
|
if(CURL_SOCKET_BAD == sock) { |
|
|
error = SOCKERRNO; |
|
|
logmsg("Error creating socket: (%d) %s", |
|
|
error, sstrerror(error)); |
|
|
goto socks5_cleanup; |
|
|
} |
|
|
|
|
|
{ |
|
|
|
|
|
sock = sockdaemon(sock, &port |
|
|
#ifdef USE_UNIX_SOCKETS |
|
|
, unix_socket |
|
|
#endif |
|
|
); |
|
|
if(CURL_SOCKET_BAD == sock) { |
|
|
goto socks5_cleanup; |
|
|
} |
|
|
#ifdef USE_UNIX_SOCKETS |
|
|
unlink_socket = true; |
|
|
#endif |
|
|
msgsock = CURL_SOCKET_BAD; |
|
|
} |
|
|
|
|
|
logmsg("Running %s version", socket_type); |
|
|
|
|
|
#ifdef USE_UNIX_SOCKETS |
|
|
if(socket_domain == AF_UNIX) |
|
|
logmsg("Listening on Unix socket %s", unix_socket); |
|
|
else |
|
|
#endif |
|
|
logmsg("Listening on port %hu", port); |
|
|
|
|
|
wrotepidfile = write_pidfile(pidname); |
|
|
if(!wrotepidfile) { |
|
|
goto socks5_cleanup; |
|
|
} |
|
|
|
|
|
if(portname) { |
|
|
wroteportfile = write_portfile(portname, port); |
|
|
if(!wroteportfile) { |
|
|
goto socks5_cleanup; |
|
|
} |
|
|
} |
|
|
|
|
|
do { |
|
|
juggle_again = incoming(sock); |
|
|
} while(juggle_again); |
|
|
|
|
|
socks5_cleanup: |
|
|
|
|
|
if((msgsock != sock) && (msgsock != CURL_SOCKET_BAD)) |
|
|
sclose(msgsock); |
|
|
|
|
|
if(sock != CURL_SOCKET_BAD) |
|
|
sclose(sock); |
|
|
|
|
|
#ifdef USE_UNIX_SOCKETS |
|
|
if(unlink_socket && socket_domain == AF_UNIX) { |
|
|
error = unlink(unix_socket); |
|
|
logmsg("unlink(%s) = %d (%s)", unix_socket, error, strerror(error)); |
|
|
} |
|
|
#endif |
|
|
|
|
|
if(wrotepidfile) |
|
|
unlink(pidname); |
|
|
if(wroteportfile) |
|
|
unlink(portname); |
|
|
|
|
|
restore_signal_handlers(false); |
|
|
|
|
|
if(got_exit_signal) { |
|
|
logmsg("============> socksd exits with signal (%d)", exit_signal); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
raise(exit_signal); |
|
|
} |
|
|
|
|
|
logmsg("============> socksd quits"); |
|
|
return 0; |
|
|
} |
|
|
|