socks.c 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421
  1. /*
  2. 3APA3A simpliest proxy server
  3. (c) 2002-2008 by ZARAZA <3APA3A@security.nnov.ru>
  4. please read License Agreement
  5. $Id: socks.c,v 1.34 2009/09/17 12:21:09 v.dubrovin Exp $
  6. */
  7. #include "proxy.h"
  8. #define RETURN(xxx) { param->res = xxx; goto CLEANRET; }
  9. unsigned char * commands[] = {(unsigned char *)"UNKNOWN", (unsigned char *)"CONNECT", (unsigned char *)"BIND", (unsigned char *)"UDPMAP"};
  10. #define BUFSIZE 1024
  11. #define LARGEBUFSIZE 67000
  12. void * sockschild(struct clientparam* param) {
  13. int res;
  14. unsigned i=0;
  15. SOCKET s;
  16. unsigned size;
  17. SASIZETYPE sasize;
  18. unsigned char * buf=NULL;
  19. unsigned char c;
  20. unsigned char command=0;
  21. struct pollfd fds[3];
  22. int ver=0;
  23. int havepass = 0;
  24. struct sockaddr_in sin;
  25. int len;
  26. param->req.sin_addr.s_addr = 0;
  27. param->service = S_SOCKS;
  28. if(!(buf = myalloc(BUFSIZE))) {RETURN(21);}
  29. memset(buf, 0, BUFSIZE);
  30. if ((ver = sockgetcharcli(param, conf.timeouts[SINGLEBYTE_L], 0)) != 5 && ver != 4) {
  31. RETURN(401);
  32. } /* version */
  33. param->service = ver;
  34. if(ver == 5){
  35. if ((i = sockgetcharcli(param, conf.timeouts[SINGLEBYTE_S], 0)) == EOF) {RETURN(441);} /* nmethods */
  36. for (; i; i--) {
  37. if ((res = sockgetcharcli(param, conf.timeouts[SINGLEBYTE_S], 0)) == EOF) {RETURN(442);}
  38. if (res == 2 && !param->srv->nouser) {
  39. havepass = res;
  40. }
  41. }
  42. buf[0] = 5;
  43. buf[1] = havepass;
  44. if(socksend(param->clisock, buf, 2, conf.timeouts[STRING_S])!=2){RETURN(402);}
  45. if (havepass) {
  46. if (((res = sockgetcharcli(param, conf.timeouts[SINGLEBYTE_L], 0))) != 1) {
  47. RETURN(412);
  48. }
  49. if ((i = sockgetcharcli(param, conf.timeouts[SINGLEBYTE_S], 0)) == EOF) {RETURN(443);}
  50. if (i && (unsigned)(res = sockgetlinebuf(param, CLIENT, buf, i, 0, conf.timeouts[STRING_S])) != i){RETURN(444);};
  51. buf[i] = 0;
  52. if(!param->username)param->username = (unsigned char *)mystrdup((char *)buf);
  53. if ((i = sockgetcharcli(param, conf.timeouts[SINGLEBYTE_S], 0)) == EOF) {RETURN(445);}
  54. if (i && (unsigned)(res = sockgetlinebuf(param, CLIENT, buf, i, 0, conf.timeouts[STRING_S])) != i){RETURN(446);};
  55. buf[i] = 0;
  56. if(!param->password)param->password = (unsigned char *)mystrdup((char *)buf);
  57. buf[0] = 1;
  58. buf[1] = 0;
  59. if(socksend(param->clisock, buf, 2, conf.timeouts[STRING_S])!=2){RETURN(402);}
  60. }
  61. if ((c = sockgetcharcli(param, conf.timeouts[SINGLEBYTE_L], 0)) != 5) {
  62. RETURN(421);
  63. } /* version */
  64. }
  65. if( (command = sockgetcharcli(param, conf.timeouts[SINGLEBYTE_S], 0)) < 1 || command > 3){command = 0; RETURN(407);} /* command */
  66. if(ver == 5){
  67. if (sockgetcharcli(param, conf.timeouts[SINGLEBYTE_S], 0) == EOF) {RETURN(447);} /* reserved */
  68. c = sockgetcharcli(param, conf.timeouts[SINGLEBYTE_S], 0); /* atype */
  69. }
  70. else {
  71. if ((res = sockgetcharcli(param, conf.timeouts[SINGLEBYTE_S], 0)) == EOF) {RETURN(448);}
  72. buf[0] = (unsigned char) res;
  73. if ((res = sockgetcharcli(param, conf.timeouts[SINGLEBYTE_S], 0)) == EOF) {RETURN(449);}
  74. buf[1] = (unsigned char) res;
  75. param->sins.sin_port = param->req.sin_port = *(unsigned short*)buf;
  76. c = 1;
  77. }
  78. switch(c) {
  79. case 1:
  80. for (i = 0; i<4; i++){
  81. if ((res = sockgetcharcli(param, conf.timeouts[SINGLEBYTE_S], 0)) == EOF) {RETURN(450);}
  82. buf[i] = (unsigned char)res;
  83. }
  84. param->sins.sin_addr.s_addr = param->req.sin_addr.s_addr = *(unsigned long *)buf;
  85. if(command==1 && !param->req.sin_addr.s_addr) {
  86. RETURN(422);
  87. }
  88. myinet_ntoa(param->sins.sin_addr, (char *)buf);
  89. break;
  90. case 3:
  91. if ((size = sockgetcharcli(param, conf.timeouts[SINGLEBYTE_S], 0)) == EOF) {RETURN(451);} /* nmethods */
  92. for (i=0; i<size; i++){ /* size < 256 */
  93. if ((res = sockgetcharcli(param, conf.timeouts[SINGLEBYTE_S], 0)) == EOF) {RETURN(452);}
  94. buf[i] = (unsigned char)res;
  95. }
  96. buf[i] = 0;
  97. param->sins.sin_addr.s_addr = param->req.sin_addr.s_addr = getip(buf);
  98. if(command==1 && !param->req.sin_addr.s_addr) {
  99. RETURN(100);
  100. }
  101. break;
  102. default:
  103. RETURN(998);
  104. }
  105. if(param->hostname)myfree(param->hostname);
  106. param->hostname = (unsigned char *)mystrdup((char *)buf);
  107. if (ver == 5) {
  108. if ((res = sockgetcharcli(param, conf.timeouts[SINGLEBYTE_S], 0)) == EOF) {RETURN(453);}
  109. buf[0] = (unsigned char) res;
  110. if ((res = sockgetcharcli(param, conf.timeouts[SINGLEBYTE_S], 0)) == EOF) {RETURN(454);}
  111. buf[1] = (unsigned char) res;
  112. param->sins.sin_port = param->req.sin_port = *(unsigned short*)buf;
  113. }
  114. else {
  115. sockgetlinebuf(param, CLIENT, buf, BUFSIZE - 1, 0, conf.timeouts[STRING_S]);
  116. buf[127] = 0;
  117. if(!param->srv->nouser && *buf && !param->username)param->username = (unsigned char *)mystrdup((char *)buf);
  118. if(param->sins.sin_addr.s_addr && ntohl(param->sins.sin_addr.s_addr)<256){
  119. param->service = S_SOCKS45;
  120. sockgetlinebuf(param, CLIENT, buf, BUFSIZE - 1, 0, conf.timeouts[STRING_S]);
  121. buf[127] = 0;
  122. if(param->hostname)myfree(param->hostname);
  123. param->hostname = (unsigned char *)mystrdup((char *)buf);
  124. param->sins.sin_addr.s_addr = param->req.sin_addr.s_addr = getip(buf);
  125. }
  126. }
  127. if(command == 1 && !param->req.sin_port) {RETURN(424);}
  128. param->sins.sin_family = AF_INET;
  129. switch(command) {
  130. case 1:
  131. param->operation = CONNECT;
  132. break;
  133. case 2:
  134. param->sins.sin_addr.s_addr = param->extip;
  135. param->sins.sin_port = param->extport?param->extport:param->req.sin_port;
  136. if ((param->remsock=so._socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) == INVALID_SOCKET) {RETURN (11);}
  137. param->operation = BIND;
  138. break;
  139. case 3:
  140. param->sins.sin_port = param->extport?param->extport:param->req.sin_port;
  141. param->sins.sin_addr.s_addr = param->extip;
  142. if ((param->remsock=so._socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP)) == INVALID_SOCKET) {RETURN (11);}
  143. param->operation = UDPASSOC;
  144. break;
  145. default:
  146. RETURN(997);
  147. }
  148. if((res = (*param->srv->authfunc)(param))) {RETURN(res);}
  149. if(command > 1) {
  150. if(so._bind(param->remsock,(struct sockaddr *)&param->sins,sizeof(param->sins))) {
  151. param->sins.sin_port = 0;
  152. if(so._bind(param->remsock,(struct sockaddr *)&param->sins,sizeof(param->sins)))RETURN (12);
  153. #if SOCKSTRACE > 0
  154. fprintf(stderr, "%s:%hu binded to communicate with server\n",
  155. inet_ntoa(param->sins.sin_addr),
  156. ntohs(param->sins.sin_port)
  157. );
  158. fflush(stderr);
  159. #endif
  160. }
  161. sasize = sizeof(struct sockaddr_in);
  162. so._getsockname(param->remsock, (struct sockaddr *)&param->sins, &sasize);
  163. if(command == 3) {
  164. param->ctrlsock = param->clisock;
  165. param->clisock = so._socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
  166. if(param->clisock == INVALID_SOCKET) {RETURN(11);}
  167. sin.sin_family = AF_INET;
  168. sin.sin_addr.s_addr = param->srv->intip;
  169. sin.sin_port = htons(0);
  170. if(so._bind(param->clisock,(struct sockaddr *)&sin,sizeof(struct sockaddr_in))) {RETURN (12);}
  171. #if SOCKSTRACE > 0
  172. fprintf(stderr, "%s:%hu binded to communicate with client\n",
  173. inet_ntoa(sin.sin_addr),
  174. ntohs(sin.sin_port)
  175. );
  176. fflush(stderr);
  177. #endif
  178. }
  179. }
  180. param->res = 0;
  181. CLEANRET:
  182. if(param->clisock != INVALID_SOCKET){
  183. sasize = sizeof(struct sockaddr_in);
  184. if(command != 3) so._getsockname(param->remsock, (struct sockaddr *)&sin, &sasize);
  185. else so._getsockname(param->clisock, (struct sockaddr *)&sin, &sasize);
  186. #if SOCKSTRACE > 0
  187. fprintf(stderr, "Sending confirmation to client with code %d for %s with %s:%hu\n",
  188. param->res,
  189. commands[command],
  190. inet_ntoa(sin.sin_addr),
  191. ntohs(sin.sin_port)
  192. );
  193. fflush(stderr);
  194. #endif
  195. if(ver == 5){
  196. buf[0] = 5;
  197. buf[1] = param->res%10;
  198. buf[2] = 0;
  199. buf[3] = 1;
  200. memcpy(buf+4, &sin.sin_addr.s_addr, 4);
  201. memcpy(buf+8, &sin.sin_port, 2);
  202. socksend((command == 3)?param->ctrlsock:param->clisock, buf, 10, conf.timeouts[STRING_S]);
  203. }
  204. else{
  205. buf[0] = 0;
  206. buf[1] = 90 + (param->res%10);
  207. memcpy(buf+2, &sin.sin_port, 2);
  208. memcpy(buf+4, &sin.sin_addr.s_addr, 4);
  209. socksend(param->clisock, buf, 8, conf.timeouts[STRING_S]);
  210. }
  211. if (param->res == 0) {
  212. switch(command) {
  213. case 1:
  214. if(param->redirectfunc){
  215. if(buf)myfree(buf);
  216. return (*param->redirectfunc)(param);
  217. }
  218. param->res = sockmap(param, conf.timeouts[CONNECTION_L]);
  219. break;
  220. case 2:
  221. so._listen (param->remsock, 1);
  222. fds[0].fd = param->remsock;
  223. fds[1].fd = param->clisock;
  224. fds[0].events = fds[1].events = POLLIN;
  225. res = so._poll(fds, 2, conf.timeouts[(param->req.sin_addr.s_addr)?CONNECTION_S:CONNECTION_L] * 1000);
  226. if (res < 1 || fds[1].revents) {
  227. res = 460;
  228. break;
  229. }
  230. sasize = sizeof(param->sins);
  231. s = so._accept(param->remsock, (struct sockaddr *)&param->sins, &sasize);
  232. so._closesocket(param->remsock);
  233. param->remsock = s;
  234. if(s == INVALID_SOCKET) {
  235. param->res = 462;
  236. break;
  237. }
  238. if(param->req.sin_addr.s_addr && param->req.sin_addr.s_addr != param->sins.sin_addr.s_addr) {
  239. param->res = 470;
  240. break;
  241. }
  242. #if SOCKSTRACE > 0
  243. fprintf(stderr, "Sending incoming connection to client with code %d for %s with %s:%hu\n",
  244. param->res,
  245. commands[command],
  246. inet_ntoa(param->sins.sin_addr),
  247. ntohs(param->sins.sin_port)
  248. );
  249. fflush(stderr);
  250. #endif
  251. if(ver == 5){
  252. memcpy (buf+4, &param->sins.sin_addr, 4);
  253. memcpy (buf+8, &param->sins.sin_port, 2);
  254. socksend(param->clisock, buf, 10, conf.timeouts[STRING_S]);
  255. }
  256. else {
  257. memcpy (buf+2, &param->sins.sin_port, 2);
  258. memcpy (buf+4, &param->sins.sin_addr, 4);
  259. socksend(param->clisock, buf, 8, conf.timeouts[STRING_S]);
  260. }
  261. param->res = sockmap(param, conf.timeouts[CONNECTION_S]);
  262. break;
  263. case 3:
  264. param->sins.sin_addr.s_addr = param->req.sin_addr.s_addr;
  265. param->sins.sin_port = param->req.sin_port;
  266. myfree(buf);
  267. if(!(buf = myalloc(LARGEBUFSIZE))) {RETURN(21);}
  268. for(;;){
  269. fds[0].fd = param->remsock;
  270. fds[1].fd = param->clisock;
  271. fds[2].fd = param->ctrlsock;
  272. fds[2].events = fds[1].events = fds[0].events = POLLIN;
  273. res = so._poll(fds, 3, conf.timeouts[CONNECTION_L]*1000);
  274. if(res <= 0) {
  275. param->res = 463;
  276. break;
  277. }
  278. if (fds[2].revents) {
  279. param->res = 0;
  280. break;
  281. }
  282. if (fds[1].revents) {
  283. sasize = sizeof(struct sockaddr_in);
  284. if((len = so._recvfrom(param->clisock, buf, 65535, 0, (struct sockaddr *)&sin, &sasize)) <= 10) {
  285. param->res = 464;
  286. break;
  287. }
  288. if(sin.sin_addr.s_addr != param->sinc.sin_addr.s_addr){
  289. param->res = 465;
  290. break;
  291. }
  292. if(buf[0] || buf[1] || buf[2]) {
  293. param->res = 466;
  294. break;
  295. }
  296. switch(buf[3]) {
  297. case 1:
  298. i = 8;
  299. memcpy(&param->sins.sin_addr.s_addr, buf+4, 4);
  300. break;
  301. case 3:
  302. size = buf[4];
  303. for (i=4; size; i++, size--){
  304. buf[i] = buf[i+1];
  305. }
  306. buf[i++] = 0;
  307. param->sins.sin_addr.s_addr = getip(buf+4);
  308. break;
  309. default:
  310. RETURN(996);
  311. }
  312. memcpy(&param->sins.sin_port, buf+i, 2);
  313. i+=2;
  314. sasize = sizeof(param->sins);
  315. if(len > (int)i){
  316. if(socksendto(param->remsock, &param->sins, buf+i, len - i, conf.timeouts[SINGLEBYTE_L]*1000) <= 0){
  317. param->res = 467;
  318. break;
  319. }
  320. param->statscli+=(len - i);
  321. param->nwrites++;
  322. #if SOCKSTRACE > 1
  323. fprintf(stderr, "UDP packet relayed from client to %s:%hu size %d, header %d\n",
  324. inet_ntoa(param->sins.sin_addr),
  325. ntohs(param->sins.sin_port),
  326. (len - i),
  327. i
  328. );
  329. fprintf(stderr, "client address is assumed to be %s:%hu\n",
  330. inet_ntoa(sin.sin_addr),
  331. ntohs(sin.sin_port)
  332. );
  333. fflush(stderr);
  334. #endif
  335. }
  336. }
  337. if (fds[0].revents) {
  338. struct sockaddr_in tsin;
  339. sasize = sizeof(tsin);
  340. buf[0]=buf[1]=buf[2]=0;
  341. buf[3]=1;
  342. if((len = so._recvfrom(param->remsock, buf+10, 65535 - 10, 0, (struct sockaddr *)&tsin, &sasize)) <= 0) {
  343. param->res = 468;
  344. break;
  345. }
  346. param->statssrv+=len;
  347. param->nreads++;
  348. memcpy(buf+4, &tsin.sin_addr.s_addr, 4);
  349. memcpy(buf+8, &tsin.sin_port, 2);
  350. sasize = sizeof(param->sins);
  351. if(socksendto(param->clisock, &sin, buf, len + 10, conf.timeouts[SINGLEBYTE_L]*1000) <=0){
  352. param->res = 469;
  353. break;
  354. }
  355. #if SOCKSTRACE > 1
  356. fprintf(stderr, "UDP packet relayed to client from %s:%hu size %d\n",
  357. inet_ntoa(tsin.sin_addr),
  358. ntohs(tsin.sin_port),
  359. len
  360. );
  361. fflush(stderr);
  362. #endif
  363. }
  364. }
  365. break;
  366. default:
  367. param->res = 417;
  368. break;
  369. }
  370. }
  371. }
  372. if(command > 3) command = 0;
  373. if(buf){
  374. sprintf((char *)buf, "%s ", commands[command]);
  375. if(param->hostname){
  376. sprintf((char *)buf + strlen((char *)buf), "%.265s", param->hostname);
  377. }
  378. else myinet_ntoa(param->req.sin_addr, (char *)buf+strlen((char *)buf));
  379. sprintf((char *)buf+strlen((char *)buf), ":%hu", ntohs(param->req.sin_port));
  380. (*param->srv->logfunc)(param, buf);
  381. myfree(buf);
  382. }
  383. freeparam(param);
  384. return (NULL);
  385. }
  386. #ifdef WITHMAIN
  387. struct proxydef childdef = {
  388. sockschild,
  389. 1080,
  390. 0,
  391. S_SOCKS,
  392. ""
  393. };
  394. #include "proxymain.c"
  395. #endif