2015-01-03 21:18:05 +00:00
|
|
|
#ifndef SOCKS_H__
|
|
|
|
#define SOCKS_H__
|
2014-07-14 16:40:06 +00:00
|
|
|
|
2014-11-23 16:33:58 +00:00
|
|
|
#include <memory>
|
2015-01-05 11:37:52 +00:00
|
|
|
#include <string>
|
2015-01-05 19:14:53 +00:00
|
|
|
#include <set>
|
2015-01-03 05:42:53 +00:00
|
|
|
#include <boost/asio.hpp>
|
2015-01-05 19:14:53 +00:00
|
|
|
#include <mutex>
|
|
|
|
#include <atomic>
|
2014-07-14 16:40:06 +00:00
|
|
|
#include "Identity.h"
|
|
|
|
#include "Streaming.h"
|
2015-01-03 05:42:53 +00:00
|
|
|
#include "I2PTunnel.h"
|
2014-07-14 16:40:06 +00:00
|
|
|
|
|
|
|
namespace i2p
|
|
|
|
{
|
|
|
|
namespace proxy
|
|
|
|
{
|
|
|
|
|
2014-09-14 15:38:34 +00:00
|
|
|
const size_t socks_buffer_size = 8192;
|
2015-01-03 21:18:05 +00:00
|
|
|
const size_t max_socks_hostname_size = 255; // Limit for socks5 and bad idea to traverse
|
2014-07-14 16:40:06 +00:00
|
|
|
|
2015-01-05 11:37:52 +00:00
|
|
|
struct SOCKSDnsAddress {
|
|
|
|
uint8_t size;
|
|
|
|
char value[max_socks_hostname_size];
|
|
|
|
void FromString (std::string str) {
|
|
|
|
size = str.length();
|
|
|
|
if (str.length() > max_socks_hostname_size) size = max_socks_hostname_size;
|
|
|
|
memcpy(value,str.c_str(),size);
|
|
|
|
}
|
|
|
|
std::string ToString() { return std::string(value, size); }
|
|
|
|
void push_back (char c) { value[size++] = c; }
|
|
|
|
};
|
|
|
|
|
2015-01-03 20:57:15 +00:00
|
|
|
class SOCKSServer;
|
2015-01-05 19:14:53 +00:00
|
|
|
class SOCKSHandler: public std::enable_shared_from_this<SOCKSHandler> {
|
2014-07-14 16:40:06 +00:00
|
|
|
private:
|
2015-01-03 14:39:03 +00:00
|
|
|
enum state {
|
2015-01-05 19:14:53 +00:00
|
|
|
GET_SOCKSV,
|
2015-01-04 03:40:07 +00:00
|
|
|
GET_COMMAND,
|
|
|
|
GET_PORT,
|
|
|
|
GET_IPV4,
|
|
|
|
GET4_IDENT,
|
2015-01-03 14:39:03 +00:00
|
|
|
GET4A_HOST,
|
2015-01-03 20:57:15 +00:00
|
|
|
GET5_AUTHNUM,
|
|
|
|
GET5_AUTH,
|
|
|
|
GET5_REQUESTV,
|
|
|
|
GET5_GETRSV,
|
|
|
|
GET5_GETADDRTYPE,
|
2015-01-04 03:40:07 +00:00
|
|
|
GET5_IPV6,
|
2015-01-03 20:57:15 +00:00
|
|
|
GET5_HOST_SIZE,
|
|
|
|
GET5_HOST,
|
2015-01-03 14:39:03 +00:00
|
|
|
DONE
|
|
|
|
};
|
2015-01-04 03:22:36 +00:00
|
|
|
enum authMethods {
|
|
|
|
AUTH_NONE = 0, //No authentication, skip to next step
|
|
|
|
AUTH_GSSAPI = 1, //GSSAPI authentication
|
|
|
|
AUTH_USERPASSWD = 2, //Username and password
|
|
|
|
AUTH_UNACCEPTABLE = 0xff //No acceptable method found
|
|
|
|
};
|
|
|
|
enum addrTypes {
|
|
|
|
ADDR_IPV4 = 1, //IPv4 address (4 octets)
|
|
|
|
ADDR_DNS = 3, // DNS name (up to 255 octets)
|
|
|
|
ADDR_IPV6 = 4 //IPV6 address (16 octets)
|
|
|
|
};
|
|
|
|
enum errTypes {
|
|
|
|
SOCKS5_OK = 0, // No error for SOCKS5
|
|
|
|
SOCKS5_GEN_FAIL = 1, // General server failure
|
|
|
|
SOCKS5_RULE_DENIED = 2, // Connection disallowed by ruleset
|
|
|
|
SOCKS5_NET_UNREACH = 3, // Network unreachable
|
|
|
|
SOCKS5_HOST_UNREACH = 4, // Host unreachable
|
|
|
|
SOCKS5_CONN_REFUSED = 5, // Connection refused by the peer
|
|
|
|
SOCKS5_TTL_EXPIRED = 6, // TTL Expired
|
|
|
|
SOCKS5_CMD_UNSUP = 7, // Command unsuported
|
|
|
|
SOCKS5_ADDR_UNSUP = 8, // Address type unsuported
|
|
|
|
SOCKS4_OK = 90, // No error for SOCKS4
|
|
|
|
SOCKS4_FAIL = 91, // Failed establishing connecting or not allowed
|
|
|
|
SOCKS4_IDENTD_MISSING = 92, // Couldn't connect to the identd server
|
|
|
|
SOCKS4_IDENTD_DIFFER = 93 // The ID reported by the application and by identd differ
|
|
|
|
};
|
|
|
|
enum cmdTypes {
|
|
|
|
CMD_CONNECT = 1, // TCP Connect
|
|
|
|
CMD_BIND = 2, // TCP Bind
|
|
|
|
CMD_UDP = 3 // UDP associate
|
|
|
|
};
|
|
|
|
enum socksVersions {
|
|
|
|
SOCKS4 = 4, // SOCKS4
|
|
|
|
SOCKS5 = 5 // SOCKS5
|
|
|
|
};
|
2015-01-05 11:37:52 +00:00
|
|
|
union address {
|
|
|
|
uint32_t ip;
|
|
|
|
SOCKSDnsAddress dns;
|
|
|
|
uint8_t ipv6[16];
|
|
|
|
};
|
2015-01-04 03:22:36 +00:00
|
|
|
|
2015-01-05 19:14:53 +00:00
|
|
|
void EnterState(state nstate, uint8_t parseleft = 1);
|
|
|
|
bool HandleData(uint8_t *sock_buff, std::size_t len);
|
|
|
|
void ValidateSOCKSRequest();
|
2015-01-03 14:39:03 +00:00
|
|
|
void HandleSockRecv(const boost::system::error_code & ecode, std::size_t bytes_transfered);
|
2015-01-05 19:14:53 +00:00
|
|
|
void Done();
|
2015-01-03 14:39:03 +00:00
|
|
|
void Terminate();
|
|
|
|
void AsyncSockRead();
|
2015-01-05 11:37:52 +00:00
|
|
|
boost::asio::const_buffers_1 GenerateSOCKS5SelectAuth(authMethods method);
|
|
|
|
boost::asio::const_buffers_1 GenerateSOCKS4Response(errTypes error, uint32_t ip, uint16_t port);
|
|
|
|
boost::asio::const_buffers_1 GenerateSOCKS5Response(errTypes error, addrTypes type, const address &addr, uint16_t port);
|
2015-01-05 19:14:53 +00:00
|
|
|
bool Socks5ChooseAuth();
|
2015-01-05 11:37:52 +00:00
|
|
|
void SocksRequestFailed(errTypes error);
|
2015-01-03 20:57:15 +00:00
|
|
|
void SocksRequestSuccess();
|
2015-01-05 11:37:52 +00:00
|
|
|
void SentSocksFailed(const boost::system::error_code & ecode);
|
2015-01-05 19:14:53 +00:00
|
|
|
void SentSocksDone(const boost::system::error_code & ecode);
|
2015-01-05 11:37:52 +00:00
|
|
|
void SentSocksResponse(const boost::system::error_code & ecode);
|
2015-01-03 14:39:03 +00:00
|
|
|
void HandleStreamRequestComplete (std::shared_ptr<i2p::stream::Stream> stream);
|
|
|
|
|
|
|
|
uint8_t m_sock_buff[socks_buffer_size];
|
2015-01-03 20:57:15 +00:00
|
|
|
SOCKSServer * m_parent;
|
2015-01-03 14:39:03 +00:00
|
|
|
boost::asio::ip::tcp::socket * m_sock;
|
|
|
|
std::shared_ptr<i2p::stream::Stream> m_stream;
|
2015-01-05 19:14:53 +00:00
|
|
|
uint8_t m_response[7+max_socks_hostname_size];
|
2015-01-05 11:45:10 +00:00
|
|
|
address m_address; //Address
|
2015-01-05 11:37:52 +00:00
|
|
|
uint32_t m_4aip; //Used in 4a requests
|
2015-01-05 11:45:10 +00:00
|
|
|
uint16_t m_port;
|
|
|
|
uint8_t m_command;
|
|
|
|
uint8_t m_parseleft; //Octets left to parse
|
2015-01-04 03:22:36 +00:00
|
|
|
authMethods m_authchosen; //Authentication chosen
|
|
|
|
addrTypes m_addrtype; //Address type chosen
|
|
|
|
socksVersions m_socksv; //Socks version
|
2015-01-04 03:40:07 +00:00
|
|
|
cmdTypes m_cmd; // Command requested
|
2015-01-05 19:14:53 +00:00
|
|
|
state m_state;
|
|
|
|
std::atomic<bool> dead; //To avoid cleaning up multiple times
|
2015-01-03 20:57:15 +00:00
|
|
|
|
2014-07-14 16:40:06 +00:00
|
|
|
public:
|
2015-01-03 20:57:15 +00:00
|
|
|
SOCKSHandler(SOCKSServer * parent, boost::asio::ip::tcp::socket * sock) :
|
2015-01-05 19:14:53 +00:00
|
|
|
m_parent(parent), m_sock(sock), m_stream(nullptr),
|
|
|
|
m_authchosen(AUTH_UNACCEPTABLE), m_addrtype(ADDR_IPV4), dead(false)
|
|
|
|
{ m_address.ip = 0; AsyncSockRead(); EnterState(GET_SOCKSV); }
|
|
|
|
~SOCKSHandler() { Terminate(); }
|
2014-07-14 16:40:06 +00:00
|
|
|
};
|
|
|
|
|
2015-01-03 20:57:15 +00:00
|
|
|
class SOCKSServer: public i2p::client::I2PTunnel
|
2015-01-03 05:42:53 +00:00
|
|
|
{
|
2015-01-05 19:14:53 +00:00
|
|
|
private:
|
|
|
|
std::set<std::shared_ptr<SOCKSHandler> > m_Handlers;
|
|
|
|
boost::asio::ip::tcp::acceptor m_Acceptor;
|
|
|
|
boost::asio::deadline_timer m_Timer;
|
|
|
|
std::mutex m_HandlersMutex;
|
|
|
|
|
|
|
|
private:
|
|
|
|
|
|
|
|
void Accept();
|
|
|
|
void HandleAccept(const boost::system::error_code& ecode, boost::asio::ip::tcp::socket * socket);
|
|
|
|
|
2014-07-14 16:40:06 +00:00
|
|
|
public:
|
2015-01-03 20:57:15 +00:00
|
|
|
SOCKSServer(int port) : I2PTunnel(nullptr),
|
2015-01-03 05:42:53 +00:00
|
|
|
m_Acceptor (GetService (), boost::asio::ip::tcp::endpoint (boost::asio::ip::tcp::v4(), port)),
|
|
|
|
m_Timer (GetService ()) {};
|
2015-01-03 20:57:15 +00:00
|
|
|
~SOCKSServer() { Stop(); }
|
2015-01-03 05:42:53 +00:00
|
|
|
|
|
|
|
void Start ();
|
|
|
|
void Stop ();
|
2015-01-05 19:14:53 +00:00
|
|
|
void AddHandler (std::shared_ptr<SOCKSHandler> handler);
|
|
|
|
void RemoveHandler (std::shared_ptr<SOCKSHandler> handler);
|
|
|
|
void ClearHandlers ();
|
|
|
|
};
|
2014-07-14 16:40:06 +00:00
|
|
|
|
2015-01-03 20:57:15 +00:00
|
|
|
typedef SOCKSServer SOCKSProxy;
|
2014-07-14 16:40:06 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#endif
|