48#define UP_TYPE_SOCKS "SOCKS Proxy"
86 volatile int *signal_received)
102 volatile int *signal_received)
117 msg(
M_NONFATAL,
"SOCKS username and/or password exceeds 255 characters. "
118 "Authentication not possible.");
125 if (!
proxy_send(sd, to_send, strlen(to_send)))
145 if (buf[0] != 5 || buf[1] != 0)
147 msg(
D_LINK_ERRORS,
"socks_username_password_auth: server refused the authentication");
160 struct event_timeout *server_poll_timeout,
volatile int *signal_received)
166 uint8_t method_sel[3] = { 0x05, 0x01, 0x00 };
169 method_sel[2] = 0x02;
171 if (!
proxy_send(sd, method_sel,
sizeof(method_sel)))
196 if (buf[1] != method_sel[2])
198 msg(
D_LINK_ERRORS,
"socks_handshake: Socks proxy returned unexpected auth");
212 "socks_handshake: server asked for username/login auth but we were "
213 "not provided any credentials");
234 struct event_timeout *server_poll_timeout,
volatile int *signal_received)
243 addr->
addr.
in4.sin_family = AF_INET;
244 addr->
addr.
in4.sin_addr.s_addr = htonl(INADDR_ANY);
245 addr->
addr.
in4.sin_port = htons(0);
248 while (len < 4 + alen + 2)
282 msg(
D_LINK_ERRORS,
"recv_socks_reply: Socks proxy returned bad address type");
288 if (len < (
int)
sizeof(buf))
296 if (buf[0] != 5 || buf[1] != 0)
303 if (atyp == 1 && addr != NULL)
305 memcpy(&addr->
addr.
in4.sin_addr, buf + 4,
sizeof(addr->
addr.
in4.sin_addr));
306 memcpy(&addr->
addr.
in4.sin_port, buf + 8,
sizeof(addr->
addr.
in4.sin_port));
320 port = atoi(servname);
321 if (port > 0 && port < 65536)
327 service = getservbyname(servname, NULL);
340 const char *servname,
359 len = (5 + len + 2 >
sizeof(buf)) ? (
sizeof(buf) - 5 - 2) : len;
362 memcpy(buf + 5, host, len);
367 msg(
D_LINK_ERRORS,
"establish_socks_proxy_passthrough: Cannot convert %s to port number",
372 buf[5 + len] = (char)(port >> 8);
373 buf[5 + len + 1] = (char)(port & 0xff);
411 send(ctrl_sd,
"\x05\x03\x00\x01\x00\x00\x00\x00\x00\x00", 10,
MSG_NOSIGNAL);
425 if (!relay_addr->
addr.
in4.sin_addr.s_addr)
427 msg(
D_LINK_ERRORS,
"%s: Socks proxy did not answer with IPv4 address", __func__);
499 buf_write(&head, &
to->dest.addr.in4.sin_addr,
sizeof(
to->dest.addr.in4.sin_addr));
500 buf_write(&head, &
to->dest.addr.in4.sin_port,
sizeof(
to->dest.addr.in4.sin_port));
struct buffer buf_sub(struct buffer *buf, int size, bool prepend)
bool checked_snprintf(char *str, size_t size, const char *format,...)
Like snprintf() but returns an boolean.
static bool buf_write_u16(struct buffer *dest, uint16_t data)
static int buf_read_u16(struct buffer *buf)
static bool buf_read(struct buffer *src, void *dest, int size)
static void secure_memzero(void *data, size_t len)
Securely zeroise memory.
static bool buf_write(struct buffer *dest, const void *src, size_t size)
static bool buf_write_u8(struct buffer *dest, uint8_t data)
static int buf_read_u8(struct buffer *buf)
static void strncpynt(char *dest, const char *src, size_t maxlen)
static void gc_free(struct gc_arena *a)
#define ALLOC_OBJ_CLEAR(dptr, type)
static bool buf_defined(const struct buffer *buf)
static struct gc_arena gc_new(void)
static void openvpn_fd_set(socket_descriptor_t fd, fd_set *setp)
int get_server_poll_remaining_time(struct event_timeout *server_poll_timeout)
Interface functions to the internal and external multiplexers.
static SERVICE_STATUS_HANDLE service
#define GET_USER_PASS_MANAGEMENT
static bool get_user_pass(struct user_pass *up, const char *auth_file, const char *prefix, const unsigned int flags)
Retrieves the user credentials from various sources depending on the flags.
#define SOCKS_UDPv4_HEADROOM
bool proxy_send(socket_descriptor_t sd, const void *buf, size_t buf_len)
bool proxy_recv_char(uint8_t *c, const char *name, socket_descriptor_t sd, struct timeval *timeout, volatile int *signal_received)
void register_signal(struct signal_info *si, int signum, const char *signal_text)
Register a soft signal in the signal_info struct si respecting priority.
static const char * print_openvpn_sockaddr(const struct openvpn_sockaddr *addr, struct gc_arena *gc)
static int port_from_servname(const char *servname)
void establish_socks_proxy_passthru(struct socks_proxy_info *p, socket_descriptor_t sd, const char *host, const char *servname, struct event_timeout *server_poll_timeout, struct signal_info *sig_info)
static bool socks_handshake(struct socks_proxy_info *p, socket_descriptor_t sd, struct event_timeout *server_poll_timeout, volatile int *signal_received)
int socks_process_outgoing_udp(struct buffer *buf, const struct link_socket_actual *to)
static bool socks_username_password_auth(struct socks_proxy_info *p, socket_descriptor_t sd, struct event_timeout *server_poll_timeout, volatile int *signal_received)
void socks_process_incoming_udp(struct buffer *buf, struct link_socket_actual *from)
static bool recv_socks_reply(socket_descriptor_t sd, struct openvpn_sockaddr *addr, struct event_timeout *server_poll_timeout, volatile int *signal_received)
struct socks_proxy_info * socks_proxy_new(const char *server, const char *port, const char *authfile)
void establish_socks_proxy_udpassoc(struct socks_proxy_info *p, socket_descriptor_t ctrl_sd, struct openvpn_sockaddr *relay_addr, struct event_timeout *server_poll_timeout, struct signal_info *sig_info)
static bool socks_proxy_recv_char(uint8_t *c, const char *name, socket_descriptor_t sd, struct event_timeout *server_poll_timeout, volatile int *signal_received)
void socks_proxy_close(struct socks_proxy_info *sp)
Wrapper structure for dynamically allocated memory.
int len
Length in bytes of the actual content within the allocated memory.
Garbage collection arena used to keep track of dynamically allocated memory.
struct openvpn_sockaddr dest
union openvpn_sockaddr::@27 addr
volatile int signal_received
char password[USER_PASS_LEN]
char username[USER_PASS_LEN]
SOCKET socket_descriptor_t
static int cleanup(void **state)