48#define UP_TYPE_SOCKS "SOCKS Proxy"
83#if defined(__GNUC__) || defined(__clang__)
84#pragma GCC diagnostic push
85#pragma GCC diagnostic ignored "-Wconversion"
91 volatile int *signal_received)
101 const int status = select(sd + 1, &reads, NULL, NULL, &tv);
104 if (*signal_received)
139 volatile int *signal_received)
157 msg(
M_NONFATAL,
"SOCKS username and/or password exceeds 255 characters. "
158 "Authentication not possible.");
162 int sret = snprintf(to_send,
sizeof(to_send),
"\x01%c%s%c%s", (
int)strlen(creds.
username),
164 ASSERT(sret <=
sizeof(to_send));
166 size = send(sd, to_send, strlen(to_send),
MSG_NOSIGNAL);
168 if (size != strlen(to_send))
171 "socks_username_password_auth: TCP port write failed on send()");
188 if (buf[0] != 5 && buf[1] != 0)
190 msg(
D_LINK_ERRORS,
"socks_username_password_auth: server refused the authentication");
203 struct event_timeout *server_poll_timeout,
volatile int *signal_received)
210 char method_sel[3] = { 0x05, 0x01, 0x00 };
213 method_sel[2] = 0x02;
215 size = send(sd, method_sel,
sizeof(method_sel),
MSG_NOSIGNAL);
216 if (size !=
sizeof(method_sel))
235 if (buf[0] !=
'\x05')
242 if (buf[1] != method_sel[2])
244 msg(
D_LINK_ERRORS,
"socks_handshake: Socks proxy returned unexpected auth");
258 "socks_handshake: server asked for username/login auth but we were "
259 "not provided any credentials");
280 struct event_timeout *server_poll_timeout,
volatile int *signal_received)
289 addr->
addr.
in4.sin_family = AF_INET;
290 addr->
addr.
in4.sin_addr.s_addr = htonl(INADDR_ANY);
291 addr->
addr.
in4.sin_port = htons(0);
294 while (len < 4 + alen + 2)
320 alen = (
unsigned char)c + 1;
328 msg(
D_LINK_ERRORS,
"recv_socks_reply: Socks proxy returned bad address type");
334 if (len < (
int)
sizeof(buf))
342 if (buf[0] !=
'\x05' || buf[1] !=
'\x00')
349 if (atyp ==
'\x01' && addr != NULL)
351 memcpy(&addr->
addr.
in4.sin_addr, buf + 4,
sizeof(addr->
addr.
in4.sin_addr));
352 memcpy(&addr->
addr.
in4.sin_port, buf + 8,
sizeof(addr->
addr.
in4.sin_port));
366 port = atoi(servname);
367 if (port > 0 && port < 65536)
373 service = getservbyname(servname, NULL);
386 const char *servname,
405 len = (5 + len + 2 >
sizeof(buf)) ? (
sizeof(buf) - 5 - 2) : len;
408 memcpy(buf + 5, host, len);
413 msg(
D_LINK_ERRORS,
"establish_socks_proxy_passthrough: Cannot convert %s to port number",
418 buf[5 + len] = (char)(port >> 8);
419 buf[5 + len + 1] = (char)(port & 0xff);
422 const ssize_t size = send(sd, buf, 5 + len + 2,
MSG_NOSIGNAL);
423 if ((
int)size != 5 + (
int)len + 2)
426 "establish_socks_proxy_passthru: TCP port write failed on send()");
446#if defined(__GNUC__) || defined(__clang__)
447#pragma GCC diagnostic pop
467 send(ctrl_sd,
"\x05\x03\x00\x01\x00\x00\x00\x00\x00\x00", 10,
MSG_NOSIGNAL);
471 "establish_socks_proxy_passthru: TCP port write failed on send()");
551 buf_write(&head, &
to->dest.addr.in4.sin_addr,
sizeof(
to->dest.addr.in4.sin_addr));
552 buf_write(&head, &
to->dest.addr.in4.sin_port,
sizeof(
to->dest.addr.in4.sin_port));
struct buffer buf_sub(struct buffer *buf, int size, bool prepend)
static bool buf_write_u16(struct buffer *dest, uint16_t data)
static int buf_read_u16(struct buffer *buf)
static bool buf_read(struct buffer *src, void *dest, int size)
static void secure_memzero(void *data, size_t len)
Securely zeroise memory.
static bool buf_write(struct buffer *dest, const void *src, size_t size)
static bool buf_write_u8(struct buffer *dest, uint8_t data)
static int buf_read_u8(struct buffer *buf)
static void strncpynt(char *dest, const char *src, size_t maxlen)
static void gc_free(struct gc_arena *a)
#define ALLOC_OBJ_CLEAR(dptr, type)
static bool buf_defined(const struct buffer *buf)
static struct gc_arena gc_new(void)
static void openvpn_fd_set(socket_descriptor_t fd, fd_set *setp)
int get_server_poll_remaining_time(struct event_timeout *server_poll_timeout)
Interface functions to the internal and external multiplexers.
static SERVICE_STATUS status
static SERVICE_STATUS_HANDLE service
#define GET_USER_PASS_MANAGEMENT
static bool get_user_pass(struct user_pass *up, const char *auth_file, const char *prefix, const unsigned int flags)
Retrieves the user credentials from various sources depending on the flags.
void register_signal(struct signal_info *si, int signum, const char *signal_text)
Register a soft signal in the signal_info struct si respecting priority.
static void get_signal(volatile int *sig)
Copy the global signal_received (if non-zero) to the passed-in argument sig.
static const char * print_openvpn_sockaddr(const struct openvpn_sockaddr *addr, struct gc_arena *gc)
static int port_from_servname(const char *servname)
void establish_socks_proxy_passthru(struct socks_proxy_info *p, socket_descriptor_t sd, const char *host, const char *servname, struct event_timeout *server_poll_timeout, struct signal_info *sig_info)
static bool socks_handshake(struct socks_proxy_info *p, socket_descriptor_t sd, struct event_timeout *server_poll_timeout, volatile int *signal_received)
int socks_process_outgoing_udp(struct buffer *buf, const struct link_socket_actual *to)
static bool socks_proxy_recv_char(char *c, const char *name, socket_descriptor_t sd, struct event_timeout *server_poll_timeout, volatile int *signal_received)
static bool socks_username_password_auth(struct socks_proxy_info *p, socket_descriptor_t sd, struct event_timeout *server_poll_timeout, volatile int *signal_received)
void socks_process_incoming_udp(struct buffer *buf, struct link_socket_actual *from)
static bool recv_socks_reply(socket_descriptor_t sd, struct openvpn_sockaddr *addr, struct event_timeout *server_poll_timeout, volatile int *signal_received)
struct socks_proxy_info * socks_proxy_new(const char *server, const char *port, const char *authfile)
void establish_socks_proxy_udpassoc(struct socks_proxy_info *p, socket_descriptor_t ctrl_sd, struct openvpn_sockaddr *relay_addr, struct event_timeout *server_poll_timeout, struct signal_info *sig_info)
void socks_proxy_close(struct socks_proxy_info *sp)
Wrapper structure for dynamically allocated memory.
int len
Length in bytes of the actual content within the allocated memory.
Garbage collection arena used to keep track of dynamically allocated memory.
struct openvpn_sockaddr dest
union openvpn_sockaddr::@27 addr
volatile int signal_received
char password[USER_PASS_LEN]
char username[USER_PASS_LEN]
SOCKET socket_descriptor_t
static int cleanup(void **state)