OpenVPN
socks.c
Go to the documentation of this file.
1/*
2 * OpenVPN -- An application to securely tunnel IP networks
3 * over a single TCP/UDP port, with support for SSL/TLS-based
4 * session authentication and key exchange,
5 * packet encryption, packet authentication, and
6 * packet compression.
7 *
8 * Copyright (C) 2002-2025 OpenVPN Inc <sales@openvpn.net>
9 *
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU General Public License version 2
12 * as published by the Free Software Foundation.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
18 *
19 * You should have received a copy of the GNU General Public License along
20 * with this program; if not, see <https://www.gnu.org/licenses/>.
21 */
22
23/*
24 * 2004-01-30: Added Socks5 proxy support, see RFC 1928
25 * (Christof Meerwald, https://cmeerw.org)
26 *
27 * 2010-10-10: Added Socks5 plain text authentication support (RFC 1929)
28 * (Pierre Bourdon <delroth@gmail.com>)
29 */
30
31#ifdef HAVE_CONFIG_H
32#include "config.h"
33#endif
34
35#include "syshead.h"
36
37#include "common.h"
38#include "misc.h"
39#include "win32.h"
40#include "socket.h"
41#include "fdmisc.h"
42#include "misc.h"
43#include "proxy.h"
44#include "forward.h"
45
46#include "memdbg.h"
47
48#define UP_TYPE_SOCKS "SOCKS Proxy"
49
50struct socks_proxy_info *
51socks_proxy_new(const char *server, const char *port, const char *authfile)
52{
53 struct socks_proxy_info *p;
54
56
58 ASSERT(port);
59
60 strncpynt(p->server, server, sizeof(p->server));
61 p->port = port;
62
63 if (authfile)
64 {
65 strncpynt(p->authfile, authfile, sizeof(p->authfile));
66 }
67 else
68 {
69 p->authfile[0] = 0;
70 }
71
72 p->defined = true;
73
74 return p;
75}
76
77void
79{
80 free(sp);
81}
82
83static bool
84socks_proxy_recv_char(uint8_t *c, const char *name, socket_descriptor_t sd,
85 struct event_timeout *server_poll_timeout,
86 volatile int *signal_received)
87{
88 fd_set reads;
89 FD_ZERO(&reads);
90 openvpn_fd_set(sd, &reads);
91
92 struct timeval tv;
93 tv.tv_sec = get_server_poll_remaining_time(server_poll_timeout);
94 tv.tv_usec = 0;
95
96 return proxy_recv_char(c, name, sd, &tv, signal_received);
97}
98
99static bool
101 struct event_timeout *server_poll_timeout,
102 volatile int *signal_received)
103{
104 char to_send[516];
105 struct user_pass creds;
106 bool ret = false;
107
108 CLEAR(creds);
110 {
111 msg(M_NONFATAL, "SOCKS failed to get username/password.");
112 goto cleanup;
113 }
114
115 if ((strlen(creds.username) > 255) || (strlen(creds.password) > 255))
116 {
117 msg(M_NONFATAL, "SOCKS username and/or password exceeds 255 characters. "
118 "Authentication not possible.");
119 goto cleanup;
120 }
121
122 int sret = snprintf(to_send, sizeof(to_send), "\x01%c%s%c%s", (int)strlen(creds.username),
123 creds.username, (int)strlen(creds.password), creds.password);
124 ASSERT(sret >= 0 && sret <= sizeof(to_send));
125
126 if (!proxy_send(sd, to_send, strlen(to_send)))
127 {
128 goto cleanup;
129 }
130
131 int len = 0;
132 uint8_t buf[2];
133 while (len < 2)
134 {
135 uint8_t c;
136
137 if (!socks_proxy_recv_char(&c, __func__, sd, server_poll_timeout, signal_received))
138 {
139 goto cleanup;
140 }
141 /* store char in buffer */
142 buf[len++] = c;
143 }
144
145 /* VER = 5, SUCCESS = 0 --> auth success */
146 if (buf[0] != 5 && buf[1] != 0)
147 {
148 msg(D_LINK_ERRORS, "socks_username_password_auth: server refused the authentication");
149 goto cleanup;
150 }
151
152 ret = true;
153cleanup:
154 secure_memzero(&creds, sizeof(creds));
155 secure_memzero(to_send, sizeof(to_send));
156 return ret;
157}
158
159static bool
161 struct event_timeout *server_poll_timeout, volatile int *signal_received)
162{
163 uint8_t buf[2];
164 int len = 0;
165
166 /* VER = 5, NMETHODS = 1, METHODS = [0 (no auth)] */
167 uint8_t method_sel[3] = { 0x05, 0x01, 0x00 };
168 if (p->authfile[0])
169 {
170 method_sel[2] = 0x02; /* METHODS = [2 (plain login)] */
171 }
172 if (!proxy_send(sd, method_sel, sizeof(method_sel)))
173 {
174 return false;
175 }
176
177 while (len < 2)
178 {
179 uint8_t c;
180
181 if (!socks_proxy_recv_char(&c, __func__, sd, server_poll_timeout, signal_received))
182 {
183 return false;
184 }
185 /* store char in buffer */
186 buf[len++] = c;
187 }
188
189 /* VER == 5 */
190 if (buf[0] != 5)
191 {
192 msg(D_LINK_ERRORS, "socks_handshake: Socks proxy returned bad status");
193 return false;
194 }
195
196 /* validate that the auth method returned is the one sent */
197 if (buf[1] != method_sel[2])
198 {
199 msg(D_LINK_ERRORS, "socks_handshake: Socks proxy returned unexpected auth");
200 return false;
201 }
202
203 /* select the appropriate authentication method */
204 switch (buf[1])
205 {
206 case 0: /* no authentication */
207 break;
208
209 case 2: /* login/password */
210 if (!p->authfile[0])
211 {
213 "socks_handshake: server asked for username/login auth but we were "
214 "not provided any credentials");
215 return false;
216 }
217
218 if (!socks_username_password_auth(p, sd, server_poll_timeout, signal_received))
219 {
220 return false;
221 }
222
223 break;
224
225 default: /* unknown auth method */
226 msg(D_LINK_ERRORS, "socks_handshake: unknown SOCKS auth method");
227 return false;
228 }
229
230 return true;
231}
232
233static bool
235 struct event_timeout *server_poll_timeout, volatile int *signal_received)
236{
237 uint8_t atyp = 0;
238 int alen = 0;
239 int len = 0;
240 char buf[270]; /* 4 + alen(max 256) + 2 */
241
242 if (addr != NULL)
243 {
244 addr->addr.in4.sin_family = AF_INET;
245 addr->addr.in4.sin_addr.s_addr = htonl(INADDR_ANY);
246 addr->addr.in4.sin_port = htons(0);
247 }
248
249 while (len < 4 + alen + 2)
250 {
251 uint8_t c;
252
253 if (!socks_proxy_recv_char(&c, __func__, sd, server_poll_timeout, signal_received))
254 {
255 return false;
256 }
257
258 if (len == 3)
259 {
260 atyp = c;
261 }
262
263 if (len == 4)
264 {
265 switch (atyp)
266 {
267 case 1: /* IP V4 */
268 alen = 4;
269 break;
270
271 case 3: /* DOMAINNAME */
272 /* RFC 1928, section 5: 1 byte length, <n> bytes name,
273 * so the total "address length" is (length+1)
274 */
275 alen = c + 1;
276 break;
277
278 case 4: /* IP V6 */
279 alen = 16;
280 break;
281
282 default:
283 msg(D_LINK_ERRORS, "recv_socks_reply: Socks proxy returned bad address type");
284 return false;
285 }
286 }
287
288 /* store char in buffer */
289 if (len < (int)sizeof(buf))
290 {
291 buf[len] = c;
292 }
293 ++len;
294 }
295
296 /* VER == 5 && REP == 0 (succeeded) */
297 if (buf[0] != 5 || buf[1] != 0)
298 {
299 msg(D_LINK_ERRORS, "recv_socks_reply: Socks proxy returned bad reply");
300 return false;
301 }
302
303 /* ATYP == 1 (IP V4 address) */
304 if (atyp == 1 && addr != NULL)
305 {
306 memcpy(&addr->addr.in4.sin_addr, buf + 4, sizeof(addr->addr.in4.sin_addr));
307 memcpy(&addr->addr.in4.sin_port, buf + 8, sizeof(addr->addr.in4.sin_port));
308 struct gc_arena gc = gc_new();
309 msg(M_INFO, "SOCKS proxy wants us to send UDP to %s", print_openvpn_sockaddr(addr, &gc));
310 gc_free(&gc);
311 }
312
313
314 return true;
315}
316
317static int
318port_from_servname(const char *servname)
319{
320 int port = 0;
321 port = atoi(servname);
322 if (port > 0 && port < 65536)
323 {
324 return port;
325 }
326
327 struct servent *service;
328 service = getservbyname(servname, NULL);
329 if (service)
330 {
331 return service->s_port;
332 }
333
334 return 0;
335}
336
337void
339 socket_descriptor_t sd, /* already open to proxy */
340 const char *host, /* openvpn server remote */
341 const char *servname, /* openvpn server port */
342 struct event_timeout *server_poll_timeout,
343 struct signal_info *sig_info)
344{
345 char buf[270];
346 size_t len;
347
348 if (!socks_handshake(p, sd, server_poll_timeout, &sig_info->signal_received))
349 {
350 goto error;
351 }
352
353 /* format Socks CONNECT message */
354 buf[0] = '\x05'; /* VER = 5 */
355 buf[1] = '\x01'; /* CMD = 1 (CONNECT) */
356 buf[2] = '\x00'; /* RSV */
357 buf[3] = '\x03'; /* ATYP = 3 (DOMAINNAME) */
358
359 len = strlen(host);
360 len = (5 + len + 2 > sizeof(buf)) ? (sizeof(buf) - 5 - 2) : len;
361
362 buf[4] = (char)len;
363 memcpy(buf + 5, host, len);
364
365 int port = port_from_servname(servname);
366 if (port == 0)
367 {
368 msg(D_LINK_ERRORS, "establish_socks_proxy_passthrough: Cannot convert %s to port number",
369 servname);
370 goto error;
371 }
372
373 buf[5 + len] = (char)(port >> 8);
374 buf[5 + len + 1] = (char)(port & 0xff);
375
376 if (!proxy_send(sd, buf, 5 + len + 2))
377 {
378 goto error;
379 }
380
381 /* receive reply from Socks proxy and discard */
382 if (!recv_socks_reply(sd, NULL, server_poll_timeout, &sig_info->signal_received))
383 {
384 goto error;
385 }
386
387 return;
388
389error:
390 /* SOFT-SIGUSR1 -- socks error */
391 register_signal(sig_info, SIGUSR1, "socks-error");
392 return;
393}
394
395void
397 socket_descriptor_t ctrl_sd, /* already open to proxy */
398 struct openvpn_sockaddr *relay_addr,
399 struct event_timeout *server_poll_timeout,
400 struct signal_info *sig_info)
401{
402 if (!socks_handshake(p, ctrl_sd, server_poll_timeout, &sig_info->signal_received))
403 {
404 goto error;
405 }
406
407 {
408 /* send Socks UDP ASSOCIATE message */
409 /* VER = 5, CMD = 3 (UDP ASSOCIATE), RSV = 0, ATYP = 1 (IP V4),
410 * BND.ADDR = 0, BND.PORT = 0 */
411 const ssize_t size =
412 send(ctrl_sd, "\x05\x03\x00\x01\x00\x00\x00\x00\x00\x00", 10, MSG_NOSIGNAL);
413 if (size != 10)
414 {
416 "establish_socks_proxy_passthru: TCP port write failed on send()");
417 goto error;
418 }
419 }
420
421 /* receive reply from Socks proxy */
422 CLEAR(*relay_addr);
423 if (!recv_socks_reply(ctrl_sd, relay_addr, server_poll_timeout, &sig_info->signal_received))
424 {
425 goto error;
426 }
427
428 return;
429
430error:
431 /* SOFT-SIGUSR1 -- socks error */
432 register_signal(sig_info, SIGUSR1, "socks-error");
433 return;
434}
435
436/*
437 * Remove the 10 byte socks5 header from an incoming
438 * UDP packet, setting *from to the source address.
439 *
440 * Run after UDP read.
441 */
442void
444{
445 int atyp;
446
447 if (BLEN(buf) < 10)
448 {
449 goto error;
450 }
451
452 buf_read_u16(buf);
453 if (buf_read_u8(buf) != 0)
454 {
455 goto error;
456 }
457
458 atyp = buf_read_u8(buf);
459 if (atyp != 1) /* ATYP == 1 (IP V4) */
460 {
461 goto error;
462 }
463
464 buf_read(buf, &from->dest.addr.in4.sin_addr, sizeof(from->dest.addr.in4.sin_addr));
465 buf_read(buf, &from->dest.addr.in4.sin_port, sizeof(from->dest.addr.in4.sin_port));
466
467 return;
468
469error:
470 buf->len = 0;
471}
472
473/*
474 * Add a 10 byte socks header prior to UDP write.
475 * *to is the destination address.
476 *
477 * Run before UDP write.
478 * Returns the size of the header.
479 */
480int
482{
483 /*
484 * Get a 10 byte subset buffer prepended to buf --
485 * we expect these bytes will be here because
486 * we always allocate space for these bytes
487 */
488 struct buffer head = buf_sub(buf, 10, true);
489
490 /* crash if not enough headroom in buf */
491 ASSERT(buf_defined(&head));
492
493 buf_write_u16(&head, 0); /* RSV = 0 */
494 buf_write_u8(&head, 0); /* FRAG = 0 */
495 buf_write_u8(&head, '\x01'); /* ATYP = 1 (IP V4) */
496 buf_write(&head, &to->dest.addr.in4.sin_addr, sizeof(to->dest.addr.in4.sin_addr));
497 buf_write(&head, &to->dest.addr.in4.sin_port, sizeof(to->dest.addr.in4.sin_port));
498
499 return 10;
500}
struct buffer buf_sub(struct buffer *buf, int size, bool prepend)
Definition buffer.c:222
static bool buf_write_u16(struct buffer *dest, uint16_t data)
Definition buffer.h:690
static int buf_read_u16(struct buffer *buf)
Definition buffer.h:797
static bool buf_read(struct buffer *src, void *dest, int size)
Definition buffer.h:762
static void secure_memzero(void *data, size_t len)
Securely zeroise memory.
Definition buffer.h:414
static bool buf_write(struct buffer *dest, const void *src, size_t size)
Definition buffer.h:660
static bool buf_write_u8(struct buffer *dest, uint8_t data)
Definition buffer.h:684
static int buf_read_u8(struct buffer *buf)
Definition buffer.h:786
#define BLEN(buf)
Definition buffer.h:126
static void strncpynt(char *dest, const char *src, size_t maxlen)
Definition buffer.h:361
static void gc_free(struct gc_arena *a)
Definition buffer.h:1025
#define ALLOC_OBJ_CLEAR(dptr, type)
Definition buffer.h:1052
static bool buf_defined(const struct buffer *buf)
Definition buffer.h:228
static struct gc_arena gc_new(void)
Definition buffer.h:1017
#define M_INFO
Definition errlevel.h:54
#define D_LINK_ERRORS
Definition errlevel.h:56
static void openvpn_fd_set(socket_descriptor_t fd, fd_set *setp)
Definition fdmisc.h:39
int get_server_poll_remaining_time(struct event_timeout *server_poll_timeout)
Definition forward.c:503
Interface functions to the internal and external multiplexers.
static SERVICE_STATUS_HANDLE service
Definition interactive.c:50
#define GET_USER_PASS_MANAGEMENT
Definition misc.h:110
static bool get_user_pass(struct user_pass *up, const char *auth_file, const char *prefix, const unsigned int flags)
Retrieves the user credentials from various sources depending on the flags.
Definition misc.h:150
#define CLEAR(x)
Definition basic.h:32
#define M_NONFATAL
Definition error.h:91
#define msg(flags,...)
Definition error.h:152
#define ASSERT(x)
Definition error.h:219
#define M_ERRNO
Definition error.h:95
bool proxy_send(socket_descriptor_t sd, const void *buf, size_t buf_len)
Definition proxy.c:188
bool proxy_recv_char(uint8_t *c, const char *name, socket_descriptor_t sd, struct timeval *timeout, volatile int *signal_received)
Definition proxy.c:61
void register_signal(struct signal_info *si, int signum, const char *signal_text)
Register a soft signal in the signal_info struct si respecting priority.
Definition sig.c:228
#define MSG_NOSIGNAL
Definition socket.h:242
static const char * print_openvpn_sockaddr(const struct openvpn_sockaddr *addr, struct gc_arena *gc)
Definition socket_util.h:71
static int port_from_servname(const char *servname)
Definition socks.c:318
void establish_socks_proxy_passthru(struct socks_proxy_info *p, socket_descriptor_t sd, const char *host, const char *servname, struct event_timeout *server_poll_timeout, struct signal_info *sig_info)
Definition socks.c:338
static bool socks_handshake(struct socks_proxy_info *p, socket_descriptor_t sd, struct event_timeout *server_poll_timeout, volatile int *signal_received)
Definition socks.c:160
int socks_process_outgoing_udp(struct buffer *buf, const struct link_socket_actual *to)
Definition socks.c:481
static bool socks_username_password_auth(struct socks_proxy_info *p, socket_descriptor_t sd, struct event_timeout *server_poll_timeout, volatile int *signal_received)
Definition socks.c:100
#define UP_TYPE_SOCKS
Definition socks.c:48
void socks_process_incoming_udp(struct buffer *buf, struct link_socket_actual *from)
Definition socks.c:443
static bool recv_socks_reply(socket_descriptor_t sd, struct openvpn_sockaddr *addr, struct event_timeout *server_poll_timeout, volatile int *signal_received)
Definition socks.c:234
struct socks_proxy_info * socks_proxy_new(const char *server, const char *port, const char *authfile)
Definition socks.c:51
void establish_socks_proxy_udpassoc(struct socks_proxy_info *p, socket_descriptor_t ctrl_sd, struct openvpn_sockaddr *relay_addr, struct event_timeout *server_poll_timeout, struct signal_info *sig_info)
Definition socks.c:396
static bool socks_proxy_recv_char(uint8_t *c, const char *name, socket_descriptor_t sd, struct event_timeout *server_poll_timeout, volatile int *signal_received)
Definition socks.c:84
void socks_proxy_close(struct socks_proxy_info *sp)
Definition socks.c:78
Wrapper structure for dynamically allocated memory.
Definition buffer.h:60
int len
Length in bytes of the actual content within the allocated memory.
Definition buffer.h:65
Garbage collection arena used to keep track of dynamically allocated memory.
Definition buffer.h:116
union openvpn_sockaddr::@27 addr
struct sockaddr_in in4
Definition socket_util.h:43
volatile int signal_received
Definition sig.h:42
char authfile[256]
Definition socks.h:42
char server[128]
Definition socks.h:40
const char * port
Definition socks.h:41
char password[USER_PASS_LEN]
Definition misc.h:68
char username[USER_PASS_LEN]
Definition misc.h:67
SOCKET socket_descriptor_t
Definition syshead.h:440
static int cleanup(void **state)
struct gc_arena gc
Definition test_ssl.c:131