48#define UP_TYPE_SOCKS "SOCKS Proxy"
86 volatile int *signal_received)
102 volatile int *signal_received)
117 msg(
M_NONFATAL,
"SOCKS username and/or password exceeds 255 characters. "
118 "Authentication not possible.");
122 int sret = snprintf(to_send,
sizeof(to_send),
"\x01%c%s%c%s", (
int)strlen(creds.
username),
124 ASSERT(sret >= 0 && sret <=
sizeof(to_send));
126 if (!
proxy_send(sd, to_send, strlen(to_send)))
146 if (buf[0] != 5 && buf[1] != 0)
148 msg(
D_LINK_ERRORS,
"socks_username_password_auth: server refused the authentication");
161 struct event_timeout *server_poll_timeout,
volatile int *signal_received)
167 uint8_t method_sel[3] = { 0x05, 0x01, 0x00 };
170 method_sel[2] = 0x02;
172 if (!
proxy_send(sd, method_sel,
sizeof(method_sel)))
197 if (buf[1] != method_sel[2])
199 msg(
D_LINK_ERRORS,
"socks_handshake: Socks proxy returned unexpected auth");
213 "socks_handshake: server asked for username/login auth but we were "
214 "not provided any credentials");
235 struct event_timeout *server_poll_timeout,
volatile int *signal_received)
244 addr->
addr.
in4.sin_family = AF_INET;
245 addr->
addr.
in4.sin_addr.s_addr = htonl(INADDR_ANY);
246 addr->
addr.
in4.sin_port = htons(0);
249 while (len < 4 + alen + 2)
283 msg(
D_LINK_ERRORS,
"recv_socks_reply: Socks proxy returned bad address type");
289 if (len < (
int)
sizeof(buf))
297 if (buf[0] != 5 || buf[1] != 0)
304 if (atyp == 1 && addr != NULL)
306 memcpy(&addr->
addr.
in4.sin_addr, buf + 4,
sizeof(addr->
addr.
in4.sin_addr));
307 memcpy(&addr->
addr.
in4.sin_port, buf + 8,
sizeof(addr->
addr.
in4.sin_port));
321 port = atoi(servname);
322 if (port > 0 && port < 65536)
328 service = getservbyname(servname, NULL);
341 const char *servname,
360 len = (5 + len + 2 >
sizeof(buf)) ? (
sizeof(buf) - 5 - 2) : len;
363 memcpy(buf + 5, host, len);
368 msg(
D_LINK_ERRORS,
"establish_socks_proxy_passthrough: Cannot convert %s to port number",
373 buf[5 + len] = (char)(port >> 8);
374 buf[5 + len + 1] = (char)(port & 0xff);
412 send(ctrl_sd,
"\x05\x03\x00\x01\x00\x00\x00\x00\x00\x00", 10,
MSG_NOSIGNAL);
416 "establish_socks_proxy_passthru: TCP port write failed on send()");
496 buf_write(&head, &
to->dest.addr.in4.sin_addr,
sizeof(
to->dest.addr.in4.sin_addr));
497 buf_write(&head, &
to->dest.addr.in4.sin_port,
sizeof(
to->dest.addr.in4.sin_port));
struct buffer buf_sub(struct buffer *buf, int size, bool prepend)
static bool buf_write_u16(struct buffer *dest, uint16_t data)
static int buf_read_u16(struct buffer *buf)
static bool buf_read(struct buffer *src, void *dest, int size)
static void secure_memzero(void *data, size_t len)
Securely zeroise memory.
static bool buf_write(struct buffer *dest, const void *src, size_t size)
static bool buf_write_u8(struct buffer *dest, uint8_t data)
static int buf_read_u8(struct buffer *buf)
static void strncpynt(char *dest, const char *src, size_t maxlen)
static void gc_free(struct gc_arena *a)
#define ALLOC_OBJ_CLEAR(dptr, type)
static bool buf_defined(const struct buffer *buf)
static struct gc_arena gc_new(void)
static void openvpn_fd_set(socket_descriptor_t fd, fd_set *setp)
int get_server_poll_remaining_time(struct event_timeout *server_poll_timeout)
Interface functions to the internal and external multiplexers.
static SERVICE_STATUS_HANDLE service
#define GET_USER_PASS_MANAGEMENT
static bool get_user_pass(struct user_pass *up, const char *auth_file, const char *prefix, const unsigned int flags)
Retrieves the user credentials from various sources depending on the flags.
bool proxy_send(socket_descriptor_t sd, const void *buf, size_t buf_len)
bool proxy_recv_char(uint8_t *c, const char *name, socket_descriptor_t sd, struct timeval *timeout, volatile int *signal_received)
void register_signal(struct signal_info *si, int signum, const char *signal_text)
Register a soft signal in the signal_info struct si respecting priority.
static const char * print_openvpn_sockaddr(const struct openvpn_sockaddr *addr, struct gc_arena *gc)
static int port_from_servname(const char *servname)
void establish_socks_proxy_passthru(struct socks_proxy_info *p, socket_descriptor_t sd, const char *host, const char *servname, struct event_timeout *server_poll_timeout, struct signal_info *sig_info)
static bool socks_handshake(struct socks_proxy_info *p, socket_descriptor_t sd, struct event_timeout *server_poll_timeout, volatile int *signal_received)
int socks_process_outgoing_udp(struct buffer *buf, const struct link_socket_actual *to)
static bool socks_username_password_auth(struct socks_proxy_info *p, socket_descriptor_t sd, struct event_timeout *server_poll_timeout, volatile int *signal_received)
void socks_process_incoming_udp(struct buffer *buf, struct link_socket_actual *from)
static bool recv_socks_reply(socket_descriptor_t sd, struct openvpn_sockaddr *addr, struct event_timeout *server_poll_timeout, volatile int *signal_received)
struct socks_proxy_info * socks_proxy_new(const char *server, const char *port, const char *authfile)
void establish_socks_proxy_udpassoc(struct socks_proxy_info *p, socket_descriptor_t ctrl_sd, struct openvpn_sockaddr *relay_addr, struct event_timeout *server_poll_timeout, struct signal_info *sig_info)
static bool socks_proxy_recv_char(uint8_t *c, const char *name, socket_descriptor_t sd, struct event_timeout *server_poll_timeout, volatile int *signal_received)
void socks_proxy_close(struct socks_proxy_info *sp)
Wrapper structure for dynamically allocated memory.
int len
Length in bytes of the actual content within the allocated memory.
Garbage collection arena used to keep track of dynamically allocated memory.
struct openvpn_sockaddr dest
union openvpn_sockaddr::@27 addr
volatile int signal_received
char password[USER_PASS_LEN]
char username[USER_PASS_LEN]
SOCKET socket_descriptor_t
static int cleanup(void **state)