mirror of https://github.com/subgraph/fw-daemon
commit
d2648919cf
@ -1,43 +1,58 @@
|
||||
{
|
||||
"ImportPath": "github.com/subgraph/fw-daemon",
|
||||
"GoVersion": "go1.5",
|
||||
"GoVersion": "go1.6",
|
||||
"GodepVersion": "v74",
|
||||
"Packages": [
|
||||
"./..."
|
||||
],
|
||||
"Deps": [
|
||||
{
|
||||
"ImportPath": "github.com/godbus/dbus",
|
||||
"Comment": "v3-15-g230e4b2",
|
||||
"Rev": "230e4b23db2fd81c53eaa0073f76659d4849ce51"
|
||||
"Comment": "v4.0.0-5-g32c6cc2",
|
||||
"Rev": "32c6cc29c14570de4cf6d7e7737d68fb2d01ad15"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/godbus/dbus/introspect",
|
||||
"Comment": "v4.0.0-5-g32c6cc2",
|
||||
"Rev": "32c6cc29c14570de4cf6d7e7737d68fb2d01ad15"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/gotk3/gotk3/cairo",
|
||||
"Comment": "GOTK3_0_2_0-430-ge68c426",
|
||||
"Rev": "e68c42636533041787e09741c5027ea670ad6f84"
|
||||
"Comment": "GOTK3_0_2_0-467-gefaac8f",
|
||||
"Rev": "efaac8f907aac2f965675d64fd163097db109f95"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/gotk3/gotk3/gdk",
|
||||
"Comment": "GOTK3_0_2_0-430-ge68c426",
|
||||
"Rev": "e68c42636533041787e09741c5027ea670ad6f84"
|
||||
"Comment": "GOTK3_0_2_0-467-gefaac8f",
|
||||
"Rev": "efaac8f907aac2f965675d64fd163097db109f95"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/gotk3/gotk3/glib",
|
||||
"Comment": "GOTK3_0_2_0-430-ge68c426",
|
||||
"Rev": "e68c42636533041787e09741c5027ea670ad6f84"
|
||||
"Comment": "GOTK3_0_2_0-467-gefaac8f",
|
||||
"Rev": "efaac8f907aac2f965675d64fd163097db109f95"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/gotk3/gotk3/gtk",
|
||||
"Comment": "GOTK3_0_2_0-430-ge68c426",
|
||||
"Rev": "e68c42636533041787e09741c5027ea670ad6f84"
|
||||
"Comment": "GOTK3_0_2_0-467-gefaac8f",
|
||||
"Rev": "efaac8f907aac2f965675d64fd163097db109f95"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/gotk3/gotk3/pango",
|
||||
"Comment": "GOTK3_0_2_0-430-ge68c426",
|
||||
"Rev": "e68c42636533041787e09741c5027ea670ad6f84"
|
||||
"Comment": "GOTK3_0_2_0-467-gefaac8f",
|
||||
"Rev": "efaac8f907aac2f965675d64fd163097db109f95"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/op/go-logging",
|
||||
"Rev": "dfaf3dff9b631bc4236201d90d41ee0de9202889"
|
||||
"Comment": "v1-7-g970db52",
|
||||
"Rev": "970db520ece77730c7e4724c61121037378659d9"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/subgraph/go-procsnitch",
|
||||
"Rev": "9ed73dde9f6f84be72aa010394902057ac26b625"
|
||||
},
|
||||
{
|
||||
"ImportPath": "golang.org/x/net/proxy",
|
||||
"Rev": "ef2e00e88c5e0a3569f0bb9df697e9cbc6215fea"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,2 +0,0 @@
|
||||
/pkg
|
||||
/bin
|
@ -1,264 +0,0 @@
|
||||
// Package prop provides the Properties struct which can be used to implement
|
||||
// org.freedesktop.DBus.Properties.
|
||||
package prop
|
||||
|
||||
import (
|
||||
"github.com/subgraph/fw-daemon/Godeps/_workspace/src/github.com/godbus/dbus"
|
||||
"github.com/subgraph/fw-daemon/Godeps/_workspace/src/github.com/godbus/dbus/introspect"
|
||||
"sync"
|
||||
)
|
||||
|
||||
// EmitType controls how org.freedesktop.DBus.Properties.PropertiesChanged is
|
||||
// emitted for a property. If it is EmitTrue, the signal is emitted. If it is
|
||||
// EmitInvalidates, the signal is also emitted, but the new value of the property
|
||||
// is not disclosed.
|
||||
type EmitType byte
|
||||
|
||||
const (
|
||||
EmitFalse EmitType = iota
|
||||
EmitTrue
|
||||
EmitInvalidates
|
||||
)
|
||||
|
||||
// ErrIfaceNotFound is the error returned to peers who try to access properties
|
||||
// on interfaces that aren't found.
|
||||
var ErrIfaceNotFound = dbus.NewError("org.freedesktop.DBus.Properties.Error.InterfaceNotFound", nil)
|
||||
|
||||
// ErrPropNotFound is the error returned to peers trying to access properties
|
||||
// that aren't found.
|
||||
var ErrPropNotFound = dbus.NewError("org.freedesktop.DBus.Properties.Error.PropertyNotFound", nil)
|
||||
|
||||
// ErrReadOnly is the error returned to peers trying to set a read-only
|
||||
// property.
|
||||
var ErrReadOnly = dbus.NewError("org.freedesktop.DBus.Properties.Error.ReadOnly", nil)
|
||||
|
||||
// ErrInvalidArg is returned to peers if the type of the property that is being
|
||||
// changed and the argument don't match.
|
||||
var ErrInvalidArg = dbus.NewError("org.freedesktop.DBus.Properties.Error.InvalidArg", nil)
|
||||
|
||||
// The introspection data for the org.freedesktop.DBus.Properties interface.
|
||||
var IntrospectData = introspect.Interface{
|
||||
Name: "org.freedesktop.DBus.Properties",
|
||||
Methods: []introspect.Method{
|
||||
{
|
||||
Name: "Get",
|
||||
Args: []introspect.Arg{
|
||||
{"interface", "s", "in"},
|
||||
{"property", "s", "in"},
|
||||
{"value", "v", "out"},
|
||||
},
|
||||
},
|
||||
{
|
||||
Name: "GetAll",
|
||||
Args: []introspect.Arg{
|
||||
{"interface", "s", "in"},
|
||||
{"props", "a{sv}", "out"},
|
||||
},
|
||||
},
|
||||
{
|
||||
Name: "Set",
|
||||
Args: []introspect.Arg{
|
||||
{"interface", "s", "in"},
|
||||
{"property", "s", "in"},
|
||||
{"value", "v", "in"},
|
||||
},
|
||||
},
|
||||
},
|
||||
Signals: []introspect.Signal{
|
||||
{
|
||||
Name: "PropertiesChanged",
|
||||
Args: []introspect.Arg{
|
||||
{"interface", "s", "out"},
|
||||
{"changed_properties", "a{sv}", "out"},
|
||||
{"invalidates_properties", "as", "out"},
|
||||
},
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
// The introspection data for the org.freedesktop.DBus.Properties interface, as
|
||||
// a string.
|
||||
const IntrospectDataString = `
|
||||
<interface name="org.freedesktop.DBus.Properties">
|
||||
<method name="Get">
|
||||
<arg name="interface" direction="in" type="s"/>
|
||||
<arg name="property" direction="in" type="s"/>
|
||||
<arg name="value" direction="out" type="v"/>
|
||||
</method>
|
||||
<method name="GetAll">
|
||||
<arg name="interface" direction="in" type="s"/>
|
||||
<arg name="props" direction="out" type="a{sv}"/>
|
||||
</method>
|
||||
<method name="Set">
|
||||
<arg name="interface" direction="in" type="s"/>
|
||||
<arg name="property" direction="in" type="s"/>
|
||||
<arg name="value" direction="in" type="v"/>
|
||||
</method>
|
||||
<signal name="PropertiesChanged">
|
||||
<arg name="interface" type="s"/>
|
||||
<arg name="changed_properties" type="a{sv}"/>
|
||||
<arg name="invalidates_properties" type="as"/>
|
||||
</signal>
|
||||
</interface>
|
||||
`
|
||||
|
||||
// Prop represents a single property. It is used for creating a Properties
|
||||
// value.
|
||||
type Prop struct {
|
||||
// Initial value. Must be a DBus-representable type.
|
||||
Value interface{}
|
||||
|
||||
// If true, the value can be modified by calls to Set.
|
||||
Writable bool
|
||||
|
||||
// Controls how org.freedesktop.DBus.Properties.PropertiesChanged is
|
||||
// emitted if this property changes.
|
||||
Emit EmitType
|
||||
|
||||
// If not nil, anytime this property is changed by Set, this function is
|
||||
// called with an appropiate Change as its argument. If the returned error
|
||||
// is not nil, it is sent back to the caller of Set and the property is not
|
||||
// changed.
|
||||
Callback func(*Change) *dbus.Error
|
||||
}
|
||||
|
||||
// Change represents a change of a property by a call to Set.
|
||||
type Change struct {
|
||||
Props *Properties
|
||||
Iface string
|
||||
Name string
|
||||
Value interface{}
|
||||
}
|
||||
|
||||
// Properties is a set of values that can be made available to the message bus
|
||||
// using the org.freedesktop.DBus.Properties interface. It is safe for
|
||||
// concurrent use by multiple goroutines.
|
||||
type Properties struct {
|
||||
m map[string]map[string]*Prop
|
||||
mut sync.RWMutex
|
||||
conn *dbus.Conn
|
||||
path dbus.ObjectPath
|
||||
}
|
||||
|
||||
// New returns a new Properties structure that manages the given properties.
|
||||
// The key for the first-level map of props is the name of the interface; the
|
||||
// second-level key is the name of the property. The returned structure will be
|
||||
// exported as org.freedesktop.DBus.Properties on path.
|
||||
func New(conn *dbus.Conn, path dbus.ObjectPath, props map[string]map[string]*Prop) *Properties {
|
||||
p := &Properties{m: props, conn: conn, path: path}
|
||||
conn.Export(p, path, "org.freedesktop.DBus.Properties")
|
||||
return p
|
||||
}
|
||||
|
||||
// Get implements org.freedesktop.DBus.Properties.Get.
|
||||
func (p *Properties) Get(iface, property string) (dbus.Variant, *dbus.Error) {
|
||||
p.mut.RLock()
|
||||
defer p.mut.RUnlock()
|
||||
m, ok := p.m[iface]
|
||||
if !ok {
|
||||
return dbus.Variant{}, ErrIfaceNotFound
|
||||
}
|
||||
prop, ok := m[property]
|
||||
if !ok {
|
||||
return dbus.Variant{}, ErrPropNotFound
|
||||
}
|
||||
return dbus.MakeVariant(prop.Value), nil
|
||||
}
|
||||
|
||||
// GetAll implements org.freedesktop.DBus.Properties.GetAll.
|
||||
func (p *Properties) GetAll(iface string) (map[string]dbus.Variant, *dbus.Error) {
|
||||
p.mut.RLock()
|
||||
defer p.mut.RUnlock()
|
||||
m, ok := p.m[iface]
|
||||
if !ok {
|
||||
return nil, ErrIfaceNotFound
|
||||
}
|
||||
rm := make(map[string]dbus.Variant, len(m))
|
||||
for k, v := range m {
|
||||
rm[k] = dbus.MakeVariant(v.Value)
|
||||
}
|
||||
return rm, nil
|
||||
}
|
||||
|
||||
// GetMust returns the value of the given property and panics if either the
|
||||
// interface or the property name are invalid.
|
||||
func (p *Properties) GetMust(iface, property string) interface{} {
|
||||
p.mut.RLock()
|
||||
defer p.mut.RUnlock()
|
||||
return p.m[iface][property].Value
|
||||
}
|
||||
|
||||
// Introspection returns the introspection data that represents the properties
|
||||
// of iface.
|
||||
func (p *Properties) Introspection(iface string) []introspect.Property {
|
||||
p.mut.RLock()
|
||||
defer p.mut.RUnlock()
|
||||
m := p.m[iface]
|
||||
s := make([]introspect.Property, 0, len(m))
|
||||
for k, v := range m {
|
||||
p := introspect.Property{Name: k, Type: dbus.SignatureOf(v.Value).String()}
|
||||
if v.Writable {
|
||||
p.Access = "readwrite"
|
||||
} else {
|
||||
p.Access = "read"
|
||||
}
|
||||
s = append(s, p)
|
||||
}
|
||||
return s
|
||||
}
|
||||
|
||||
// set sets the given property and emits PropertyChanged if appropiate. p.mut
|
||||
// must already be locked.
|
||||
func (p *Properties) set(iface, property string, v interface{}) {
|
||||
prop := p.m[iface][property]
|
||||
prop.Value = v
|
||||
switch prop.Emit {
|
||||
case EmitFalse:
|
||||
// do nothing
|
||||
case EmitInvalidates:
|
||||
p.conn.Emit(p.path, "org.freedesktop.DBus.Properties.PropertiesChanged",
|
||||
iface, map[string]dbus.Variant{}, []string{property})
|
||||
case EmitTrue:
|
||||
p.conn.Emit(p.path, "org.freedesktop.DBus.Properties.PropertiesChanged",
|
||||
iface, map[string]dbus.Variant{property: dbus.MakeVariant(v)},
|
||||
[]string{})
|
||||
default:
|
||||
panic("invalid value for EmitType")
|
||||
}
|
||||
}
|
||||
|
||||
// Set implements org.freedesktop.Properties.Set.
|
||||
func (p *Properties) Set(iface, property string, newv dbus.Variant) *dbus.Error {
|
||||
p.mut.Lock()
|
||||
defer p.mut.Unlock()
|
||||
m, ok := p.m[iface]
|
||||
if !ok {
|
||||
return ErrIfaceNotFound
|
||||
}
|
||||
prop, ok := m[property]
|
||||
if !ok {
|
||||
return ErrPropNotFound
|
||||
}
|
||||
if !prop.Writable {
|
||||
return ErrReadOnly
|
||||
}
|
||||
if newv.Signature() != dbus.SignatureOf(prop.Value) {
|
||||
return ErrInvalidArg
|
||||
}
|
||||
if prop.Callback != nil {
|
||||
err := prop.Callback(&Change{p, iface, property, newv.Value()})
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
}
|
||||
p.set(iface, property, newv.Value())
|
||||
return nil
|
||||
}
|
||||
|
||||
// SetMust sets the value of the given property and panics if the interface or
|
||||
// the property name are invalid.
|
||||
func (p *Properties) SetMust(iface, property string, v interface{}) {
|
||||
p.mut.Lock()
|
||||
p.set(iface, property, v)
|
||||
p.mut.Unlock()
|
||||
}
|
@ -1,49 +0,0 @@
|
||||
package main
|
||||
|
||||
import (
|
||||
"os"
|
||||
|
||||
"github.com/subgraph/fw-daemon/Godeps/_workspace/src/github.com/op/go-logging"
|
||||
)
|
||||
|
||||
var log = logging.MustGetLogger("example")
|
||||
|
||||
// Example format string. Everything except the message has a custom color
|
||||
// which is dependent on the log level. Many fields have a custom output
|
||||
// formatting too, eg. the time returns the hour down to the milli second.
|
||||
var format = logging.MustStringFormatter(
|
||||
`%{color}%{time:15:04:05.000} %{shortfunc} â–¶ %{level:.4s} %{id:03x}%{color:reset} %{message}`,
|
||||
)
|
||||
|
||||
// Password is just an example type implementing the Redactor interface. Any
|
||||
// time this is logged, the Redacted() function will be called.
|
||||
type Password string
|
||||
|
||||
func (p Password) Redacted() interface{} {
|
||||
return logging.Redact(string(p))
|
||||
}
|
||||
|
||||
func main() {
|
||||
// For demo purposes, create two backend for os.Stderr.
|
||||
backend1 := logging.NewLogBackend(os.Stderr, "", 0)
|
||||
backend2 := logging.NewLogBackend(os.Stderr, "", 0)
|
||||
|
||||
// For messages written to backend2 we want to add some additional
|
||||
// information to the output, including the used log level and the name of
|
||||
// the function.
|
||||
backend2Formatter := logging.NewBackendFormatter(backend2, format)
|
||||
|
||||
// Only errors and more severe messages should be sent to backend1
|
||||
backend1Leveled := logging.AddModuleLevel(backend1)
|
||||
backend1Leveled.SetLevel(logging.ERROR, "")
|
||||
|
||||
// Set the backends to be used.
|
||||
logging.SetBackend(backend1Leveled, backend2Formatter)
|
||||
|
||||
log.Debugf("debug %s", Password("secret"))
|
||||
log.Info("info")
|
||||
log.Notice("notice")
|
||||
log.Warning("warning")
|
||||
log.Error("err")
|
||||
log.Critical("crit")
|
||||
}
|
Before Width: | Height: | Size: 17 KiB |
@ -1,200 +0,0 @@
|
||||
package proc
|
||||
|
||||
import (
|
||||
"encoding/hex"
|
||||
"errors"
|
||||
"fmt"
|
||||
"github.com/subgraph/fw-daemon/Godeps/_workspace/src/github.com/op/go-logging"
|
||||
"io/ioutil"
|
||||
"net"
|
||||
"strconv"
|
||||
"strings"
|
||||
)
|
||||
|
||||
var log = logging.MustGetLogger("proc")
|
||||
|
||||
func SetLogger(logger *logging.Logger) {
|
||||
log = logger
|
||||
}
|
||||
|
||||
var pcache = &pidCache{}
|
||||
|
||||
func LookupUDPSocketProcess(srcPort uint16) *ProcInfo {
|
||||
ss := findUDPSocket(srcPort)
|
||||
if ss == nil {
|
||||
return nil
|
||||
}
|
||||
return pcache.lookup(ss.inode)
|
||||
}
|
||||
|
||||
func LookupTCPSocketProcess(srcPort uint16, dstAddr net.IP, dstPort uint16) *ProcInfo {
|
||||
ss := findTCPSocket(srcPort, dstAddr, dstPort)
|
||||
if ss == nil {
|
||||
return nil
|
||||
}
|
||||
return pcache.lookup(ss.inode)
|
||||
}
|
||||
|
||||
type ConnectionInfo struct {
|
||||
pinfo *ProcInfo
|
||||
local *socketAddr
|
||||
remote *socketAddr
|
||||
}
|
||||
|
||||
func (ci *ConnectionInfo) String() string {
|
||||
return fmt.Sprintf("%v %s %s", ci.pinfo, ci.local, ci.remote)
|
||||
}
|
||||
|
||||
func (sa *socketAddr) parse(s string) error {
|
||||
ipPort := strings.Split(s, ":")
|
||||
if len(ipPort) != 2 {
|
||||
return fmt.Errorf("badly formatted socket address field: %s", s)
|
||||
}
|
||||
ip, err := ParseIp(ipPort[0])
|
||||
if err != nil {
|
||||
return fmt.Errorf("error parsing ip field [%s]: %v", ipPort[0], err)
|
||||
}
|
||||
port, err := ParsePort(ipPort[1])
|
||||
if err != nil {
|
||||
return fmt.Errorf("error parsing port field [%s]: %v", ipPort[1], err)
|
||||
}
|
||||
sa.ip = ip
|
||||
sa.port = port
|
||||
return nil
|
||||
}
|
||||
|
||||
func ParseIp(ip string) (net.IP, error) {
|
||||
var result net.IP
|
||||
dst, err := hex.DecodeString(ip)
|
||||
if err != nil {
|
||||
return result, fmt.Errorf("Error parsing IP: %s", err)
|
||||
}
|
||||
// Reverse byte order -- /proc/net/tcp etc. is little-endian
|
||||
// TODO: Does this vary by architecture?
|
||||
for i, j := 0, len(dst)-1; i < j; i, j = i+1, j-1 {
|
||||
dst[i], dst[j] = dst[j], dst[i]
|
||||
}
|
||||
result = net.IP(dst)
|
||||
return result, nil
|
||||
}
|
||||
|
||||
func ParsePort(port string) (uint16, error) {
|
||||
p64, err := strconv.ParseInt(port, 16, 32)
|
||||
if err != nil {
|
||||
return 0, fmt.Errorf("Error parsing port: %s", err)
|
||||
}
|
||||
return uint16(p64), nil
|
||||
}
|
||||
|
||||
func getConnections() ([]*ConnectionInfo, error) {
|
||||
conns, err := readConntrack()
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
resolveProcinfo(conns)
|
||||
return conns, nil
|
||||
}
|
||||
|
||||
func resolveProcinfo(conns []*ConnectionInfo) {
|
||||
var sockets []*socketStatus
|
||||
for _, line := range getSocketLines("tcp") {
|
||||
if len(strings.TrimSpace(line)) == 0 {
|
||||
continue
|
||||
}
|
||||
ss := new(socketStatus)
|
||||
if err := ss.parseLine(line); err != nil {
|
||||
log.Warning("Unable to parse line [%s]: %v", line, err)
|
||||
} else {
|
||||
/*
|
||||
pid := findPidForInode(ss.inode)
|
||||
if pid > 0 {
|
||||
ss.pid = pid
|
||||
fmt.Println("Socket", ss)
|
||||
sockets = append(sockets, ss)
|
||||
}
|
||||
*/
|
||||
}
|
||||
}
|
||||
for _, ci := range conns {
|
||||
ss := findContrackSocket(ci, sockets)
|
||||
if ss == nil {
|
||||
continue
|
||||
}
|
||||
pinfo := pcache.lookup(ss.inode)
|
||||
if pinfo != nil {
|
||||
ci.pinfo = pinfo
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func findContrackSocket(ci *ConnectionInfo, sockets []*socketStatus) *socketStatus {
|
||||
for _, ss := range sockets {
|
||||
if ss.local.port == ci.local.port && ss.remote.ip.Equal(ci.remote.ip) && ss.remote.port == ci.remote.port {
|
||||
return ss
|
||||
}
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func readConntrack() ([]*ConnectionInfo, error) {
|
||||
path := fmt.Sprintf("/proc/net/ip_conntrack")
|
||||
data, err := ioutil.ReadFile(path)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
var result []*ConnectionInfo
|
||||
lines := strings.Split(string(data), "\n")
|
||||
for _, line := range lines {
|
||||
ci, err := parseConntrackLine(line)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
if ci != nil {
|
||||
result = append(result, ci)
|
||||
}
|
||||
}
|
||||
return result, nil
|
||||
}
|
||||
|
||||
func parseConntrackLine(line string) (*ConnectionInfo, error) {
|
||||
parts := strings.Fields(line)
|
||||
if len(parts) < 8 || parts[0] != "tcp" || parts[3] != "ESTABLISHED" {
|
||||
return nil, nil
|
||||
}
|
||||
|
||||
local, err := conntrackAddr(parts[4], parts[6])
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
remote, err := conntrackAddr(parts[5], parts[7])
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return &ConnectionInfo{
|
||||
local: local,
|
||||
remote: remote,
|
||||
}, nil
|
||||
}
|
||||
|
||||
func conntrackAddr(ip_str, port_str string) (*socketAddr, error) {
|
||||
ip := net.ParseIP(stripLabel(ip_str))
|
||||
if ip == nil {
|
||||
return nil, errors.New("Could not parse IP: " + ip_str)
|
||||
}
|
||||
i64, err := strconv.Atoi(stripLabel(port_str))
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return &socketAddr{
|
||||
ip: ip,
|
||||
port: uint16(i64),
|
||||
}, nil
|
||||
}
|
||||
|
||||
func stripLabel(s string) string {
|
||||
idx := strings.Index(s, "=")
|
||||
if idx == -1 {
|
||||
return s
|
||||
}
|
||||
return s[idx+1:]
|
||||
}
|
@ -1,99 +0,0 @@
|
||||
package proc
|
||||
|
||||
import (
|
||||
"errors"
|
||||
"fmt"
|
||||
"io/ioutil"
|
||||
"net"
|
||||
"strconv"
|
||||
"strings"
|
||||
)
|
||||
|
||||
type socketAddr struct {
|
||||
ip net.IP
|
||||
port uint16
|
||||
}
|
||||
|
||||
func (sa socketAddr) String() string {
|
||||
return fmt.Sprintf("%v:%d", sa.ip, sa.port)
|
||||
}
|
||||
|
||||
type socketStatus struct {
|
||||
local socketAddr
|
||||
remote socketAddr
|
||||
uid int
|
||||
inode uint64
|
||||
line string
|
||||
}
|
||||
|
||||
func (ss *socketStatus) String() string {
|
||||
return fmt.Sprintf("%s -> %s uid=%d inode=%d", ss.local, ss.remote, ss.uid, ss.inode)
|
||||
}
|
||||
|
||||
func findUDPSocket(srcPort uint16) *socketStatus {
|
||||
return findSocket("udp", func(ss socketStatus) bool {
|
||||
return ss.local.port == srcPort
|
||||
})
|
||||
}
|
||||
|
||||
func findTCPSocket(srcPort uint16, dstAddr net.IP, dstPort uint16) *socketStatus {
|
||||
return findSocket("tcp", func(ss socketStatus) bool {
|
||||
return ss.remote.port == dstPort && ss.remote.ip.Equal(dstAddr) && ss.local.port == srcPort
|
||||
})
|
||||
}
|
||||
|
||||
func findSocket(proto string, matcher func(socketStatus) bool) *socketStatus {
|
||||
var ss socketStatus
|
||||
for _, line := range getSocketLines(proto) {
|
||||
if len(line) == 0 {
|
||||
continue
|
||||
}
|
||||
if err := ss.parseLine(line); err != nil {
|
||||
log.Warning("Unable to parse line from /proc/net/%s [%s]: %v", proto, line, err)
|
||||
continue
|
||||
}
|
||||
if matcher(ss) {
|
||||
ss.line = line
|
||||
return &ss
|
||||
}
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func (ss *socketStatus) parseLine(line string) error {
|
||||
fs := strings.Fields(line)
|
||||
if len(fs) < 10 {
|
||||
return errors.New("insufficient fields")
|
||||
}
|
||||
if err := ss.local.parse(fs[1]); err != nil {
|
||||
return err
|
||||
}
|
||||
if err := ss.remote.parse(fs[2]); err != nil {
|
||||
return err
|
||||
}
|
||||
uid, err := strconv.ParseUint(fs[7], 10, 32)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
ss.uid = int(uid)
|
||||
inode, err := strconv.ParseUint(fs[9], 10, 64)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
ss.inode = inode
|
||||
return nil
|
||||
}
|
||||
|
||||
func getSocketLines(proto string) []string {
|
||||
path := fmt.Sprintf("/proc/net/%s", proto)
|
||||
data, err := ioutil.ReadFile(path)
|
||||
if err != nil {
|
||||
log.Warning("Error reading %s: %v", path, err)
|
||||
return nil
|
||||
}
|
||||
lines := strings.Split(string(data), "\n")
|
||||
if len(lines) > 0 {
|
||||
lines = lines[1:]
|
||||
}
|
||||
return lines
|
||||
}
|
@ -0,0 +1,153 @@
|
||||
/*
|
||||
* client.go - SOCSK5 client implementation.
|
||||
*
|
||||
* To the extent possible under law, Yawning Angel has waived all copyright and
|
||||
* related or neighboring rights to or-ctl-filter, using the creative commons
|
||||
* "cc0" public domain dedication. See LICENSE or
|
||||
* <http://creativecommons.org/publicdomain/zero/1.0/> for full details.
|
||||
*/
|
||||
|
||||
package socks5
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
"io"
|
||||
"net"
|
||||
"time"
|
||||
)
|
||||
|
||||
// Redispatch dials the provided proxy and redispatches an existing request.
|
||||
func Redispatch(proxyNet, proxyAddr string, req *Request) (conn net.Conn, bndAddr *Address, err error) {
|
||||
defer func() {
|
||||
if err != nil && conn != nil {
|
||||
conn.Close()
|
||||
}
|
||||
}()
|
||||
|
||||
conn, err = clientHandshake(proxyNet, proxyAddr, req)
|
||||
if err != nil {
|
||||
return nil, nil, err
|
||||
}
|
||||
bndAddr, err = clientCmd(conn, req)
|
||||
return
|
||||
}
|
||||
|
||||
func clientHandshake(proxyNet, proxyAddr string, req *Request) (net.Conn, error) {
|
||||
conn, err := net.Dial(proxyNet, proxyAddr)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
if err := conn.SetDeadline(time.Now().Add(requestTimeout)); err != nil {
|
||||
return conn, err
|
||||
}
|
||||
authMethod, err := clientNegotiateAuth(conn, req)
|
||||
if err != nil {
|
||||
return conn, err
|
||||
}
|
||||
if err := clientAuthenticate(conn, req, authMethod); err != nil {
|
||||
return conn, err
|
||||
}
|
||||
if err := conn.SetDeadline(time.Time{}); err != nil {
|
||||
return conn, err
|
||||
}
|
||||
|
||||
return conn, nil
|
||||
}
|
||||
|
||||
func clientNegotiateAuth(conn net.Conn, req *Request) (byte, error) {
|
||||
useRFC1929 := req.Auth.Uname != nil && req.Auth.Passwd != nil
|
||||
// XXX: Validate uname/passwd lengths, though should always be valid.
|
||||
|
||||
var buf [3]byte
|
||||
buf[0] = version
|
||||
buf[1] = 1
|
||||
if useRFC1929 {
|
||||
buf[2] = authUsernamePassword
|
||||
} else {
|
||||
buf[2] = authNoneRequired
|
||||
}
|
||||
|
||||
if _, err := conn.Write(buf[:]); err != nil {
|
||||
return authNoAcceptableMethods, err
|
||||
}
|
||||
|
||||
var resp [2]byte
|
||||
if _, err := io.ReadFull(conn, resp[:]); err != nil {
|
||||
return authNoAcceptableMethods, err
|
||||
}
|
||||
if err := validateByte("version", resp[0], version); err != nil {
|
||||
return authNoAcceptableMethods, err
|
||||
}
|
||||
if err := validateByte("method", resp[1], buf[2]); err != nil {
|
||||
return authNoAcceptableMethods, err
|
||||
}
|
||||
|
||||
return resp[1], nil
|
||||
}
|
||||
|
||||
func clientAuthenticate(conn net.Conn, req *Request, authMethod byte) error {
|
||||
switch authMethod {
|
||||
case authNoneRequired:
|
||||
case authUsernamePassword:
|
||||
var buf []byte
|
||||
buf = append(buf, authRFC1929Ver)
|
||||
buf = append(buf, byte(len(req.Auth.Uname)))
|
||||
buf = append(buf, req.Auth.Uname...)
|
||||
buf = append(buf, byte(len(req.Auth.Passwd)))
|
||||
buf = append(buf, req.Auth.Passwd...)
|
||||
if _, err := conn.Write(buf); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
var resp [2]byte
|
||||
if _, err := io.ReadFull(conn, resp[:]); err != nil {
|
||||
return err
|
||||
}
|
||||
if err := validateByte("version", resp[0], authRFC1929Ver); err != nil {
|
||||
return err
|
||||
}
|
||||
if err := validateByte("status", resp[1], authRFC1929Success); err != nil {
|
||||
return err
|
||||
}
|
||||
default:
|
||||
panic(fmt.Sprintf("unknown authentication method: 0x%02x", authMethod))
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func clientCmd(conn net.Conn, req *Request) (*Address, error) {
|
||||
var buf []byte
|
||||
buf = append(buf, version)
|
||||
buf = append(buf, byte(req.Cmd))
|
||||
buf = append(buf, rsv)
|
||||
buf = append(buf, req.Addr.raw...)
|
||||
if _, err := conn.Write(buf); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
var respHdr [3]byte
|
||||
if _, err := io.ReadFull(conn, respHdr[:]); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
if err := validateByte("version", respHdr[0], version); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
if err := validateByte("rep", respHdr[1], byte(ReplySucceeded)); err != nil {
|
||||
return nil, clientError(respHdr[1])
|
||||
}
|
||||
if err := validateByte("rsv", respHdr[2], rsv); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
var bndAddr Address
|
||||
if err := bndAddr.read(conn); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
if err := conn.SetDeadline(time.Time{}); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
return &bndAddr, nil
|
||||
}
|
@ -0,0 +1,280 @@
|
||||
/*
|
||||
* common.go - SOCSK5 common definitons/routines.
|
||||
*
|
||||
* To the extent possible under law, Yawning Angel has waived all copyright and
|
||||
* related or neighboring rights to or-ctl-filter, using the creative commons
|
||||
* "cc0" public domain dedication. See LICENSE or
|
||||
* <http://creativecommons.org/publicdomain/zero/1.0/> for full details.
|
||||
*/
|
||||
|
||||
// Package socks5 implements a SOCKS5 client/server. For more information see
|
||||
// RFC 1928 and RFC 1929.
|
||||
//
|
||||
// Notes:
|
||||
// * GSSAPI authentication, is NOT supported.
|
||||
// * The authentication provided by the client is always accepted.
|
||||
// * A lot of the code is shamelessly stolen from obfs4proxy.
|
||||
package socks5
|
||||
|
||||
import (
|
||||
"errors"
|
||||
"fmt"
|
||||
"io"
|
||||
"net"
|
||||
"strconv"
|
||||
"syscall"
|
||||
"time"
|
||||
)
|
||||
|
||||
const (
|
||||
version = 0x05
|
||||
rsv = 0x00
|
||||
|
||||
atypIPv4 = 0x01
|
||||
atypDomainName = 0x03
|
||||
atypIPv6 = 0x04
|
||||
|
||||
authNoneRequired = 0x00
|
||||
authUsernamePassword = 0x02
|
||||
authNoAcceptableMethods = 0xff
|
||||
|
||||
inboundTimeout = 5 * time.Second
|
||||
requestTimeout = 30 * time.Second
|
||||
)
|
||||
|
||||
var errInvalidAtyp = errors.New("invalid address type")
|
||||
|
||||
// ReplyCode is a SOCKS 5 reply code.
|
||||
type ReplyCode byte
|
||||
|
||||
// The various SOCKS 5 reply codes from RFC 1928.
|
||||
const (
|
||||
ReplySucceeded ReplyCode = iota
|
||||
ReplyGeneralFailure
|
||||
ReplyConnectionNotAllowed
|
||||
ReplyNetworkUnreachable
|
||||
ReplyHostUnreachable
|
||||
ReplyConnectionRefused
|
||||
ReplyTTLExpired
|
||||
ReplyCommandNotSupported
|
||||
ReplyAddressNotSupported
|
||||
)
|
||||
|
||||
// Command is a SOCKS 5 command.
|
||||
type Command byte
|
||||
|
||||
// The various SOCKS 5 commands.
|
||||
const (
|
||||
CommandConnect Command = 0x01
|
||||
CommandTorResolve Command = 0xf0
|
||||
CommandTorResolvePTR Command = 0xf1
|
||||
)
|
||||
|
||||
// Address is a SOCKS 5 address + port.
|
||||
type Address struct {
|
||||
atyp uint8
|
||||
raw []byte
|
||||
addrStr string
|
||||
portStr string
|
||||
}
|
||||
|
||||
// FromString parses the provided "host:port" format address and populates the
|
||||
// Address fields.
|
||||
func (addr *Address) FromString(addrStr string) (err error) {
|
||||
addr.addrStr, addr.portStr, err = net.SplitHostPort(addrStr)
|
||||
if err != nil {
|
||||
return
|
||||
}
|
||||
|
||||
var raw []byte
|
||||
if ip := net.ParseIP(addr.addrStr); ip != nil {
|
||||
if v4Addr := ip.To4(); v4Addr != nil {
|
||||
raw = append(raw, atypIPv4)
|
||||
raw = append(raw, v4Addr...)
|
||||
} else if v6Addr := ip.To16(); v6Addr != nil {
|
||||
raw = append(raw, atypIPv6)
|
||||
raw = append(raw, v6Addr...)
|
||||
} else {
|
||||
return errors.New("unsupported IP address type")
|
||||
}
|
||||
} else {
|
||||
// Must be a FQDN.
|
||||
if len(addr.addrStr) > 255 {
|
||||
return fmt.Errorf("invalid FQDN, len > 255 bytes (%d bytes)", len(addr.addrStr))
|
||||
}
|
||||
raw = append(raw, atypDomainName)
|
||||
raw = append(raw, addr.addrStr...)
|
||||
}
|
||||
|
||||
var port uint64
|
||||
if port, err = strconv.ParseUint(addr.portStr, 10, 16); err != nil {
|
||||
return
|
||||
}
|
||||
raw = append(raw, byte(port>>8))
|
||||
raw = append(raw, byte(port&0xff))
|
||||
|
||||
addr.raw = raw
|
||||
return
|
||||
}
|
||||
|
||||
// String returns the string representation of the address, in "host:port"
|
||||
// format.
|
||||
func (addr *Address) String() string {
|
||||
return addr.addrStr + ":" + addr.portStr
|
||||
}
|
||||
|
||||
// HostPort returns the string representation of the addess, split into the
|
||||
// host and port components.
|
||||
func (addr *Address) HostPort() (string, string) {
|
||||
return addr.addrStr, addr.portStr
|
||||
}
|
||||
|
||||
// Type returns the address type from the connect command this address was
|
||||
// parsed from
|
||||
func (addr *Address) Type() uint8 {
|
||||
return addr.atyp
|
||||
}
|
||||
|
||||
func (addr *Address) read(conn net.Conn) (err error) {
|
||||
// The address looks like:
|
||||
// uint8_t atyp
|
||||
// uint8_t addr[] (Length depends on atyp)
|
||||
// uint16_t port
|
||||
|
||||
// Read the atype.
|
||||
var atyp byte
|
||||
if atyp, err = readByte(conn); err != nil {
|
||||
return
|
||||
}
|
||||
addr.raw = append(addr.raw, atyp)
|
||||
|
||||
// Read the address.
|
||||
var rawAddr []byte
|
||||
switch atyp {
|
||||
case atypIPv4:
|
||||
rawAddr = make([]byte, net.IPv4len)
|
||||
if _, err = io.ReadFull(conn, rawAddr); err != nil {
|
||||
return
|
||||
}
|
||||
v4Addr := net.IPv4(rawAddr[0], rawAddr[1], rawAddr[2], rawAddr[3])
|
||||
addr.addrStr = v4Addr.String()
|
||||
case atypDomainName:
|
||||
var alen byte
|
||||
if alen, err = readByte(conn); err != nil {
|
||||
return
|
||||
}
|
||||
if alen == 0 {
|
||||
return fmt.Errorf("domain name with 0 length")
|
||||
}
|
||||
rawAddr = make([]byte, alen)
|
||||
addr.raw = append(addr.raw, alen)
|
||||
if _, err = io.ReadFull(conn, rawAddr); err != nil {
|
||||
return
|
||||
}
|
||||
addr.addrStr = string(rawAddr)
|
||||
case atypIPv6:
|
||||
rawAddr = make([]byte, net.IPv6len)
|
||||
if _, err = io.ReadFull(conn, rawAddr); err != nil {
|
||||
return
|
||||
}
|
||||
v6Addr := make(net.IP, net.IPv6len)
|
||||
copy(v6Addr[:], rawAddr)
|
||||
addr.addrStr = fmt.Sprintf("[%s]", v6Addr.String())
|
||||
default:
|
||||
return errInvalidAtyp
|
||||
}
|
||||
addr.atyp = atyp
|
||||
addr.raw = append(addr.raw, rawAddr...)
|
||||
|
||||
// Read the port.
|
||||
var rawPort [2]byte
|
||||
if _, err = io.ReadFull(conn, rawPort[:]); err != nil {
|
||||
return
|
||||
}
|
||||
port := int(rawPort[0])<<8 | int(rawPort[1])
|
||||
addr.portStr = fmt.Sprintf("%d", port)
|
||||
addr.raw = append(addr.raw, rawPort[:]...)
|
||||
|
||||
return
|
||||
}
|
||||
|
||||
// ErrorToReplyCode converts an error to the "best" reply code.
|
||||
func ErrorToReplyCode(err error) ReplyCode {
|
||||
if cErr, ok := err.(clientError); ok {
|
||||
return ReplyCode(cErr)
|
||||
}
|
||||
opErr, ok := err.(*net.OpError)
|
||||
if !ok {
|
||||
return ReplyGeneralFailure
|
||||
}
|
||||
|
||||
errno, ok := opErr.Err.(syscall.Errno)
|
||||
if !ok {
|
||||
return ReplyGeneralFailure
|
||||
}
|
||||
switch errno {
|
||||
case syscall.EADDRNOTAVAIL:
|
||||
return ReplyAddressNotSupported
|
||||
case syscall.ETIMEDOUT:
|
||||
return ReplyTTLExpired
|
||||
case syscall.ENETUNREACH:
|
||||
return ReplyNetworkUnreachable
|
||||
case syscall.EHOSTUNREACH:
|
||||
return ReplyHostUnreachable
|
||||
case syscall.ECONNREFUSED, syscall.ECONNRESET:
|
||||
return ReplyConnectionRefused
|
||||
default:
|
||||
return ReplyGeneralFailure
|
||||
}
|
||||
}
|
||||
|
||||
// Request describes a SOCKS 5 request.
|
||||
type Request struct {
|
||||
Auth AuthInfo
|
||||
Cmd Command
|
||||
Addr Address
|
||||
|
||||
conn net.Conn
|
||||
}
|
||||
|
||||
type clientError ReplyCode
|
||||
|
||||
func (e clientError) Error() string {
|
||||
switch ReplyCode(e) {
|
||||
case ReplySucceeded:
|
||||
return "socks5: succeeded"
|
||||
case ReplyGeneralFailure:
|
||||
return "socks5: general failure"
|
||||
case ReplyConnectionNotAllowed:
|
||||
return "socks5: connection not allowed"
|
||||
case ReplyNetworkUnreachable:
|
||||
return "socks5: network unreachable"
|
||||
case ReplyHostUnreachable:
|
||||
return "socks5: host unreachable"
|
||||
case ReplyConnectionRefused:
|
||||
return "socks5: connection refused"
|
||||
case ReplyTTLExpired:
|
||||
return "socks5: ttl expired"
|
||||
case ReplyCommandNotSupported:
|
||||
return "socks5: command not supported"
|
||||
case ReplyAddressNotSupported:
|
||||
return "socks5: address not supported"
|
||||
default:
|
||||
return fmt.Sprintf("socks5: reply code: 0x%02x", e)
|
||||
}
|
||||
}
|
||||
|
||||
func readByte(conn net.Conn) (byte, error) {
|
||||
var tmp [1]byte
|
||||
if _, err := conn.Read(tmp[:]); err != nil {
|
||||
return 0, err
|
||||
}
|
||||
return tmp[0], nil
|
||||
}
|
||||
|
||||
func validateByte(descr string, val, expected byte) error {
|
||||
if val != expected {
|
||||
return fmt.Errorf("message field '%s' was 0x%02x (expected 0x%02x)", descr, val, expected)
|
||||
}
|
||||
return nil
|
||||
}
|
@ -0,0 +1,200 @@
|
||||
/*
|
||||
* server.go - SOCSK5 server implementation.
|
||||
*
|
||||
* To the extent possible under law, Yawning Angel has waived all copyright and
|
||||
* related or neighboring rights to or-ctl-filter, using the creative commons
|
||||
* "cc0" public domain dedication. See LICENSE or
|
||||
* <http://creativecommons.org/publicdomain/zero/1.0/> for full details.
|
||||
*/
|
||||
|
||||
package socks5
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"fmt"
|
||||
"io"
|
||||
"net"
|
||||
"time"
|
||||
)
|
||||
|
||||
// Handshake attempts to handle a incoming client handshake over the provided
|
||||
// connection and receive the SOCKS5 request. The routine handles sending
|
||||
// appropriate errors if applicable, but will not close the connection.
|
||||
func Handshake(conn net.Conn) (*Request, error) {
|
||||
// Arm the handshake timeout.
|
||||
var err error
|
||||
if err = conn.SetDeadline(time.Now().Add(inboundTimeout)); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
defer func() {
|
||||
// Disarm the handshake timeout, only propagate the error if
|
||||
// the handshake was successful.
|
||||
nerr := conn.SetDeadline(time.Time{})
|
||||
if err == nil {
|
||||
err = nerr
|
||||
}
|
||||
}()
|
||||
|
||||
req := new(Request)
|
||||
req.conn = conn
|
||||
|
||||
// Negotiate the protocol version and authentication method.
|
||||
var method byte
|
||||
if method, err = req.negotiateAuth(); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
// Authenticate if neccecary.
|
||||
if err = req.authenticate(method); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
// Read the client command.
|
||||
if err = req.readCommand(); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
return req, err
|
||||
}
|
||||
|
||||
// Reply sends a SOCKS5 reply to the corresponding request. The BND.ADDR and
|
||||
// BND.PORT fields are always set to an address/port corresponding to
|
||||
// "0.0.0.0:0".
|
||||
func (req *Request) Reply(code ReplyCode) error {
|
||||
return req.ReplyAddr(code, nil)
|
||||
}
|
||||
|
||||
// ReplyAddr sends a SOCKS5 reply to the corresponding request. The BND.ADDR
|
||||
// and BND.PORT fields are specified by addr, or "0.0.0.0:0" if not provided.
|
||||
func (req *Request) ReplyAddr(code ReplyCode, addr *Address) error {
|
||||
// The server sends a reply message.
|
||||
// uint8_t ver (0x05)
|
||||
// uint8_t rep
|
||||
// uint8_t rsv (0x00)
|
||||
// uint8_t atyp
|
||||
// uint8_t bnd_addr[]
|
||||
// uint16_t bnd_port
|
||||
|
||||
resp := []byte{version, byte(code), rsv}
|
||||
if addr == nil {
|
||||
var nilAddr [net.IPv4len + 2]byte
|
||||
resp = append(resp, atypIPv4)
|
||||
resp = append(resp, nilAddr[:]...)
|
||||
} else {
|
||||
resp = append(resp, addr.raw...)
|
||||
}
|
||||
|
||||
_, err := req.conn.Write(resp[:])
|
||||
return err
|
||||
|
||||
}
|
||||
|
||||
func (req *Request) negotiateAuth() (byte, error) {
|
||||
// The client sends a version identifier/selection message.
|
||||
// uint8_t ver (0x05)
|
||||
// uint8_t nmethods (>= 1).
|
||||
// uint8_t methods[nmethods]
|
||||
|
||||
var err error
|
||||
if err = req.readByteVerify("version", version); err != nil {
|
||||
return 0, err
|
||||
}
|
||||
|
||||
// Read the number of methods, and the methods.
|
||||
var nmethods byte
|
||||
method := byte(authNoAcceptableMethods)
|
||||
if nmethods, err = req.readByte(); err != nil {
|
||||
return method, err
|
||||
}
|
||||
methods := make([]byte, nmethods)
|
||||
if _, err := io.ReadFull(req.conn, methods); err != nil {
|
||||
return 0, err
|
||||
}
|
||||
|
||||
// Pick the best authentication method, prioritizing authenticating
|
||||
// over not if both options are present.
|
||||
if bytes.IndexByte(methods, authUsernamePassword) != -1 {
|
||||
method = authUsernamePassword
|
||||
} else if bytes.IndexByte(methods, authNoneRequired) != -1 {
|
||||
method = authNoneRequired
|
||||
}
|
||||
|
||||
// The server sends a method selection message.
|
||||
// uint8_t ver (0x05)
|
||||
// uint8_t method
|
||||
msg := []byte{version, method}
|
||||
if _, err = req.conn.Write(msg); err != nil {
|
||||
return 0, err
|
||||
}
|
||||
|
||||
return method, nil
|
||||
}
|
||||
|
||||
func (req *Request) authenticate(method byte) error {
|
||||
switch method {
|
||||
case authNoneRequired:
|
||||
return nil
|
||||
case authUsernamePassword:
|
||||
return req.authRFC1929()
|
||||
case authNoAcceptableMethods:
|
||||
return fmt.Errorf("no acceptable authentication methods")
|
||||
default:
|
||||
// This should never happen as only supported auth methods should be
|
||||
// negotiated.
|
||||
return fmt.Errorf("negotiated unsupported method 0x%02x", method)
|
||||
}
|
||||
}
|
||||
|
||||
func (req *Request) readCommand() error {
|
||||
// The client sends the request details.
|
||||
// uint8_t ver (0x05)
|
||||
// uint8_t cmd
|
||||
// uint8_t rsv (0x00)
|
||||
// uint8_t atyp
|
||||
// uint8_t dst_addr[]
|
||||
// uint16_t dst_port
|
||||
|
||||
var err error
|
||||
var cmd byte
|
||||
if err = req.readByteVerify("version", version); err != nil {
|
||||
req.Reply(ReplyGeneralFailure)
|
||||
return err
|
||||
}
|
||||
if cmd, err = req.readByte(); err != nil {
|
||||
req.Reply(ReplyGeneralFailure)
|
||||
return err
|
||||
}
|
||||
switch Command(cmd) {
|
||||
case CommandConnect, CommandTorResolve, CommandTorResolvePTR:
|
||||
req.Cmd = Command(cmd)
|
||||
default:
|
||||
req.Reply(ReplyCommandNotSupported)
|
||||
return fmt.Errorf("unsupported SOCKS command: 0x%02x", cmd)
|
||||
}
|
||||
if err = req.readByteVerify("reserved", rsv); err != nil {
|
||||
req.Reply(ReplyGeneralFailure)
|
||||
return err
|
||||
}
|
||||
|
||||
// Read the destination address/port.
|
||||
err = req.Addr.read(req.conn)
|
||||
if err == errInvalidAtyp {
|
||||
req.Reply(ReplyAddressNotSupported)
|
||||
} else if err != nil {
|
||||
req.Reply(ReplyGeneralFailure)
|
||||
}
|
||||
|
||||
return err
|
||||
}
|
||||
|
||||
func (req *Request) readByte() (byte, error) {
|
||||
return readByte(req.conn)
|
||||
}
|
||||
|
||||
func (req *Request) readByteVerify(descr string, expected byte) error {
|
||||
val, err := req.readByte()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
return validateByte(descr, val, expected)
|
||||
}
|
@ -0,0 +1,84 @@
|
||||
/*
|
||||
* server_rfc1929.go - SOCSK 5 server authentication.
|
||||
*
|
||||
* To the extent possible under law, Yawning Angel has waived all copyright and
|
||||
* related or neighboring rights to or-ctl-filter, using the creative commons
|
||||
* "cc0" public domain dedication. See LICENSE or
|
||||
* <http://creativecommons.org/publicdomain/zero/1.0/> for full details.
|
||||
*/
|
||||
|
||||
package socks5
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
"io"
|
||||
)
|
||||
|
||||
const (
|
||||
authRFC1929Ver = 0x01
|
||||
authRFC1929Success = 0x00
|
||||
authRFC1929Fail = 0x01
|
||||
)
|
||||
|
||||
// AuthInfo is the RFC 1929 Username/Password authentication data.
|
||||
type AuthInfo struct {
|
||||
Uname []byte
|
||||
Passwd []byte
|
||||
}
|
||||
|
||||
func (req *Request) authRFC1929() (err error) {
|
||||
sendErrResp := func() {
|
||||
// Swallow write/flush errors, the auth failure is the relevant error.
|
||||
resp := []byte{authRFC1929Ver, authRFC1929Fail}
|
||||
req.conn.Write(resp[:])
|
||||
}
|
||||
|
||||
// The client sends a Username/Password request.
|
||||
// uint8_t ver (0x01)
|
||||
// uint8_t ulen (>= 1)
|
||||
// uint8_t uname[ulen]
|
||||
// uint8_t plen (>= 1)
|
||||
// uint8_t passwd[plen]
|
||||
|
||||
if err = req.readByteVerify("auth version", authRFC1929Ver); err != nil {
|
||||
sendErrResp()
|
||||
return
|
||||
}
|
||||
|
||||
// Read the username.
|
||||
var ulen byte
|
||||
if ulen, err = req.readByte(); err != nil {
|
||||
sendErrResp()
|
||||
return
|
||||
} else if ulen < 1 {
|
||||
sendErrResp()
|
||||
return fmt.Errorf("username with 0 length")
|
||||
}
|
||||
uname := make([]byte, ulen)
|
||||
if _, err = io.ReadFull(req.conn, uname); err != nil {
|
||||
sendErrResp()
|
||||
return
|
||||
}
|
||||
|
||||
// Read the password.
|
||||
var plen byte
|
||||
if plen, err = req.readByte(); err != nil {
|
||||
sendErrResp()
|
||||
return
|
||||
} else if plen < 1 {
|
||||
sendErrResp()
|
||||
return fmt.Errorf("password with 0 length")
|
||||
}
|
||||
passwd := make([]byte, plen)
|
||||
if _, err = io.ReadFull(req.conn, passwd); err != nil {
|
||||
sendErrResp()
|
||||
return
|
||||
}
|
||||
|
||||
req.Auth.Uname = uname
|
||||
req.Auth.Passwd = passwd
|
||||
|
||||
resp := []byte{authRFC1929Ver, authRFC1929Success}
|
||||
_, err = req.conn.Write(resp[:])
|
||||
return
|
||||
}
|
@ -0,0 +1,262 @@
|
||||
package main
|
||||
|
||||
import (
|
||||
"io"
|
||||
"net"
|
||||
"os"
|
||||
"sync"
|
||||
|
||||
"github.com/subgraph/fw-daemon/socks5"
|
||||
"github.com/subgraph/go-procsnitch"
|
||||
"strconv"
|
||||
)
|
||||
|
||||
type socksChainConfig struct {
|
||||
TargetSocksNet string
|
||||
TargetSocksAddr string
|
||||
ListenSocksNet string
|
||||
ListenSocksAddr string
|
||||
}
|
||||
|
||||
type socksChain struct {
|
||||
cfg *socksChainConfig
|
||||
fw *Firewall
|
||||
listener net.Listener
|
||||
wg *sync.WaitGroup
|
||||
procInfo procsnitch.ProcInfo
|
||||
}
|
||||
|
||||
type socksChainSession struct {
|
||||
cfg *socksChainConfig
|
||||
clientConn net.Conn
|
||||
upstreamConn net.Conn
|
||||
req *socks5.Request
|
||||
bndAddr *socks5.Address
|
||||
optData []byte
|
||||
procInfo procsnitch.ProcInfo
|
||||
server *socksChain
|
||||
}
|
||||
|
||||
const (
|
||||
socksVerdictDrop = 1
|
||||
socksVerdictAccept = 2
|
||||
)
|
||||
|
||||
type pendingSocksConnection struct {
|
||||
pol *Policy
|
||||
hname string
|
||||
destIP net.IP
|
||||
destPort uint16
|
||||
pinfo *procsnitch.Info
|
||||
verdict chan int
|
||||
}
|
||||
|
||||
func (sc *pendingSocksConnection) policy() *Policy {
|
||||
return sc.pol
|
||||
}
|
||||
|
||||
func (sc *pendingSocksConnection) procInfo() *procsnitch.Info {
|
||||
return sc.pinfo
|
||||
}
|
||||
|
||||
func (sc *pendingSocksConnection) hostname() string {
|
||||
return sc.hname
|
||||
}
|
||||
|
||||
func (sc *pendingSocksConnection) dst() net.IP {
|
||||
return sc.destIP
|
||||
}
|
||||
func (sc *pendingSocksConnection) dstPort() uint16 {
|
||||
return sc.destPort
|
||||
}
|
||||
|
||||
func (sc *pendingSocksConnection) deliverVerdict(v int) {
|
||||
sc.verdict <- v
|
||||
close(sc.verdict)
|
||||
}
|
||||
|
||||
func (sc *pendingSocksConnection) accept() { sc.deliverVerdict(socksVerdictAccept) }
|
||||
|
||||
func (sc *pendingSocksConnection) drop() { sc.deliverVerdict(socksVerdictDrop) }
|
||||
|
||||
func (sc *pendingSocksConnection) print() string { return "socks connection" }
|
||||
|
||||
func NewSocksChain(cfg *socksChainConfig, wg *sync.WaitGroup, fw *Firewall) *socksChain {
|
||||
chain := socksChain{
|
||||
cfg: cfg,
|
||||
fw: fw,
|
||||
wg: wg,
|
||||
procInfo: procsnitch.SystemProcInfo{},
|
||||
}
|
||||
return &chain
|
||||
}
|
||||
|
||||
// Start initializes the SOCKS 5 server and starts
|
||||
// accepting connections.
|
||||
func (s *socksChain) start() {
|
||||
var err error
|
||||
s.listener, err = net.Listen(s.cfg.ListenSocksNet, s.cfg.ListenSocksAddr)
|
||||
if err != nil {
|
||||
log.Errorf("ERR/socks: Failed to listen on the socks address: %v", err)
|
||||
os.Exit(1)
|
||||
}
|
||||
|
||||
s.wg.Add(1)
|
||||
go s.socksAcceptLoop()
|
||||
}
|
||||
|
||||
func (s *socksChain) socksAcceptLoop() error {
|
||||
defer s.wg.Done()
|
||||
defer s.listener.Close()
|
||||
|
||||
for {
|
||||
conn, err := s.listener.Accept()
|
||||
if err != nil {
|
||||
if e, ok := err.(net.Error); ok && !e.Temporary() {
|
||||
log.Infof("ERR/socks: Failed to Accept(): %v", err)
|
||||
return err
|
||||
}
|
||||
continue
|
||||
}
|
||||
session := &socksChainSession{cfg: s.cfg, clientConn: conn, procInfo: s.procInfo, server: s}
|
||||
go session.sessionWorker()
|
||||
}
|
||||
}
|
||||
|
||||
func (c *socksChainSession) sessionWorker() {
|
||||
defer c.clientConn.Close()
|
||||
|
||||
clientAddr := c.clientConn.RemoteAddr()
|
||||
log.Infof("INFO/socks: New connection from: %v", clientAddr)
|
||||
|
||||
// Do the SOCKS handshake with the client, and read the command.
|
||||
var err error
|
||||
if c.req, err = socks5.Handshake(c.clientConn); err != nil {
|
||||
log.Infof("ERR/socks: Failed SOCKS5 handshake: %v", err)
|
||||
return
|
||||
}
|
||||
|
||||
switch c.req.Cmd {
|
||||
case socks5.CommandTorResolve, socks5.CommandTorResolvePTR:
|
||||
err = c.dispatchTorSOCKS()
|
||||
|
||||
// If we reach here, the request has been dispatched and completed.
|
||||
if err == nil {
|
||||
// Successfully even, send the response back with the addresc.
|
||||
c.req.ReplyAddr(socks5.ReplySucceeded, c.bndAddr)
|
||||
}
|
||||
case socks5.CommandConnect:
|
||||
if !c.filterConnect() {
|
||||
c.req.Reply(socks5.ReplyConnectionRefused)
|
||||
return
|
||||
}
|
||||
c.handleConnect()
|
||||
default:
|
||||
// Should *NEVER* happen, validated as part of handshake.
|
||||
log.Infof("BUG/socks: Unsupported SOCKS command: 0x%02x", c.req.Cmd)
|
||||
c.req.Reply(socks5.ReplyCommandNotSupported)
|
||||
}
|
||||
}
|
||||
|
||||
func (c *socksChainSession) addressDetails() (string, net.IP, uint16) {
|
||||
addr := c.req.Addr
|
||||
host, pstr := addr.HostPort()
|
||||
port, err := strconv.ParseUint(pstr, 10, 16)
|
||||
if err != nil || port == 0 || port > 0xFFFF {
|
||||
log.Warningf("Illegal port value in socks address: %v", addr)
|
||||
return "", nil, 0
|
||||
}
|
||||
if addr.Type() == 3 {
|
||||
return host, nil, uint16(port)
|
||||
}
|
||||
ip := net.ParseIP(host)
|
||||
if ip == nil {
|
||||
log.Warningf("Failed to extract address information from socks address: %v", addr)
|
||||
}
|
||||
return "", ip, uint16(port)
|
||||
}
|
||||
|
||||
func (c *socksChainSession) filterConnect() bool {
|
||||
pinfo := procsnitch.FindProcessForConnection(c.clientConn, c.procInfo)
|
||||
if pinfo == nil {
|
||||
log.Warningf("No proc found for connection from: %s", c.clientConn.RemoteAddr())
|
||||
return false
|
||||
}
|
||||
|
||||
policy := c.server.fw.PolicyForPath(pinfo.ExePath)
|
||||
|
||||
hostname, ip, port := c.addressDetails()
|
||||
if ip == nil && hostname == "" {
|
||||
return false
|
||||
}
|
||||
result := policy.rules.filter(ip, port, hostname, pinfo)
|
||||
switch result {
|
||||
case FILTER_DENY:
|
||||
return false
|
||||
case FILTER_ALLOW:
|
||||
return true
|
||||
case FILTER_PROMPT:
|
||||
pending := &pendingSocksConnection{
|
||||
pol: policy,
|
||||
hname: hostname,
|
||||
destIP: ip,
|
||||
destPort: port,
|
||||
pinfo: pinfo,
|
||||
verdict: make(chan int),
|
||||
}
|
||||
policy.processPromptResult(pending)
|
||||
v := <-pending.verdict
|
||||
if v == socksVerdictAccept {
|
||||
return true
|
||||
}
|
||||
}
|
||||
|
||||
return false
|
||||
|
||||
}
|
||||
|
||||
func (c *socksChainSession) handleConnect() {
|
||||
err := c.dispatchTorSOCKS()
|
||||
if err != nil {
|
||||
return
|
||||
}
|
||||
c.req.Reply(socks5.ReplySucceeded)
|
||||
defer c.upstreamConn.Close()
|
||||
|
||||
if c.optData != nil {
|
||||
if _, err = c.upstreamConn.Write(c.optData); err != nil {
|
||||
log.Infof("ERR/socks: Failed writing OptData: %v", err)
|
||||
return
|
||||
}
|
||||
c.optData = nil
|
||||
}
|
||||
|
||||
// A upstream connection has been established, push data back and forth
|
||||
// till the session is done.
|
||||
c.forwardTraffic()
|
||||
log.Infof("INFO/socks: Closed SOCKS connection from: %v", c.clientConn.RemoteAddr())
|
||||
}
|
||||
|
||||
func (c *socksChainSession) forwardTraffic() {
|
||||
var wg sync.WaitGroup
|
||||
wg.Add(2)
|
||||
|
||||
copyLoop := func(dst, src net.Conn) {
|
||||
defer wg.Done()
|
||||
defer dst.Close()
|
||||
|
||||
io.Copy(dst, src)
|
||||
}
|
||||
go copyLoop(c.upstreamConn, c.clientConn)
|
||||
go copyLoop(c.clientConn, c.upstreamConn)
|
||||
|
||||
wg.Wait()
|
||||
}
|
||||
|
||||
func (c *socksChainSession) dispatchTorSOCKS() (err error) {
|
||||
c.upstreamConn, c.bndAddr, err = socks5.Redispatch(c.cfg.TargetSocksNet, c.cfg.TargetSocksAddr, c.req)
|
||||
if err != nil {
|
||||
c.req.Reply(socks5.ErrorToReplyCode(err))
|
||||
}
|
||||
return
|
||||
}
|
@ -0,0 +1,305 @@
|
||||
package main
|
||||
|
||||
import (
|
||||
"bufio"
|
||||
"bytes"
|
||||
"fmt"
|
||||
"io"
|
||||
"net"
|
||||
"strings"
|
||||
"sync"
|
||||
"testing"
|
||||
"time"
|
||||
|
||||
"github.com/subgraph/fw-daemon/socks5"
|
||||
"golang.org/x/net/proxy"
|
||||
)
|
||||
|
||||
// MortalService can be killed at any time.
|
||||
type MortalService struct {
|
||||
network string
|
||||
address string
|
||||
connectionCallback func(net.Conn) error
|
||||
|
||||
conns []net.Conn
|
||||
quit chan bool
|
||||
listener net.Listener
|
||||
waitGroup *sync.WaitGroup
|
||||
}
|
||||
|
||||
// NewMortalService creates a new MortalService
|
||||
func NewMortalService(network, address string, connectionCallback func(net.Conn) error) *MortalService {
|
||||
l := MortalService{
|
||||
network: network,
|
||||
address: address,
|
||||
connectionCallback: connectionCallback,
|
||||
|
||||
conns: make([]net.Conn, 0, 10),
|
||||
quit: make(chan bool),
|
||||
waitGroup: &sync.WaitGroup{},
|
||||
}
|
||||
return &l
|
||||
}
|
||||
|
||||
// Stop will kill our listener and all it's connections
|
||||
func (l *MortalService) Stop() {
|
||||
log.Infof("stopping listener service %s:%s", l.network, l.address)
|
||||
close(l.quit)
|
||||
if l.listener != nil {
|
||||
l.listener.Close()
|
||||
}
|
||||
l.waitGroup.Wait()
|
||||
}
|
||||
|
||||
func (l *MortalService) acceptLoop() {
|
||||
defer l.waitGroup.Done()
|
||||
defer func() {
|
||||
log.Infof("stoping listener service %s:%s", l.network, l.address)
|
||||
for i, conn := range l.conns {
|
||||
if conn != nil {
|
||||
log.Infof("Closing connection #%d", i)
|
||||
conn.Close()
|
||||
}
|
||||
}
|
||||
}()
|
||||
defer l.listener.Close()
|
||||
|
||||
for {
|
||||
conn, err := l.listener.Accept()
|
||||
if nil != err {
|
||||
if opErr, ok := err.(*net.OpError); ok && opErr.Timeout() {
|
||||
continue
|
||||
} else {
|
||||
log.Infof("MortalService connection accept failure: %s\n", err)
|
||||
select {
|
||||
case <-l.quit:
|
||||
return
|
||||
default:
|
||||
}
|
||||
continue
|
||||
}
|
||||
}
|
||||
|
||||
l.conns = append(l.conns, conn)
|
||||
go l.handleConnection(conn, len(l.conns)-1)
|
||||
}
|
||||
}
|
||||
|
||||
func (l *MortalService) createDeadlinedListener() error {
|
||||
if l.network == "tcp" {
|
||||
tcpAddr, err := net.ResolveTCPAddr("tcp", l.address)
|
||||
if err != nil {
|
||||
return fmt.Errorf("MortalService.createDeadlinedListener %s %s failure: %s", l.network, l.address, err)
|
||||
}
|
||||
tcpListener, err := net.ListenTCP("tcp", tcpAddr)
|
||||
if err != nil {
|
||||
return fmt.Errorf("MortalService.createDeadlinedListener %s %s failure: %s", l.network, l.address, err)
|
||||
}
|
||||
tcpListener.SetDeadline(time.Now().Add(1e9))
|
||||
l.listener = tcpListener
|
||||
return nil
|
||||
} else if l.network == "unix" {
|
||||
unixAddr, err := net.ResolveUnixAddr("unix", l.address)
|
||||
if err != nil {
|
||||
return fmt.Errorf("MortalService.createDeadlinedListener %s %s failure: %s", l.network, l.address, err)
|
||||
}
|
||||
unixListener, err := net.ListenUnix("unix", unixAddr)
|
||||
if err != nil {
|
||||
return fmt.Errorf("MortalService.createDeadlinedListener %s %s failure: %s", l.network, l.address, err)
|
||||
}
|
||||
unixListener.SetDeadline(time.Now().Add(1e9))
|
||||
l.listener = unixListener
|
||||
return nil
|
||||
} else {
|
||||
panic("")
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
// Start the MortalService
|
||||
func (l *MortalService) Start() error {
|
||||
var err error
|
||||
err = l.createDeadlinedListener()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
l.waitGroup.Add(1)
|
||||
go l.acceptLoop()
|
||||
return nil
|
||||
}
|
||||
|
||||
func (l *MortalService) handleConnection(conn net.Conn, id int) error {
|
||||
defer func() {
|
||||
log.Infof("Closing connection #%d", id)
|
||||
conn.Close()
|
||||
l.conns[id] = nil
|
||||
}()
|
||||
|
||||
log.Infof("Starting connection #%d", id)
|
||||
|
||||
for {
|
||||
if err := l.connectionCallback(conn); err != nil {
|
||||
log.Error(err.Error())
|
||||
return err
|
||||
}
|
||||
return nil
|
||||
}
|
||||
}
|
||||
|
||||
type AccumulatingService struct {
|
||||
net, address string
|
||||
banner string
|
||||
buffer bytes.Buffer
|
||||
mortalService *MortalService
|
||||
hasProtocolInfo bool
|
||||
hasAuthenticate bool
|
||||
receivedChan chan bool
|
||||
}
|
||||
|
||||
func NewAccumulatingService(net, address, banner string) *AccumulatingService {
|
||||
l := AccumulatingService{
|
||||
net: net,
|
||||
address: address,
|
||||
banner: banner,
|
||||
hasProtocolInfo: true,
|
||||
hasAuthenticate: true,
|
||||
receivedChan: make(chan bool, 0),
|
||||
}
|
||||
return &l
|
||||
}
|
||||
|
||||
func (a *AccumulatingService) Start() {
|
||||
a.mortalService = NewMortalService(a.net, a.address, a.SessionWorker)
|
||||
a.mortalService.Start()
|
||||
}
|
||||
|
||||
func (a *AccumulatingService) Stop() {
|
||||
fmt.Println("AccumulatingService STOP")
|
||||
a.mortalService.Stop()
|
||||
}
|
||||
|
||||
func (a *AccumulatingService) WaitUntilReceived() {
|
||||
<-a.receivedChan
|
||||
}
|
||||
|
||||
func (a *AccumulatingService) SessionWorker(conn net.Conn) error {
|
||||
connReader := bufio.NewReader(conn)
|
||||
conn.Write([]byte(a.banner))
|
||||
for {
|
||||
line, err := connReader.ReadBytes('\n')
|
||||
if err != nil {
|
||||
fmt.Printf("AccumulatingService read error: %s\n", err)
|
||||
}
|
||||
lineStr := strings.TrimSpace(string(line))
|
||||
a.buffer.WriteString(lineStr + "\n")
|
||||
a.receivedChan <- true
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func fakeSocksSessionWorker(clientConn net.Conn, targetNet, targetAddr string) error {
|
||||
defer clientConn.Close()
|
||||
|
||||
clientAddr := clientConn.RemoteAddr()
|
||||
fmt.Printf("INFO/socks: New connection from: %v\n", clientAddr)
|
||||
|
||||
// Do the SOCKS handshake with the client, and read the command.
|
||||
req, err := socks5.Handshake(clientConn)
|
||||
if err != nil {
|
||||
panic(fmt.Sprintf("ERR/socks: Failed SOCKS5 handshake: %v", err))
|
||||
}
|
||||
|
||||
var upstreamConn net.Conn
|
||||
upstreamConn, err = net.Dial(targetNet, targetAddr)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
defer upstreamConn.Close()
|
||||
req.Reply(socks5.ReplySucceeded)
|
||||
|
||||
// A upstream connection has been established, push data back and forth
|
||||
// till the session is done.
|
||||
var wg sync.WaitGroup
|
||||
wg.Add(2)
|
||||
copyLoop := func(dst, src net.Conn) {
|
||||
defer wg.Done()
|
||||
defer dst.Close()
|
||||
|
||||
io.Copy(dst, src)
|
||||
}
|
||||
go copyLoop(upstreamConn, clientConn)
|
||||
go copyLoop(clientConn, upstreamConn)
|
||||
|
||||
wg.Wait()
|
||||
fmt.Printf("INFO/socks: Closed SOCKS connection from: %v\n", clientAddr)
|
||||
return nil
|
||||
}
|
||||
|
||||
func TestSocksServerProxyChain(t *testing.T) {
|
||||
// socks client ---> socks chain ---> socks server ---> service
|
||||
socksChainNet := "tcp"
|
||||
socksChainAddr := "127.0.0.1:7750"
|
||||
socksServerNet := "tcp"
|
||||
socksServerAddr := "127.0.0.1:8850"
|
||||
serviceNet := "tcp"
|
||||
serviceAddr := "127.0.0.1:9950"
|
||||
|
||||
banner := "meow 123\r\n"
|
||||
// setup the service listener
|
||||
service := NewAccumulatingService(serviceNet, serviceAddr, banner)
|
||||
service.Start()
|
||||
defer service.Stop()
|
||||
|
||||
// setup the "socks server"
|
||||
session := func(clientConn net.Conn) error {
|
||||
return fakeSocksSessionWorker(clientConn, serviceNet, serviceAddr)
|
||||
}
|
||||
socksService := NewMortalService(socksServerNet, socksServerAddr, session)
|
||||
socksService.Start()
|
||||
defer socksService.Stop()
|
||||
|
||||
// setup the SOCKS proxy chain
|
||||
socksConfig := socksChainConfig{
|
||||
TargetSocksNet: socksServerNet,
|
||||
TargetSocksAddr: socksServerAddr,
|
||||
ListenSocksNet: socksChainNet,
|
||||
ListenSocksAddr: socksChainAddr,
|
||||
}
|
||||
wg := sync.WaitGroup{}
|
||||
ds := dbusServer{}
|
||||
chain := NewSocksChain(&socksConfig, &wg, &ds)
|
||||
chain.start()
|
||||
|
||||
// setup the SOCKS client
|
||||
auth := proxy.Auth{
|
||||
User: "",
|
||||
Password: "",
|
||||
}
|
||||
forward := proxy.NewPerHost(proxy.Direct, proxy.Direct)
|
||||
socksClient, err := proxy.SOCKS5(socksChainNet, socksChainAddr, &auth, forward)
|
||||
conn, err := socksClient.Dial(serviceNet, serviceAddr)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
|
||||
// read a banner from the service
|
||||
rd := bufio.NewReader(conn)
|
||||
line := []byte{}
|
||||
line, err = rd.ReadBytes('\n')
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
if string(line) != banner {
|
||||
t.Errorf("Did not receive expected banner. Got %s, wanted %s\n", string(line), banner)
|
||||
t.Fail()
|
||||
}
|
||||
|
||||
// send the service some data and verify it was received
|
||||
clientData := "hello world\r\n"
|
||||
conn.Write([]byte(clientData))
|
||||
service.WaitUntilReceived()
|
||||
if service.buffer.String() != strings.TrimSpace(clientData)+"\n" {
|
||||
t.Errorf("Client sent %s but service only received %s\n", "hello world\n", service.buffer.String())
|
||||
t.Fail()
|
||||
}
|
||||
}
|
@ -0,0 +1,43 @@
|
||||
//+build !windows
|
||||
|
||||
package dbus
|
||||
|
||||
import (
|
||||
"errors"
|
||||
"net"
|
||||
)
|
||||
|
||||
func init() {
|
||||
transports["tcp"] = newTcpTransport
|
||||
}
|
||||
|
||||
func tcpFamily(keys string) (string, error) {
|
||||
switch getKey(keys, "family") {
|
||||
case "":
|
||||
return "tcp", nil
|
||||
case "ipv4":
|
||||
return "tcp4", nil
|
||||
case "ipv6":
|
||||
return "tcp6", nil
|
||||
default:
|
||||
return "", errors.New("dbus: invalid tcp family (must be ipv4 or ipv6)")
|
||||
}
|
||||
}
|
||||
|
||||
func newTcpTransport(keys string) (transport, error) {
|
||||
host := getKey(keys, "host")
|
||||
port := getKey(keys, "port")
|
||||
if host == "" || port == "" {
|
||||
return nil, errors.New("dbus: unsupported address (must set host and port)")
|
||||
}
|
||||
|
||||
protocol, err := tcpFamily(keys)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
socket, err := net.Dial(protocol, net.JoinHostPort(host, port))
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return NewConn(socket)
|
||||
}
|
@ -0,0 +1,14 @@
|
||||
package dbus
|
||||
|
||||
import "io"
|
||||
|
||||
func (t *unixTransport) SendNullByte() error {
|
||||
n, _, err := t.UnixConn.WriteMsgUnix([]byte{0}, nil, nil)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
if n != 1 {
|
||||
return io.ErrShortWrite
|
||||
}
|
||||
return nil
|
||||
}
|
@ -0,0 +1,28 @@
|
||||
package cairo
|
||||
|
||||
// #cgo pkg-config: cairo cairo-gobject
|
||||
// #include <stdlib.h>
|
||||
// #include <cairo.h>
|
||||
// #include <cairo-gobject.h>
|
||||
import "C"
|
||||
import (
|
||||
"unsafe"
|
||||
)
|
||||
|
||||
// Format is a representation of Cairo's cairo_format_t.
|
||||
type Format int
|
||||
|
||||
const (
|
||||
FORMAT_INVALID Format = C.CAIRO_FORMAT_INVALID
|
||||
FORMAT_ARGB32 Format = C.CAIRO_FORMAT_ARGB32
|
||||
FORMAT_RGB24 Format = C.CAIRO_FORMAT_RGB24
|
||||
FORMAT_A8 Format = C.CAIRO_FORMAT_A8
|
||||
FORMAT_A1 Format = C.CAIRO_FORMAT_A1
|
||||
FORMAT_RGB16_565 Format = C.CAIRO_FORMAT_RGB16_565
|
||||
FORMAT_RGB30 Format = C.CAIRO_FORMAT_RGB30
|
||||
)
|
||||
|
||||
func marshalFormat(p uintptr) (interface{}, error) {
|
||||
c := C.g_value_get_enum((*C.GValue)(unsafe.Pointer(p)))
|
||||
return Format(c), nil
|
||||
}
|
File diff suppressed because it is too large
Load Diff
@ -0,0 +1,32 @@
|
||||
package glib
|
||||
|
||||
// #cgo pkg-config: glib-2.0 gobject-2.0 gio-2.0
|
||||
// #include <gio/gio.h>
|
||||
// #include <glib.h>
|
||||
// #include <glib-object.h>
|
||||
// #include "glib.go.h"
|
||||
import "C"
|
||||
|
||||
type MainContext C.GMainContext
|
||||
|
||||
// native returns a pointer to the underlying GMainContext.
|
||||
func (v *MainContext) native() *C.GMainContext {
|
||||
if v == nil {
|
||||
return nil
|
||||
}
|
||||
return (*C.GMainContext)(v)
|
||||
}
|
||||
|
||||
// MainContextDefault is a wrapper around g_main_context_default().
|
||||
func MainContextDefault() *MainContext {
|
||||
c := C.g_main_context_default()
|
||||
if c == nil {
|
||||
return nil
|
||||
}
|
||||
return (*MainContext)(c)
|
||||
}
|
||||
|
||||
// MainDepth is a wrapper around g_main_depth().
|
||||
func MainDepth() int {
|
||||
return int(C.g_main_depth())
|
||||
}
|
@ -0,0 +1,27 @@
|
||||
package glib
|
||||
|
||||
// #cgo pkg-config: glib-2.0 gobject-2.0 gio-2.0
|
||||
// #include <gio/gio.h>
|
||||
// #include <glib.h>
|
||||
// #include <glib-object.h>
|
||||
// #include "glib.go.h"
|
||||
import "C"
|
||||
|
||||
type Source C.GSource
|
||||
|
||||
// native returns a pointer to the underlying GSource.
|
||||
func (v *Source) native() *C.GSource {
|
||||
if v == nil {
|
||||
return nil
|
||||
}
|
||||
return (*C.GSource)(v)
|
||||
}
|
||||
|
||||
// MainCurrentSource is a wrapper around g_main_current_source().
|
||||
func MainCurrentSource() *Source {
|
||||
c := C.g_main_current_source()
|
||||
if c == nil {
|
||||
return nil
|
||||
}
|
||||
return (*Source)(c)
|
||||
}
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in new issue