mirror of
https://github.com/hufrea/byedpi.git
synced 2024-12-22 14:25:44 +00:00
692 lines
17 KiB
C
692 lines
17 KiB
C
#define _GNU_SOURCE
|
|
|
|
#include <stdint.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <signal.h>
|
|
|
|
#include <errno.h>
|
|
#include <unistd.h>
|
|
#include <fcntl.h>
|
|
#include <sys/ioctl.h>
|
|
|
|
#include <sys/socket.h>
|
|
#include <arpa/inet.h>
|
|
#include <netinet/tcp.h>
|
|
#include <netdb.h>
|
|
|
|
#include <proxy.h>
|
|
#include <packets.h>
|
|
#include <params.h>
|
|
#include <conev.h>
|
|
#include <desync.h>
|
|
|
|
#ifdef __linux__
|
|
#include <linux/netfilter_ipv4.h>
|
|
#endif
|
|
|
|
int NOT_EXIT = 1;
|
|
|
|
static void on_cancel(int sig) {
|
|
NOT_EXIT = 0;
|
|
}
|
|
|
|
|
|
static inline int is_binded_addr(int fd, struct sockaddr_ina *dst)
|
|
{
|
|
struct sockaddr_ina me;
|
|
socklen_t alen = sizeof(me);
|
|
|
|
if (getsockname(fd, &me.sa, &alen)) {
|
|
perror("getsockname");
|
|
return -1;
|
|
}
|
|
if (dst->sa.sa_family != me.sa.sa_family ||
|
|
dst->in.sin_port != me.in.sin_port) {
|
|
return 0;
|
|
}
|
|
if (dst->sa.sa_family == AF_INET6 ?
|
|
!memcmp(&dst->in6.sin6_addr, &me.in6.sin6_addr, 16) :
|
|
dst->in.sin_addr.s_addr == me.in.sin_addr.s_addr) {
|
|
return 1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
|
|
int resolve(char *host, int len, struct sockaddr_ina *addr)
|
|
{
|
|
struct addrinfo hints = {0}, *res = 0;
|
|
|
|
hints.ai_socktype = SOCK_STREAM;
|
|
hints.ai_family = AF_UNSPEC;
|
|
hints.ai_flags = AI_ADDRCONFIG;
|
|
|
|
char rchar = host[len];
|
|
host[len] = '\0';
|
|
|
|
if (getaddrinfo(host, 0, &hints, &res) || !res) {
|
|
host[len] = rchar;
|
|
return -1;
|
|
}
|
|
if (res->ai_addr->sa_family == AF_INET6)
|
|
addr->in6 = *(struct sockaddr_in6 *)res->ai_addr;
|
|
else
|
|
addr->in = *(struct sockaddr_in *)res->ai_addr;
|
|
freeaddrinfo(res);
|
|
|
|
host[len] = rchar;
|
|
return 0;
|
|
}
|
|
|
|
|
|
int auth_socks5(int fd, char *buffer, ssize_t n)
|
|
{
|
|
if (n <= 2 || (uint8_t)buffer[1] != (n - 2)) {
|
|
return -1;
|
|
}
|
|
buffer[1] = S_AUTH_BAD;
|
|
long i = 2;
|
|
for (; i < n; i++)
|
|
if (buffer[i] == S_AUTH_NONE) {
|
|
buffer[1] = S_AUTH_NONE;
|
|
break;
|
|
}
|
|
if (send(fd, buffer, 2, 0) < 0) {
|
|
perror("send");
|
|
return -1;
|
|
}
|
|
return i < n ? 0 : -1;
|
|
}
|
|
|
|
|
|
int resp_error(int fd, int e, int flag)
|
|
{
|
|
if (flag & FLAG_HTTP) {
|
|
const char *r;
|
|
if (e) r = "HTTP/1.1 504\r\n\r\n";
|
|
else r = "HTTP/1.1 200\r\n\r\n";
|
|
return send(fd, r, 16, 0);
|
|
}
|
|
else if (flag & FLAG_S4) {
|
|
struct s4_req s4r = {
|
|
.cmd = e ? S4_ER : S4_OK
|
|
};
|
|
return send(fd, &s4r, sizeof(s4r), 0);
|
|
}
|
|
else if (flag & FLAG_S5) {
|
|
uint8_t se;
|
|
switch (e) {
|
|
case 0: se = S_ER_OK;
|
|
break;
|
|
case ECONNREFUSED:
|
|
se = S_ER_CONN;
|
|
break;
|
|
case EHOSTUNREACH:
|
|
case ETIMEDOUT:
|
|
se = S_ER_HOST;
|
|
break;
|
|
case ENETUNREACH:
|
|
se = S_ER_NET;
|
|
break;
|
|
default: se = S_ER_GEN;
|
|
}
|
|
struct s5_rep s5r = {
|
|
.ver = 0x05, .code = se,
|
|
.atp = S_ATP_I4
|
|
};
|
|
return send(fd, &s5r, sizeof(s5r), 0);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
|
|
int handle_socks4(int fd, char *bf,
|
|
size_t n, struct sockaddr_ina *dst)
|
|
{
|
|
if (n < sizeof(struct s4_req) + 1) {
|
|
return -1;
|
|
}
|
|
struct s4_req *r = (struct s4_req *)bf;
|
|
char er = 0;
|
|
|
|
if (r->cmd != S_CMD_CONN) {
|
|
er = 1;
|
|
}
|
|
else if (ntohl(r->i4.s_addr) <= 255) do {
|
|
er = 1;
|
|
if (!params.resolve || bf[n - 1])
|
|
break;
|
|
char *ie = strchr(bf + sizeof(*r), 0);
|
|
if (!ie)
|
|
break;
|
|
int len = (bf + n - ie) - 2;
|
|
if (len > 2) {
|
|
if (resolve(ie + 1, len, dst)) {
|
|
fprintf(stderr, "not resolved: %.*s\n", len, ie + 1);
|
|
break;
|
|
}
|
|
er = 0;
|
|
}
|
|
} while (0);
|
|
else {
|
|
dst->in.sin_family = AF_INET;
|
|
dst->in.sin_addr = r->i4;
|
|
}
|
|
if (er) {
|
|
struct s4_req s4r = {
|
|
.cmd = S4_ER
|
|
};
|
|
if (send(fd, &s4r, sizeof(s4r), 0) < 0)
|
|
perror("send");
|
|
return -1;
|
|
}
|
|
dst->in.sin_port = r->port;
|
|
return 0;
|
|
}
|
|
|
|
|
|
int handle_socks5(int fd, char *buffer,
|
|
size_t n, struct sockaddr_ina *addr)
|
|
{
|
|
if (n < sizeof(struct s5_rep)) {
|
|
return -1;
|
|
}
|
|
struct s5_req *r = (struct s5_req *)buffer;
|
|
uint8_t er = 0;
|
|
|
|
if (n != (r->atp == S_ATP_I4 ? 10 :
|
|
(r->atp == S_ATP_ID ? r->id.len + 7 :
|
|
(r->atp == S_ATP_I6 ? 22 : 0)))) {
|
|
fprintf(stderr, "ss: bad request\n");
|
|
return -1;
|
|
}
|
|
else if (r->cmd != S_CMD_CONN) {
|
|
fprintf(stderr, "ss: unsupported cmd: 0x%x\n", r->cmd);
|
|
er = S_ER_CMD;
|
|
}
|
|
else switch (r->atp) {
|
|
case S_ATP_I4:
|
|
addr->in.sin_family = AF_INET;
|
|
addr->in.sin_addr = r->i4;
|
|
break;
|
|
|
|
case S_ATP_ID:
|
|
if (!params.resolve) {
|
|
er = S_ER_ATP;
|
|
break;
|
|
}
|
|
if (resolve(r->id.domain, r->id.len, addr)) {
|
|
fprintf(stderr, "not resolved: %.*s\n", r->id.len, r->id.domain);
|
|
er = S_ER_HOST;
|
|
}
|
|
break;
|
|
|
|
case S_ATP_I6:
|
|
if (!params.ipv6)
|
|
er = S_ER_ATP;
|
|
else {
|
|
addr->in6.sin6_family = AF_INET6;
|
|
addr->in6.sin6_addr = r->i6;
|
|
}
|
|
}
|
|
LOG(LOG_L, "s5r: cmd: 0x%x, atp: 0x%x\n", r->cmd, r->atp);
|
|
|
|
if (er) {
|
|
struct s5_rep s5r = {
|
|
.ver = 0x05, .code = er,
|
|
.atp = S_ATP_I4
|
|
};
|
|
if (send(fd, &s5r, sizeof(s5r), 0) < 0)
|
|
perror("send");
|
|
return -1;
|
|
}
|
|
addr->in.sin_port = *(uint16_t *)&buffer[n - 2];
|
|
return 0;
|
|
}
|
|
|
|
|
|
int handle_http(int fd, char *buffer,
|
|
size_t bfsize, struct sockaddr_ina *dst)
|
|
{
|
|
char *host = 0;
|
|
uint16_t port = 443;
|
|
int cnt = 0;
|
|
|
|
ssize_t n = recv(fd, buffer, bfsize, MSG_PEEK);
|
|
if (n <= 0) {
|
|
perror("recv proxy");
|
|
return -1;
|
|
}
|
|
int len = parse_http(buffer, n, &host, &port);
|
|
if (len <= 2) {
|
|
fprintf(stderr, "parse error\n");
|
|
return -1;
|
|
}
|
|
if (!memcmp(buffer, "CONNECT", 7)) {
|
|
if (recv(fd, buffer, n, 0) != n) {
|
|
perror("recv");
|
|
return -1;
|
|
}
|
|
cnt = 1;
|
|
}
|
|
if (*host == '[' && host[len - 1] == ']') {
|
|
host++; len -= 2;
|
|
}
|
|
if (resolve(host, len, dst)) {
|
|
fprintf(stderr, "not resolved: %.*s\n", len, host);
|
|
return -1;
|
|
}
|
|
dst->in.sin_port = htons(port);
|
|
return cnt;
|
|
}
|
|
|
|
|
|
int nsendc(int fd, int *wn)
|
|
{
|
|
#ifdef SO_NWRITE
|
|
socklen_t len = sizeof(*wn);
|
|
if (getsockopt(fd, SOL_SOCKET, SO_NWRITE, wn, &len) < 0) {
|
|
perror("getsockopt SO_NWRITE");
|
|
return -1;
|
|
}
|
|
#else
|
|
if (ioctl(fd, TIOCOUTQ, wn) < 0 ) {
|
|
perror("ioctl");
|
|
return -1;
|
|
}
|
|
#endif
|
|
return 0;
|
|
}
|
|
|
|
|
|
static inline int create_conn(struct poolhd *pool, struct eval *val,
|
|
enum eid nxt, struct sockaddr_ina *dst)
|
|
{
|
|
int sfd = socket(dst->sa.sa_family, SOCK_STREAM, 0);
|
|
if (sfd < 0) {
|
|
perror("socket");
|
|
return -1;
|
|
}
|
|
#ifdef __linux__
|
|
int syn_count = 1;
|
|
if (setsockopt(sfd, IPPROTO_TCP,
|
|
TCP_SYNCNT, &syn_count, sizeof(syn_count))) {
|
|
perror("setsockopt TCP_SYNCNT");
|
|
close(sfd);
|
|
return -1;
|
|
}
|
|
#endif
|
|
int one = 1;
|
|
if (setsockopt(sfd, IPPROTO_TCP,
|
|
TCP_NODELAY, (char *)&one, sizeof(one))) {
|
|
perror("setsockopt TCP_NODELAY");
|
|
close(sfd);
|
|
return -1;
|
|
}
|
|
if (setsockopt(sfd, SOL_SOCKET, SO_SNDBUF,
|
|
¶ms.send_bfsz, sizeof(params.send_bfsz)) < 0) {
|
|
close(sfd);
|
|
perror("setsockopt SO_SNDBUF");
|
|
return -1;
|
|
}
|
|
if (fcntl(sfd, F_SETFL, O_NONBLOCK) < 0) {
|
|
perror("fcntl");
|
|
close(sfd);
|
|
return -1;
|
|
}
|
|
int status = connect(sfd, &dst->sa, sizeof(*dst));
|
|
if (!status || errno != EINPROGRESS) {
|
|
perror("connect");
|
|
close(sfd);
|
|
return -1;
|
|
}
|
|
struct eval *pair = add_event(pool, nxt, sfd, POLLOUT);
|
|
if (!pair) {
|
|
close(sfd);
|
|
return -1;
|
|
}
|
|
val->pair = pair;
|
|
pair->pair = val;
|
|
pair->flag = FLAG_CONN;
|
|
return 0;
|
|
}
|
|
|
|
|
|
static inline int on_request(struct poolhd *pool, struct eval *val,
|
|
char *buffer, size_t bfsize)
|
|
{
|
|
struct sockaddr_ina dst = {0};
|
|
|
|
#ifdef __linux__
|
|
if (params.mode == MODE_TRANSPARENT) {
|
|
socklen_t alen = sizeof(dst);
|
|
|
|
if (getsockopt(val->fd, SOL_IP, SO_ORIGINAL_DST, &dst, &alen)) {
|
|
perror("getsockopt SO_ORIGINAL_DST");
|
|
return -1;
|
|
}
|
|
if (is_binded_addr(val->fd, &dst)) {
|
|
fprintf(stderr, "drop connection to self\n");
|
|
return -1;
|
|
}
|
|
mod_etype(pool, val, POLLIN, 0);
|
|
} else
|
|
#endif
|
|
if (params.mode == MODE_PROXY_H) {
|
|
int cnt = handle_http(val->fd, buffer, bfsize, &dst);
|
|
if (cnt < 0)
|
|
return -1;
|
|
else if (cnt)
|
|
val->flag = FLAG_HTTP;
|
|
else
|
|
mod_etype(pool, val, POLLIN, 0);
|
|
}
|
|
else {
|
|
ssize_t n = recv(val->fd, buffer, bfsize, 0);
|
|
if (n < 1) {
|
|
if (n) perror("ss recv");
|
|
return -1;
|
|
}
|
|
if (*buffer == S_VER5) {
|
|
if (val->flag != FLAG_S5) {
|
|
if (auth_socks5(val->fd, buffer, n)) {
|
|
return -1;
|
|
}
|
|
val->flag = FLAG_S5;
|
|
return 0;
|
|
}
|
|
if (handle_socks5(val->fd, buffer, n, &dst)) {
|
|
return -1;
|
|
}
|
|
}
|
|
else if (*buffer == S_VER4) {
|
|
if (handle_socks4(val->fd, buffer, n, &dst)) {
|
|
return -1;
|
|
}
|
|
val->flag = FLAG_S4;
|
|
}
|
|
else {
|
|
fprintf(stderr, "ss: invalid version: 0x%x (%lu)\n", *buffer, n);
|
|
return -1;
|
|
}
|
|
}
|
|
if (create_conn(pool, val, EV_CONNECT, &dst)) {
|
|
if (resp_error(val->fd, errno, val->flag) < 0)
|
|
perror("send");
|
|
return -1;
|
|
}
|
|
val->type = EV_IGNORE;
|
|
return 0;
|
|
}
|
|
|
|
|
|
static inline int on_accept(struct poolhd *pool, struct eval *val)
|
|
{
|
|
struct sockaddr_ina client;
|
|
struct eval *rval;
|
|
|
|
while (1) {
|
|
socklen_t len = sizeof(client);
|
|
int c = accept(val->fd, &client.sa, &len);
|
|
if (c < 0) {
|
|
if (errno == EAGAIN)
|
|
break;
|
|
perror("accept");
|
|
return -1;
|
|
}
|
|
if (fcntl(c, F_SETFL, O_NONBLOCK) < 0) {
|
|
perror("fcntl");
|
|
close(c);
|
|
continue;
|
|
}
|
|
int one = 1;
|
|
if (setsockopt(c, IPPROTO_TCP,
|
|
TCP_NODELAY, (char *)&one, sizeof(one))) {
|
|
perror("setsockopt TCP_NODELAY");
|
|
close(c);
|
|
continue;
|
|
}
|
|
if (setsockopt(c, SOL_SOCKET, SO_SNDBUF,
|
|
¶ms.send_bfsz, sizeof(params.send_bfsz)) < 0) {
|
|
perror("setsockopt SO_SNDBUF");
|
|
close(c);
|
|
continue;
|
|
}
|
|
if (!(rval = add_event(pool, EV_REQUEST, c, 0))) {
|
|
close(c);
|
|
continue;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
|
|
static inline int on_data(struct eval *val, char *buffer, size_t bfsize)
|
|
{
|
|
ssize_t n = recv(val->fd, buffer, bfsize, 0);
|
|
if (n <= 0) {
|
|
if (n) perror("recv data");
|
|
return -1;
|
|
}
|
|
if (desync(val->pair->fd, buffer, n)) {
|
|
return -1;
|
|
}
|
|
val->type = EV_TUNNEL;
|
|
return 0;
|
|
}
|
|
|
|
|
|
static inline int on_connect(struct poolhd *pool, struct eval *val,
|
|
char *buffer, size_t bfsize, int e)
|
|
{
|
|
if (val->flag & FLAG_CONN) {
|
|
if (!e) {
|
|
val->type = EV_TUNNEL;
|
|
mod_etype(pool, val, POLLOUT, 0);
|
|
}
|
|
if (val->pair->flag) {
|
|
int error = 0;
|
|
socklen_t len = sizeof(error);
|
|
if (e) {
|
|
if (getsockopt(val->fd, SOL_SOCKET,
|
|
SO_ERROR, (char *)&error, &len)) {
|
|
perror("getsockopt SO_ERROR");
|
|
return -1;
|
|
}
|
|
}
|
|
if (resp_error(val->pair->fd,
|
|
error, val->pair->flag) < 0) {
|
|
perror("send");
|
|
return -1;
|
|
}
|
|
if (e) return -1;
|
|
val->pair->type = EV_CONNECT;
|
|
return 0;
|
|
}
|
|
else if (!e) {
|
|
val = val->pair;
|
|
mod_etype(pool, val, POLLIN, 1);
|
|
}
|
|
}
|
|
if (e) return -1;
|
|
return on_data(val, buffer, bfsize);
|
|
}
|
|
|
|
|
|
static inline int on_tunnel(struct poolhd *pool, struct eval *val,
|
|
char *buffer, size_t bfsize, int out)
|
|
{
|
|
ssize_t n = 0;
|
|
int peek = 0;
|
|
struct eval *pair = val->pair;
|
|
|
|
if (val->flag & FLAG_NOSEND && out) {
|
|
val->flag &= ~FLAG_NOSEND;
|
|
|
|
mod_etype(pool, val, POLLOUT, 0);
|
|
mod_etype(pool, val->pair, POLLIN, 1);
|
|
|
|
pair = val;
|
|
val = val->pair;
|
|
}
|
|
do {
|
|
if (pair->send_count >= params.nack_max) {
|
|
int wn = 0;
|
|
if (nsendc(pair->fd, &wn)) {
|
|
return -1;
|
|
}
|
|
pair->send_count = wn;
|
|
if (wn) {
|
|
LOG(LOG_S, "not ack: %d (fd: %d)\n", wn, pair->fd);
|
|
}
|
|
if (wn >= params.nack_max) {
|
|
peek = MSG_PEEK;
|
|
}
|
|
}
|
|
n = recv(val->fd, buffer, bfsize, peek);
|
|
|
|
if (n < 0 && errno == EAGAIN)
|
|
break;
|
|
if (n < 1) {
|
|
if (n) perror("recv server");
|
|
return -1;
|
|
}
|
|
if (send(pair->fd, buffer, n, 0) < 0) {
|
|
if (errno == EAGAIN && peek) {
|
|
LOG(LOG_S, "EAGAIN, set POLLOUT (fd: %d)\n", pair->fd);
|
|
|
|
mod_etype(pool, val, POLLIN, 0);
|
|
mod_etype(pool, pair, POLLOUT, 1);
|
|
|
|
pair->flag |= FLAG_NOSEND;
|
|
break;
|
|
}
|
|
perror("send");
|
|
return -1;
|
|
}
|
|
if (peek) {
|
|
if (recv(val->fd, buffer, n, 0) != n) {
|
|
perror("recv");
|
|
return -1;
|
|
}
|
|
}
|
|
pair->send_count += n;
|
|
|
|
} while (n == bfsize);
|
|
return 0;
|
|
}
|
|
|
|
|
|
int big_loop(int srvfd)
|
|
{
|
|
size_t bfsize = params.bfsize;
|
|
|
|
struct poolhd *pool = init_pool(params.max_open * 2 + 1);
|
|
if (!pool) {
|
|
perror("init pool");
|
|
return -1;
|
|
}
|
|
char *buffer = malloc(params.bfsize);
|
|
if (!buffer) {
|
|
perror("malloc");
|
|
return -1;
|
|
}
|
|
add_event(pool, EV_ACCEPT, srvfd, 0);
|
|
|
|
struct eval *val;
|
|
int i = -1, etype;
|
|
|
|
while (NOT_EXIT) {
|
|
val = next_event(pool, &i, &etype);
|
|
if (!val) {
|
|
if (errno == EINTR)
|
|
continue;
|
|
perror("(e)poll");
|
|
break;
|
|
}
|
|
LOG(LOG_L, "new event: fd: %d, evt: %s\n", val->fd, eid_name[val->type]);
|
|
|
|
if (!val->fd) {
|
|
continue;
|
|
}
|
|
switch (val->type) {
|
|
case EV_ACCEPT:
|
|
if (on_accept(pool, val))
|
|
NOT_EXIT = 0;
|
|
continue;
|
|
|
|
case EV_REQUEST:
|
|
if ((etype & POLLHUP) ||
|
|
on_request(pool, val, buffer, bfsize))
|
|
del_event(pool, val);
|
|
continue;
|
|
|
|
case EV_TUNNEL:
|
|
if ((etype & POLLHUP) ||
|
|
on_tunnel(pool, val, buffer, bfsize, etype & POLLOUT))
|
|
del_event(pool, val);
|
|
continue;
|
|
|
|
case EV_CONNECT:
|
|
if (on_connect(pool, val, buffer, bfsize, etype & POLLERR))
|
|
del_event(pool, val);
|
|
continue;
|
|
|
|
case EV_IGNORE:
|
|
if (etype & (POLLHUP | POLLERR))
|
|
del_event(pool, val);
|
|
continue;
|
|
|
|
default:
|
|
fprintf(stderr, "???\n");
|
|
NOT_EXIT = 0;
|
|
}
|
|
}
|
|
fprintf(stderr, "exit\n");
|
|
free(buffer);
|
|
destroy_pool(pool);
|
|
return 0;
|
|
}
|
|
|
|
|
|
int listener(struct sockaddr_ina srv)
|
|
{
|
|
if (signal(SIGPIPE, SIG_IGN))
|
|
perror("signal SIGPIPE!");
|
|
|
|
if (signal(SIGINT, on_cancel))
|
|
perror("signal SIGINT!");
|
|
|
|
int srvfd = socket(srv.sa.sa_family, SOCK_STREAM, 0);
|
|
if (srvfd < 0) {
|
|
perror("socket");
|
|
return -1;
|
|
}
|
|
if (fcntl(srvfd, F_SETFL, O_NONBLOCK) < 0) {
|
|
perror("fcntl");
|
|
close(srvfd);
|
|
return -1;
|
|
}
|
|
int opt = 1;
|
|
if (setsockopt(srvfd, SOL_SOCKET,
|
|
SO_REUSEADDR, (char *)&opt, sizeof(opt)) == -1) {
|
|
perror("setsockopt");
|
|
close(srvfd);
|
|
return -1;
|
|
}
|
|
if (bind(srvfd, &srv.sa, sizeof(srv)) < 0) {
|
|
perror("bind");
|
|
close(srvfd);
|
|
return -1;
|
|
}
|
|
if (listen(srvfd, 10)) {
|
|
perror("listen");
|
|
close(srvfd);
|
|
return -1;
|
|
}
|
|
int status = big_loop(srvfd);
|
|
close(srvfd);
|
|
return status;
|
|
} |