2021-03-04 14:30:38 +03:00
# define _GNU_SOURCE
# include <stdio.h>
# include <stdlib.h>
# include <string.h>
# include <sys/types.h>
# include <sys/socket.h>
# include <netinet/in.h>
# include <netinet/ip.h>
# include <net/if.h>
# include <ifaddrs.h>
# include <netdb.h>
# include <unistd.h>
# include <arpa/inet.h>
# include <sys/select.h>
# include <fcntl.h>
# include <stdint.h>
# include <sys/ioctl.h>
# include <signal.h>
# include <errno.h>
# include <stdbool.h>
# include <netinet/tcp.h>
# include <getopt.h>
# include <pwd.h>
# include <sys/resource.h>
# include <time.h>
# include "tpws.h"
# ifdef BSD
# include <sys/sysctl.h>
# endif
# include "tpws_conn.h"
# include "hostlist.h"
# include "params.h"
# include "sec.h"
# include "redirect.h"
2021-03-05 21:02:34 +03:00
# include "helpers.h"
2023-10-26 15:12:32 +03:00
# include "gzip.h"
# include "pools.h"
2021-03-04 14:30:38 +03:00
struct params_s params ;
bool bHup = false ;
static void onhup ( int sig )
{
printf ( " HUP received ! \n " ) ;
2022-07-26 19:15:28 +03:00
if ( params . hostlist | | params . hostlist_exclude )
printf ( " Will reload hostlists on next request \n " ) ;
2021-03-04 14:30:38 +03:00
bHup = true ;
}
// should be called in normal execution
2023-10-13 20:10:46 +03:00
void dohup ( void )
2021-03-04 14:30:38 +03:00
{
if ( bHup )
{
2024-03-23 22:57:05 +03:00
if ( ! LoadIncludeHostLists ( ) | | ! LoadExcludeHostLists ( ) )
2021-03-04 14:30:38 +03:00
{
2022-07-26 19:15:28 +03:00
// what will we do without hostlist ?? sure, gonna die
exit ( 1 ) ;
2021-03-04 14:30:38 +03:00
}
bHup = false ;
}
}
2023-10-26 15:12:32 +03:00
static void onusr2 ( int sig )
{
printf ( " \n HOSTFAIL POOL DUMP \n " ) ;
HostFailPoolDump ( params . hostlist_auto_fail_counters ) ;
printf ( " \n " ) ;
}
2021-03-04 14:30:38 +03:00
2023-10-13 20:10:46 +03:00
static int8_t block_sigpipe ( void )
2021-03-04 14:30:38 +03:00
{
sigset_t sigset ;
memset ( & sigset , 0 , sizeof ( sigset ) ) ;
//Get the old sigset, add SIGPIPE and update sigset
if ( sigprocmask ( SIG_BLOCK , NULL , & sigset ) = = - 1 ) {
perror ( " sigprocmask (get) " ) ;
return - 1 ;
}
if ( sigaddset ( & sigset , SIGPIPE ) = = - 1 ) {
perror ( " sigaddset " ) ;
return - 1 ;
}
if ( sigprocmask ( SIG_BLOCK , & sigset , NULL ) = = - 1 ) {
perror ( " sigprocmask (set) " ) ;
return - 1 ;
}
return 0 ;
}
static bool is_interface_online ( const char * ifname )
{
struct ifreq ifr ;
int sock ;
if ( ( sock = socket ( PF_INET , SOCK_DGRAM , IPPROTO_IP ) ) = = - 1 )
return false ;
memset ( & ifr , 0 , sizeof ( ifr ) ) ;
strncpy ( ifr . ifr_name , ifname , IFNAMSIZ ) ;
ifr . ifr_name [ IFNAMSIZ - 1 ] = 0 ;
ioctl ( sock , SIOCGIFFLAGS , & ifr ) ;
close ( sock ) ;
return ! ! ( ifr . ifr_flags & IFF_UP ) ;
}
2023-10-13 20:10:46 +03:00
static int get_default_ttl ( void )
2023-07-03 15:28:42 +03:00
{
int sock , ttl = 0 ;
socklen_t optlen = sizeof ( ttl ) ;
if ( ( sock = socket ( PF_INET , SOCK_DGRAM , IPPROTO_IP ) ) ! = - 1 )
{
getsockopt ( sock , IPPROTO_IP , IP_TTL , & ttl , & optlen ) ;
close ( sock ) ;
}
return ttl ;
}
2021-03-04 14:30:38 +03:00
2023-10-13 20:10:46 +03:00
static void exithelp ( void )
2021-03-04 14:30:38 +03:00
{
printf (
2023-10-26 15:12:32 +03:00
" --bind-addr=<v4_addr>|<v6_addr> \t ; for v6 link locals append %%interface_name \n "
" --bind-iface4=<interface_name> \t \t ; bind to the first ipv4 addr of interface \n "
" --bind-iface6=<interface_name> \t \t ; bind to the first ipv6 addr of interface \n "
" --bind-linklocal=no|unwanted|prefer|force ; prohibit, accept, prefer or force ipv6 link local bind \n "
" --bind-wait-ifup=<sec> \t \t \t ; wait for interface to appear and up \n "
" --bind-wait-ip=<sec> \t \t \t ; after ifup wait for ip address to appear up to N seconds \n "
" --bind-wait-ip-linklocal=<sec> \t \t ; (prefer) accept only LL first N seconds then any (unwanted) accept only globals first N seconds then LL \n "
" --bind-wait-only \t \t \t ; wait for bind conditions satisfaction then exit. return code 0 if success. \n "
2021-03-04 14:30:38 +03:00
" * multiple binds are supported. each bind-addr, bind-iface* start new bind \n "
2023-10-26 15:12:32 +03:00
" --port=<port> \t \t \t \t ; only one port number for all binds is supported \n "
" --socks \t \t \t \t ; implement socks4/5 proxy instead of transparent proxy \n "
" --no-resolve \t \t \t \t ; disable socks5 remote dns ability (resolves are not async, they block all activity) \n "
2021-03-04 14:30:38 +03:00
" --local-rcvbuf=<bytes> \n "
" --local-sndbuf=<bytes> \n "
" --remote-rcvbuf=<bytes> \n "
" --remote-sndbuf=<bytes> \n "
2023-10-26 15:12:32 +03:00
" --skip-nodelay \t \t \t \t ; do not set TCP_NODELAY option for outgoing connections (incompatible with split options) \n "
2021-03-04 14:30:38 +03:00
" --maxconn=<max_connections> \n "
# ifdef SPLICE_PRESENT
2023-10-26 15:12:32 +03:00
" --maxfiles=<max_open_files> \t \t ; should be at least (X*connections+16), where X=6 in tcp proxy mode, X=4 in tampering mode \n "
2021-03-04 14:30:38 +03:00
# else
2023-10-26 15:12:32 +03:00
" --maxfiles=<max_open_files> \t \t ; should be at least (connections*2+16) \n "
2021-03-04 14:30:38 +03:00
# endif
2023-10-26 15:12:32 +03:00
" --max-orphan-time=<sec> \t \t ; if local leg sends something and closes and remote leg is still connecting then cancel connection attempt after N seconds \n "
" --daemon \t \t \t \t ; daemonize \n "
" --pidfile=<filename> \t \t \t ; write pid to file \n "
" --user=<username> \t \t \t ; drop root privs \n "
" --uid=uid[:gid] \t \t \t ; drop root privs \n "
2022-01-23 23:11:11 +03:00
# if defined(BSD) && !defined(__OpenBSD__) && !defined(__APPLE__)
2023-10-26 15:12:32 +03:00
" --enable-pf \t \t \t \t ; enable PF redirector support. required in FreeBSD when used with PF firewall. \n "
2022-01-23 23:11:11 +03:00
# endif
2023-10-26 15:12:32 +03:00
" --debug=0|1|2 \t \t \t \t ; 0(default)=silent 1=verbose 2=debug \n "
" \n FILTER: \n "
" --hostlist=<filename> \t \t \t ; only act on hosts in the list (one host per line, subdomains auto apply, gzip supported, multiple hostlists allowed) \n "
" --hostlist-exclude=<filename> \t \t ; do not act on hosts in the list (one host per line, subdomains auto apply, gzip supported, multiple hostlists allowed) \n "
" --hostlist-auto=<filename> \t \t ; detect DPI blocks and build hostlist automatically \n "
" --hostlist-auto-fail-threshold=<int> \t ; how many failed attempts cause hostname to be added to auto hostlist (default : %d) \n "
" --hostlist-auto-fail-time=<int> \t ; all failed attemps must be within these seconds (default : %d) \n "
2023-11-09 12:08:09 +03:00
" --hostlist-auto-debug=<logfile> \t ; debug auto hostlist positives \n "
2023-10-26 15:12:32 +03:00
" \n TAMPER: \n "
" --split-http-req=method|host \t \t ; split at specified logical part of plain http request \n "
" --split-pos=<numeric_offset> \t \t ; split at specified pos. split-http-req takes precedence for http. \n "
" --split-any-protocol \t \t \t ; split not only http and https \n "
2023-07-03 15:28:42 +03:00
# if defined(BSD) && !defined(__APPLE__)
2024-03-26 11:38:31 +03:00
" --disorder[=http|tls] \t \t \t ; when splitting simulate sending second fragment first (BSD sends entire message instead of first fragment, this is not good) \n "
2023-07-03 15:28:42 +03:00
# else
2024-03-26 11:38:31 +03:00
" --disorder[=http|tls] \t \t \t ; when splitting simulate sending second fragment first \n "
2023-07-03 15:28:42 +03:00
# endif
2024-03-26 11:38:31 +03:00
" --oob[=http|tls] \t \t \t ; when splitting send out of band byte. default is HEX 0x00. \n "
" --oob-data=<char>|0xHEX \t \t ; override default 0x00 OOB byte. \n "
2023-10-26 15:12:32 +03:00
" --hostcase \t \t \t \t ; change Host: => host: \n "
" --hostspell \t \t \t \t ; exact spelling of \" Host \" header. must be 4 chars. default is \" host \" \n "
" --hostdot \t \t \t \t ; add \" . \" after Host: name \n "
" --hosttab \t \t \t \t ; add tab after Host: name \n "
" --hostnospace \t \t \t \t ; remove space after Host: \n "
" --hostpad=<bytes> \t \t \t ; add dummy padding headers before Host: \n "
" --domcase \t \t \t \t ; mix domain case : Host: TeSt.cOm \n "
" --methodspace \t \t \t \t ; add extra space after method \n "
" --methodeol \t \t \t \t ; add end-of-line before method \n "
" --unixeol \t \t \t \t ; replace 0D0A to 0A \n "
" --tlsrec=sni \t \t \t \t ; make 2 TLS records. split at SNI. don't split if SNI is not present \n "
2024-03-05 14:59:44 +03:00
" --tlsrec-pos=<pos> \t \t \t ; make 2 TLS records. split at specified pos \n "
2024-03-09 14:26:07 +03:00
" --tamper-start=[n]<pos> \t \t ; start tampering only from specified outbound stream position. default is 0. 'n' means data block number. \n "
" --tamper-cutoff=[n]<pos> \t \t ; do not tamper anymore after specified outbound stream position. default is unlimited. \n " ,
2023-10-26 15:12:32 +03:00
HOSTLIST_AUTO_FAIL_THRESHOLD_DEFAULT , HOSTLIST_AUTO_FAIL_TIME_DEFAULT
2021-03-04 14:30:38 +03:00
) ;
exit ( 1 ) ;
}
2023-10-13 20:10:46 +03:00
static void cleanup_params ( void )
2021-03-04 14:30:38 +03:00
{
2022-07-26 19:15:28 +03:00
strlist_destroy ( & params . hostlist_files ) ;
strlist_destroy ( & params . hostlist_exclude_files ) ;
2023-10-26 15:12:32 +03:00
StrPoolDestroy ( & params . hostlist_exclude ) ;
StrPoolDestroy ( & params . hostlist ) ;
HostFailPoolDestroy ( & params . hostlist_auto_fail_counters ) ;
2021-03-04 14:30:38 +03:00
}
2023-10-13 20:10:46 +03:00
static void exithelp_clean ( void )
2021-03-04 14:30:38 +03:00
{
cleanup_params ( ) ;
exithelp ( ) ;
}
static void exit_clean ( int code )
{
cleanup_params ( ) ;
exit ( code ) ;
}
2023-10-13 20:10:46 +03:00
static void nextbind_clean ( void )
2021-03-04 14:30:38 +03:00
{
params . binds_last + + ;
if ( params . binds_last > = MAX_BINDS )
{
fprintf ( stderr , " maximum of %d binds are supported \n " , MAX_BINDS ) ;
exit_clean ( 1 ) ;
}
}
2023-10-13 20:10:46 +03:00
static void checkbind_clean ( void )
2021-03-04 14:30:38 +03:00
{
if ( params . binds_last < 0 )
{
fprintf ( stderr , " start new bind with --bind-addr,--bind-iface* \n " ) ;
exit_clean ( 1 ) ;
}
}
2023-10-13 20:10:46 +03:00
void save_default_ttl ( void )
2023-07-03 15:28:42 +03:00
{
if ( ! params . ttl_default )
{
params . ttl_default = get_default_ttl ( ) ;
if ( ! params . ttl_default )
{
fprintf ( stderr , " could not get default ttl \n " ) ;
exit_clean ( 1 ) ;
}
}
}
2021-03-04 14:30:38 +03:00
void parse_params ( int argc , char * argv [ ] )
{
int option_index = 0 ;
int v , i ;
memset ( & params , 0 , sizeof ( params ) ) ;
memcpy ( params . hostspell , " host " , 4 ) ; // default hostspell
params . maxconn = DEFAULT_MAX_CONN ;
params . max_orphan_time = DEFAULT_MAX_ORPHAN_TIME ;
params . binds_last = - 1 ;
2023-10-26 15:12:32 +03:00
params . hostlist_auto_fail_threshold = HOSTLIST_AUTO_FAIL_THRESHOLD_DEFAULT ;
params . hostlist_auto_fail_time = HOSTLIST_AUTO_FAIL_TIME_DEFAULT ;
2022-07-26 19:15:28 +03:00
LIST_INIT ( & params . hostlist_files ) ;
LIST_INIT ( & params . hostlist_exclude_files ) ;
2022-01-23 23:11:11 +03:00
# if defined(__OpenBSD__) || defined(__APPLE__)
params . pf_enable = true ; // OpenBSD and MacOS have no other choice
# endif
2021-03-04 14:30:38 +03:00
if ( can_drop_root ( ) )
{
params . uid = params . gid = 0x7FFFFFFF ; // default uid:gid
params . droproot = true ;
}
const struct option long_options [ ] = {
{ " help " , no_argument , 0 , 0 } , // optidx=0
{ " h " , no_argument , 0 , 0 } , // optidx=1
{ " bind-addr " , required_argument , 0 , 0 } , // optidx=2
{ " bind-iface4 " , required_argument , 0 , 0 } , // optidx=3
{ " bind-iface6 " , required_argument , 0 , 0 } , // optidx=4
{ " bind-linklocal " , required_argument , 0 , 0 } , // optidx=5
{ " bind-wait-ifup " , required_argument , 0 , 0 } , // optidx=6
{ " bind-wait-ip " , required_argument , 0 , 0 } , // optidx=7
{ " bind-wait-ip-linklocal " , required_argument , 0 , 0 } , // optidx=8
{ " bind-wait-only " , no_argument , 0 , 0 } , // optidx=9
{ " port " , required_argument , 0 , 0 } , // optidx=10
{ " daemon " , no_argument , 0 , 0 } , // optidx=11
{ " user " , required_argument , 0 , 0 } , // optidx=12
{ " uid " , required_argument , 0 , 0 } , // optidx=13
{ " maxconn " , required_argument , 0 , 0 } , // optidx=14
{ " maxfiles " , required_argument , 0 , 0 } , // optidx=15
{ " max-orphan-time " , required_argument , 0 , 0 } , // optidx=16
{ " hostcase " , no_argument , 0 , 0 } , // optidx=17
{ " hostspell " , required_argument , 0 , 0 } , // optidx=18
{ " hostdot " , no_argument , 0 , 0 } , // optidx=19
{ " hostnospace " , no_argument , 0 , 0 } , // optidx=20
{ " hostpad " , required_argument , 0 , 0 } , // optidx=21
{ " domcase " , no_argument , 0 , 0 } , // optidx=22
{ " split-http-req " , required_argument , 0 , 0 } , // optidx=23
{ " split-pos " , required_argument , 0 , 0 } , // optidx=24
{ " split-any-protocol " , optional_argument , 0 , 0 } , // optidx=25
2024-03-26 11:38:31 +03:00
{ " disorder " , optional_argument , 0 , 0 } , // optidx=26
2024-03-05 14:59:44 +03:00
{ " oob " , optional_argument , 0 , 0 } , // optidx=27
2024-03-26 11:38:31 +03:00
{ " oob-data " , required_argument , 0 , 0 } , // optidx=28
{ " methodspace " , no_argument , 0 , 0 } , // optidx=29
{ " methodeol " , no_argument , 0 , 0 } , // optidx=30
{ " hosttab " , no_argument , 0 , 0 } , // optidx=31
{ " unixeol " , no_argument , 0 , 0 } , // optidx=32
{ " tlsrec " , required_argument , 0 , 0 } , // optidx=33
{ " tlsrec-pos " , required_argument , 0 , 0 } , // optidx=34
{ " hostlist " , required_argument , 0 , 0 } , // optidx=35
{ " hostlist-exclude " , required_argument , 0 , 0 } , // optidx=36
{ " hostlist-auto " , required_argument , 0 , 0 } , // optidx=37
{ " hostlist-auto-fail-threshold " , required_argument , 0 , 0 } , // optidx=38
{ " hostlist-auto-fail-time " , required_argument , 0 , 0 } , // optidx=39
{ " hostlist-auto-debug " , required_argument , 0 , 0 } , // optidx=40
{ " pidfile " , required_argument , 0 , 0 } , // optidx=41
{ " debug " , optional_argument , 0 , 0 } , // optidx=42
{ " local-rcvbuf " , required_argument , 0 , 0 } , // optidx=43
{ " local-sndbuf " , required_argument , 0 , 0 } , // optidx=44
{ " remote-rcvbuf " , required_argument , 0 , 0 } , // optidx=45
{ " remote-sndbuf " , required_argument , 0 , 0 } , // optidx=46
{ " socks " , no_argument , 0 , 0 } , // optidx=47
{ " no-resolve " , no_argument , 0 , 0 } , // optidx=48
{ " skip-nodelay " , no_argument , 0 , 0 } , // optidx=49
{ " tamper-start " , required_argument , 0 , 0 } , // optidx=50
{ " tamper-cutoff " , required_argument , 0 , 0 } , // optidx=51
2022-01-23 23:11:11 +03:00
# if defined(BSD) && !defined(__OpenBSD__) && !defined(__APPLE__)
2024-03-26 11:38:31 +03:00
{ " enable-pf " , no_argument , 0 , 0 } , // optidx=52
2022-01-23 23:11:11 +03:00
# endif
2023-10-26 15:12:32 +03:00
{ " hostlist-auto-retrans-threshold " , optional_argument , 0 , 0 } , // ignored. for nfqws command line compatibility
2021-03-04 14:30:38 +03:00
{ NULL , 0 , NULL , 0 }
} ;
while ( ( v = getopt_long_only ( argc , argv , " " , long_options , & option_index ) ) ! = - 1 )
{
if ( v ) exithelp_clean ( ) ;
switch ( option_index )
{
case 0 :
case 1 :
exithelp_clean ( ) ;
break ;
case 2 : /* bind-addr */
nextbind_clean ( ) ;
{
char * p = strchr ( optarg , ' % ' ) ;
if ( p )
{
* p = 0 ;
strncpy ( params . binds [ params . binds_last ] . bindiface , p + 1 , sizeof ( params . binds [ params . binds_last ] . bindiface ) ) ;
}
strncpy ( params . binds [ params . binds_last ] . bindaddr , optarg , sizeof ( params . binds [ params . binds_last ] . bindaddr ) ) ;
}
params . binds [ params . binds_last ] . bindaddr [ sizeof ( params . binds [ params . binds_last ] . bindaddr ) - 1 ] = 0 ;
break ;
case 3 : /* bind-iface4 */
nextbind_clean ( ) ;
params . binds [ params . binds_last ] . bind_if6 = false ;
strncpy ( params . binds [ params . binds_last ] . bindiface , optarg , sizeof ( params . binds [ params . binds_last ] . bindiface ) ) ;
params . binds [ params . binds_last ] . bindiface [ sizeof ( params . binds [ params . binds_last ] . bindiface ) - 1 ] = 0 ;
break ;
case 4 : /* bind-iface6 */
nextbind_clean ( ) ;
params . binds [ params . binds_last ] . bind_if6 = true ;
strncpy ( params . binds [ params . binds_last ] . bindiface , optarg , sizeof ( params . binds [ params . binds_last ] . bindiface ) ) ;
params . binds [ params . binds_last ] . bindiface [ sizeof ( params . binds [ params . binds_last ] . bindiface ) - 1 ] = 0 ;
break ;
case 5 : /* bind-linklocal */
checkbind_clean ( ) ;
params . binds [ params . binds_last ] . bindll = true ;
2021-03-08 22:33:21 +03:00
if ( ! strcmp ( optarg , " no " ) )
params . binds [ params . binds_last ] . bindll = no ;
else if ( ! strcmp ( optarg , " prefer " ) )
params . binds [ params . binds_last ] . bindll = prefer ;
else if ( ! strcmp ( optarg , " force " ) )
params . binds [ params . binds_last ] . bindll = force ;
else if ( ! strcmp ( optarg , " unwanted " ) )
params . binds [ params . binds_last ] . bindll = unwanted ;
else
2021-03-04 14:30:38 +03:00
{
fprintf ( stderr , " invalid parameter in bind-linklocal : %s \n " , optarg ) ;
exit_clean ( 1 ) ;
}
break ;
case 6 : /* bind-wait-ifup */
checkbind_clean ( ) ;
params . binds [ params . binds_last ] . bind_wait_ifup = atoi ( optarg ) ;
break ;
case 7 : /* bind-wait-ip */
checkbind_clean ( ) ;
params . binds [ params . binds_last ] . bind_wait_ip = atoi ( optarg ) ;
break ;
case 8 : /* bind-wait-ip-linklocal */
checkbind_clean ( ) ;
params . binds [ params . binds_last ] . bind_wait_ip_ll = atoi ( optarg ) ;
break ;
case 9 : /* bind-wait-only */
params . bind_wait_only = true ;
break ;
case 10 : /* port */
i = atoi ( optarg ) ;
if ( i < = 0 | | i > 65535 )
{
fprintf ( stderr , " bad port number \n " ) ;
exit_clean ( 1 ) ;
}
params . port = ( uint16_t ) i ;
break ;
case 11 : /* daemon */
params . daemon = true ;
break ;
case 12 : /* user */
{
struct passwd * pwd = getpwnam ( optarg ) ;
if ( ! pwd )
{
fprintf ( stderr , " non-existent username supplied \n " ) ;
exit_clean ( 1 ) ;
}
params . uid = pwd - > pw_uid ;
params . gid = pwd - > pw_gid ;
params . droproot = true ;
break ;
}
case 13 : /* uid */
params . gid = 0x7FFFFFFF ; // default git. drop gid=0
params . droproot = true ;
2021-12-27 12:54:07 +03:00
if ( sscanf ( optarg , " %u:%u " , & params . uid , & params . gid ) < 1 )
2021-03-04 14:30:38 +03:00
{
fprintf ( stderr , " --uid should be : uid[:gid] \n " ) ;
exit_clean ( 1 ) ;
}
break ;
case 14 : /* maxconn */
params . maxconn = atoi ( optarg ) ;
if ( params . maxconn < = 0 | | params . maxconn > 10000 )
{
fprintf ( stderr , " bad maxconn \n " ) ;
exit_clean ( 1 ) ;
}
break ;
case 15 : /* maxfiles */
params . maxfiles = atoi ( optarg ) ;
if ( params . maxfiles < 0 )
{
fprintf ( stderr , " bad maxfiles \n " ) ;
exit_clean ( 1 ) ;
}
break ;
case 16 : /* max-orphan-time */
params . max_orphan_time = atoi ( optarg ) ;
if ( params . max_orphan_time < 0 )
{
fprintf ( stderr , " bad max_orphan_time \n " ) ;
exit_clean ( 1 ) ;
}
break ;
case 17 : /* hostcase */
params . hostcase = true ;
params . tamper = true ;
break ;
case 18 : /* hostspell */
if ( strlen ( optarg ) ! = 4 )
{
fprintf ( stderr , " hostspell must be exactly 4 chars long \n " ) ;
exit_clean ( 1 ) ;
}
params . hostcase = true ;
memcpy ( params . hostspell , optarg , 4 ) ;
params . tamper = true ;
break ;
case 19 : /* hostdot */
params . hostdot = true ;
params . tamper = true ;
break ;
case 20 : /* hostnospace */
params . hostnospace = true ;
params . tamper = true ;
break ;
case 21 : /* hostpad */
params . hostpad = atoi ( optarg ) ;
params . tamper = true ;
break ;
case 22 : /* domcase */
params . domcase = true ;
params . tamper = true ;
break ;
case 23 : /* split-http-req */
if ( ! strcmp ( optarg , " method " ) )
params . split_http_req = split_method ;
else if ( ! strcmp ( optarg , " host " ) )
params . split_http_req = split_host ;
else
{
fprintf ( stderr , " Invalid argument for split-http-req \n " ) ;
exit_clean ( 1 ) ;
}
params . tamper = true ;
break ;
case 24 : /* split-pos */
i = atoi ( optarg ) ;
2023-10-12 12:35:06 +03:00
if ( i > 0 )
2021-03-04 14:30:38 +03:00
params . split_pos = i ;
else
{
fprintf ( stderr , " Invalid argument for split-pos \n " ) ;
exit_clean ( 1 ) ;
}
params . tamper = true ;
break ;
case 25 : /* split-any-protocol */
params . split_any_protocol = true ;
break ;
2023-07-03 15:28:42 +03:00
case 26 : /* disorder */
2024-03-26 11:38:31 +03:00
if ( optarg )
{
if ( ! strcmp ( optarg , " http " ) ) params . disorder_http = true ;
else if ( ! strcmp ( optarg , " tls " ) ) params . disorder_tls = true ;
else
{
fprintf ( stderr , " Invalid argument for disorder \n " ) ;
exit_clean ( 1 ) ;
}
}
else
params . disorder = true ;
2023-07-03 15:28:42 +03:00
save_default_ttl ( ) ;
break ;
2024-03-02 17:53:37 +03:00
case 27 : /* oob */
2024-03-05 14:59:44 +03:00
if ( optarg )
2024-03-26 11:38:31 +03:00
{
if ( ! strcmp ( optarg , " http " ) ) params . oob_http = true ;
else if ( ! strcmp ( optarg , " tls " ) ) params . oob_tls = true ;
else
{
fprintf ( stderr , " Invalid argument for oob \n " ) ;
exit_clean ( 1 ) ;
}
}
else
params . oob = true ;
break ;
case 28 : /* oob-data */
2024-03-05 14:59:44 +03:00
{
size_t l = strlen ( optarg ) ;
unsigned int bt ;
if ( l = = 1 ) params . oob_byte = ( uint8_t ) * optarg ;
else if ( l ! = 4 | | sscanf ( optarg , " 0x%02X " , & bt ) ! = 1 )
{
2024-03-26 11:38:31 +03:00
fprintf ( stderr , " Invalid argument for oob-data \n " ) ;
2024-03-05 14:59:44 +03:00
exit_clean ( 1 ) ;
}
else params . oob_byte = ( uint8_t ) bt ;
}
2024-03-02 17:53:37 +03:00
break ;
2024-03-26 11:38:31 +03:00
case 29 : /* methodspace */
2021-03-04 14:30:38 +03:00
params . methodspace = true ;
params . tamper = true ;
break ;
2024-03-26 11:38:31 +03:00
case 30 : /* methodeol */
2021-03-04 14:30:38 +03:00
params . methodeol = true ;
params . tamper = true ;
break ;
2024-03-26 11:38:31 +03:00
case 31 : /* hosttab */
2021-03-04 14:30:38 +03:00
params . hosttab = true ;
params . tamper = true ;
break ;
2024-03-26 11:38:31 +03:00
case 32 : /* unixeol */
2021-03-04 14:30:38 +03:00
params . unixeol = true ;
params . tamper = true ;
break ;
2024-03-26 11:38:31 +03:00
case 33 : /* tlsrec */
2023-10-12 12:35:06 +03:00
if ( ! strcmp ( optarg , " sni " ) )
params . tlsrec = tlsrec_sni ;
else
{
fprintf ( stderr , " Invalid argument for tlsrec \n " ) ;
exit_clean ( 1 ) ;
}
params . tamper = true ;
break ;
2024-03-26 11:38:31 +03:00
case 34 : /* tlsrec-pos */
2023-10-12 12:35:06 +03:00
if ( ( params . tlsrec_pos = atoi ( optarg ) ) > 0 )
params . tlsrec = tlsrec_pos ;
else
{
fprintf ( stderr , " Invalid argument for tlsrec-pos \n " ) ;
exit_clean ( 1 ) ;
}
params . tamper = true ;
break ;
2024-03-26 11:38:31 +03:00
case 35 : /* hostlist */
2022-07-26 19:15:28 +03:00
if ( ! strlist_add ( & params . hostlist_files , optarg ) )
{
fprintf ( stderr , " strlist_add failed \n " ) ;
exit_clean ( 1 ) ;
}
params . tamper = true ;
break ;
2024-03-26 11:38:31 +03:00
case 36 : /* hostlist-exclude */
2022-07-26 19:15:28 +03:00
if ( ! strlist_add ( & params . hostlist_exclude_files , optarg ) )
{
fprintf ( stderr , " strlist_add failed \n " ) ;
2021-03-04 14:30:38 +03:00
exit_clean ( 1 ) ;
2022-07-26 19:15:28 +03:00
}
2021-03-04 14:30:38 +03:00
params . tamper = true ;
break ;
2024-03-26 11:38:31 +03:00
case 37 : /* hostlist-auto */
2023-10-26 15:12:32 +03:00
if ( * params . hostlist_auto_filename )
{
fprintf ( stderr , " only one auto hostlist is supported \n " ) ;
exit_clean ( 1 ) ;
}
{
FILE * F = fopen ( optarg , " a+t " ) ;
if ( ! F )
{
fprintf ( stderr , " cannot create %s \n " , optarg ) ;
exit_clean ( 1 ) ;
}
bool bGzip = is_gzip ( F ) ;
fclose ( F ) ;
if ( bGzip )
{
fprintf ( stderr , " gzipped auto hostlists are not supported \n " ) ;
exit_clean ( 1 ) ;
}
if ( params . droproot & & chown ( optarg , params . uid , - 1 ) )
fprintf ( stderr , " could not chown %s. auto hostlist file may not be writable after privilege drop \n " , optarg ) ;
}
if ( ! strlist_add ( & params . hostlist_files , optarg ) )
{
fprintf ( stderr , " strlist_add failed \n " ) ;
exit_clean ( 1 ) ;
}
strncpy ( params . hostlist_auto_filename , optarg , sizeof ( params . hostlist_auto_filename ) ) ;
params . hostlist_auto_filename [ sizeof ( params . hostlist_auto_filename ) - 1 ] = ' \0 ' ;
params . tamper = true ; // need to detect blocks and update autohostlist. cannot just slice.
break ;
2024-03-26 11:38:31 +03:00
case 38 : /* hostlist-auto-fail-threshold */
2023-10-26 15:12:32 +03:00
params . hostlist_auto_fail_threshold = ( uint8_t ) atoi ( optarg ) ;
if ( params . hostlist_auto_fail_threshold < 1 | | params . hostlist_auto_fail_threshold > 20 )
{
fprintf ( stderr , " auto hostlist fail threshold must be within 1..20 \n " ) ;
exit_clean ( 1 ) ;
}
break ;
2024-03-26 11:38:31 +03:00
case 39 : /* hostlist-auto-fail-time */
2023-10-26 15:12:32 +03:00
params . hostlist_auto_fail_time = ( uint8_t ) atoi ( optarg ) ;
if ( params . hostlist_auto_fail_time < 1 )
{
fprintf ( stderr , " auto hostlist fail time is not valid \n " ) ;
exit_clean ( 1 ) ;
}
break ;
2024-03-26 11:38:31 +03:00
case 40 : /* hostlist-auto-debug */
2023-11-09 12:08:09 +03:00
{
FILE * F = fopen ( optarg , " a+t " ) ;
if ( ! F )
{
fprintf ( stderr , " cannot create %s \n " , optarg ) ;
exit_clean ( 1 ) ;
}
fclose ( F ) ;
if ( params . droproot & & chown ( optarg , params . uid , - 1 ) )
fprintf ( stderr , " could not chown %s. auto hostlist debug log may not be writable after privilege drop \n " , optarg ) ;
strncpy ( params . hostlist_auto_debuglog , optarg , sizeof ( params . hostlist_auto_debuglog ) ) ;
params . hostlist_auto_debuglog [ sizeof ( params . hostlist_auto_debuglog ) - 1 ] = ' \0 ' ;
}
break ;
2024-03-26 11:38:31 +03:00
case 41 : /* pidfile */
2021-03-04 14:30:38 +03:00
strncpy ( params . pidfile , optarg , sizeof ( params . pidfile ) ) ;
params . pidfile [ sizeof ( params . pidfile ) - 1 ] = ' \0 ' ;
break ;
2024-03-26 11:38:31 +03:00
case 42 :
2021-03-04 14:30:38 +03:00
params . debug = optarg ? atoi ( optarg ) : 1 ;
break ;
2024-03-26 11:38:31 +03:00
case 43 : /* local-rcvbuf */
2021-03-04 14:30:38 +03:00
params . local_rcvbuf = atoi ( optarg ) / 2 ;
break ;
2024-03-26 11:38:31 +03:00
case 44 : /* local-sndbuf */
2021-03-04 14:30:38 +03:00
params . local_sndbuf = atoi ( optarg ) / 2 ;
break ;
2024-03-26 11:38:31 +03:00
case 45 : /* remote-rcvbuf */
2021-03-04 14:30:38 +03:00
params . remote_rcvbuf = atoi ( optarg ) / 2 ;
break ;
2024-03-26 11:38:31 +03:00
case 46 : /* remote-sndbuf */
2021-03-04 14:30:38 +03:00
params . remote_sndbuf = atoi ( optarg ) / 2 ;
break ;
2024-03-26 11:38:31 +03:00
case 47 : /* socks */
2021-03-04 14:30:38 +03:00
params . proxy_type = CONN_TYPE_SOCKS ;
break ;
2024-03-26 11:38:31 +03:00
case 48 : /* no-resolve */
2021-03-04 14:30:38 +03:00
params . no_resolve = true ;
break ;
2024-03-26 11:38:31 +03:00
case 49 : /* skip-nodelay */
2021-03-04 14:30:38 +03:00
params . skip_nodelay = true ;
break ;
2024-03-26 11:38:31 +03:00
case 50 : /* tamper-start */
2024-03-09 14:26:07 +03:00
{
const char * p = optarg ;
if ( * p = = ' n ' )
{
params . tamper_start_n = true ;
p + + ;
}
else
params . tamper_start_n = false ;
params . tamper_start = atoi ( p ) ;
}
2024-03-05 14:59:44 +03:00
break ;
2024-03-26 11:38:31 +03:00
case 51 : /* tamper-cutoff */
2024-03-09 14:26:07 +03:00
{
const char * p = optarg ;
if ( * p = = ' n ' )
{
params . tamper_cutoff_n = true ;
p + + ;
}
else
params . tamper_cutoff_n = false ;
params . tamper_cutoff = atoi ( p ) ;
}
2024-03-05 14:59:44 +03:00
break ;
2022-01-24 12:11:41 +03:00
# if defined(BSD) && !defined(__OpenBSD__) && !defined(__APPLE__)
2024-03-26 11:38:31 +03:00
case 52 : /* enable-pf */
2022-01-23 23:11:11 +03:00
params . pf_enable = true ;
break ;
# endif
2021-03-04 14:30:38 +03:00
}
}
if ( ! params . bind_wait_only & & ! params . port )
{
fprintf ( stderr , " Need port number \n " ) ;
exit_clean ( 1 ) ;
}
if ( params . binds_last < = 0 )
{
params . binds_last = 0 ; // default bind to all
}
if ( params . skip_nodelay & & ( params . split_http_req | | params . split_pos ) )
{
fprintf ( stderr , " Cannot split with --skip-nodelay \n " ) ;
exit_clean ( 1 ) ;
}
2022-07-26 19:15:28 +03:00
2024-03-23 22:57:05 +03:00
if ( * params . hostlist_auto_filename ) params . hostlist_auto_mod_time = file_mod_time ( params . hostlist_auto_filename ) ;
if ( ! LoadIncludeHostLists ( ) )
2022-07-26 19:15:28 +03:00
{
fprintf ( stderr , " Include hostlist load failed \n " ) ;
exit_clean ( 1 ) ;
}
2023-10-26 15:12:32 +03:00
if ( * params . hostlist_auto_filename ) NonEmptyHostlist ( & params . hostlist ) ;
2024-03-23 22:57:05 +03:00
if ( ! LoadExcludeHostLists ( ) )
2022-07-26 19:15:28 +03:00
{
fprintf ( stderr , " Exclude hostlist load failed \n " ) ;
exit_clean ( 1 ) ;
}
2021-03-04 14:30:38 +03:00
}
2021-03-08 22:33:21 +03:00
static bool find_listen_addr ( struct sockaddr_storage * salisten , const char * bindiface , bool bind_if6 , enum bindll bindll , int * if_index )
2021-03-04 14:30:38 +03:00
{
struct ifaddrs * addrs , * a ;
bool found = false ;
2021-03-08 22:33:21 +03:00
bool bindll_want = bindll = = prefer | | bindll = = force ;
2021-03-04 14:30:38 +03:00
if ( getifaddrs ( & addrs ) < 0 )
return false ;
2021-03-07 16:59:53 +03:00
// for ipv6 preference order
// bind-linklocal-1 : link-local,any
// bind-linklocal=0 : private,global,link-local
2021-03-05 21:02:34 +03:00
for ( int pass = 0 ; pass < 3 ; pass + + )
2021-03-04 14:30:38 +03:00
{
a = addrs ;
while ( a )
{
if ( a - > ifa_addr )
{
if ( a - > ifa_addr - > sa_family = = AF_INET & &
* bindiface & & ! bind_if6 & & ! strcmp ( a - > ifa_name , bindiface ) )
{
salisten - > ss_family = AF_INET ;
memcpy ( & ( ( struct sockaddr_in * ) salisten ) - > sin_addr , & ( ( struct sockaddr_in * ) a - > ifa_addr ) - > sin_addr , sizeof ( struct in_addr ) ) ;
found = true ;
goto ex ;
}
// ipv6 links locals are fe80::/10
else if ( a - > ifa_addr - > sa_family = = AF_INET6
& &
2021-03-08 22:33:21 +03:00
( ! * bindiface & & ( bindll = = prefer | | bindll = = force ) | |
2021-03-04 14:30:38 +03:00
* bindiface & & bind_if6 & & ! strcmp ( a - > ifa_name , bindiface ) )
& &
2021-03-08 22:33:21 +03:00
( bindll = = force & & is_linklocal ( ( struct sockaddr_in6 * ) a - > ifa_addr ) | |
bindll = = prefer & & ( pass = = 0 & & is_linklocal ( ( struct sockaddr_in6 * ) a - > ifa_addr ) | | pass = = 1 & & is_private6 ( ( struct sockaddr_in6 * ) a - > ifa_addr ) | | pass = = 2 ) | |
bindll = = no & & ( pass = = 0 & & is_private6 ( ( struct sockaddr_in6 * ) a - > ifa_addr ) | | pass = = 1 & & ! is_linklocal ( ( struct sockaddr_in6 * ) a - > ifa_addr ) ) | |
bindll = = unwanted & & ( pass = = 0 & & is_private6 ( ( struct sockaddr_in6 * ) a - > ifa_addr ) | | pass = = 1 & & ! is_linklocal ( ( struct sockaddr_in6 * ) a - > ifa_addr ) | | pass = = 2 ) )
2021-03-04 14:30:38 +03:00
)
{
salisten - > ss_family = AF_INET6 ;
memcpy ( & ( ( struct sockaddr_in6 * ) salisten ) - > sin6_addr , & ( ( struct sockaddr_in6 * ) a - > ifa_addr ) - > sin6_addr , sizeof ( struct in6_addr ) ) ;
if ( if_index ) * if_index = if_nametoindex ( a - > ifa_name ) ;
found = true ;
goto ex ;
}
}
a = a - > ifa_next ;
}
}
ex :
freeifaddrs ( addrs ) ;
return found ;
}
static bool read_system_maxfiles ( rlim_t * maxfile )
{
# ifdef __linux__
FILE * F ;
int n ;
uintmax_t um ;
if ( ! ( F = fopen ( " /proc/sys/fs/file-max " , " r " ) ) )
return false ;
n = fscanf ( F , " %ju " , & um ) ;
fclose ( F ) ;
if ( ! n ) return false ;
* maxfile = ( rlim_t ) um ;
return true ;
# elif defined(BSD)
int maxfiles , mib [ 2 ] = { CTL_KERN , KERN_MAXFILES } ;
size_t len = sizeof ( maxfiles ) ;
if ( sysctl ( mib , 2 , & maxfiles , & len , NULL , 0 ) = = - 1 )
return false ;
* maxfile = ( rlim_t ) maxfiles ;
return true ;
# else
return false ;
# endif
}
static bool write_system_maxfiles ( rlim_t maxfile )
{
# ifdef __linux__
FILE * F ;
int n ;
if ( ! ( F = fopen ( " /proc/sys/fs/file-max " , " w " ) ) )
return false ;
n = fprintf ( F , " %ju " , ( uintmax_t ) maxfile ) ;
fclose ( F ) ;
return ! ! n ;
# elif defined(BSD)
int maxfiles = ( int ) maxfile , mib [ 2 ] = { CTL_KERN , KERN_MAXFILES } ;
if ( sysctl ( mib , 2 , NULL , 0 , & maxfiles , sizeof ( maxfiles ) ) = = - 1 )
return false ;
return true ;
# else
return false ;
# endif
}
2023-10-13 20:10:46 +03:00
static bool set_ulimit ( void )
2021-03-04 14:30:38 +03:00
{
rlim_t fdmax , fdmin_system , cur_lim = 0 ;
int n ;
if ( ! params . maxfiles )
{
// 4 fds per tamper connection (2 pipe + 2 socket), 6 fds for tcp proxy connection (4 pipe + 2 socket)
// additional 1/2 for unpaired remote legs sending buffers
// 16 for listen_fd, epoll, hostlist, ...
# ifdef SPLICE_PRESENT
2024-03-05 14:59:44 +03:00
fdmax = ( params . tamper & & ! params . tamper_start & & ! params . tamper_cutoff ? 4 : 6 ) * params . maxconn ;
2021-03-04 14:30:38 +03:00
# else
fdmax = 2 * params . maxconn ;
# endif
fdmax + = fdmax / 2 + 16 ;
}
else
fdmax = params . maxfiles ;
fdmin_system = fdmax + 4096 ;
DBGPRINT ( " set_ulimit : fdmax=%ju fdmin_system=%ju " , ( uintmax_t ) fdmax , ( uintmax_t ) fdmin_system )
if ( ! read_system_maxfiles ( & cur_lim ) )
return false ;
DBGPRINT ( " set_ulimit : current system file-max=%ju " , ( uintmax_t ) cur_lim )
if ( cur_lim < fdmin_system )
{
2021-11-12 12:36:25 +03:00
DBGPRINT ( " set_ulimit : system fd limit is too low. trying to increase to %ju " , ( uintmax_t ) fdmin_system )
2021-03-04 14:30:38 +03:00
if ( ! write_system_maxfiles ( fdmin_system ) )
{
fprintf ( stderr , " could not set system-wide max file descriptors \n " ) ;
return false ;
}
}
struct rlimit rlim = { fdmax , fdmax } ;
n = setrlimit ( RLIMIT_NOFILE , & rlim ) ;
if ( n = = - 1 ) perror ( " setrlimit " ) ;
return n ! = - 1 ;
}
struct salisten_s
{
struct sockaddr_storage salisten ;
socklen_t salisten_len ;
int ipv6_only ;
2021-03-05 21:02:34 +03:00
int bind_wait_ip_left ; // how much seconds left from bind_wait_ip
2021-03-04 14:30:38 +03:00
} ;
2021-03-08 22:33:21 +03:00
static const char * bindll_s [ ] = { " unwanted " , " no " , " prefer " , " force " } ;
2021-03-04 14:30:38 +03:00
int main ( int argc , char * argv [ ] )
{
int i , listen_fd [ MAX_BINDS ] , yes = 1 , retval = 0 , if_index , exit_v = EXIT_FAILURE ;
struct salisten_s list [ MAX_BINDS ] ;
2021-03-05 21:02:34 +03:00
char ip_port [ 48 ] ;
2021-03-04 14:30:38 +03:00
srand ( time ( NULL ) ) ;
parse_params ( argc , argv ) ;
if ( params . daemon ) daemonize ( ) ;
if ( * params . pidfile & & ! writepid ( params . pidfile ) )
{
fprintf ( stderr , " could not write pidfile \n " ) ;
goto exiterr ;
}
memset ( & list , 0 , sizeof ( list ) ) ;
for ( i = 0 ; i < = params . binds_last ; i + + ) listen_fd [ i ] = - 1 ;
for ( i = 0 ; i < = params . binds_last ; i + + )
{
2021-03-08 22:33:21 +03:00
VPRINT ( " Prepare bind %d : addr=%s iface=%s v6=%u link_local=%s wait_ifup=%d wait_ip=%d wait_ip_ll=%d " , i ,
params . binds [ i ] . bindaddr , params . binds [ i ] . bindiface , params . binds [ i ] . bind_if6 , bindll_s [ params . binds [ i ] . bindll ] ,
2021-03-04 14:30:38 +03:00
params . binds [ i ] . bind_wait_ifup , params . binds [ i ] . bind_wait_ip , params . binds [ i ] . bind_wait_ip_ll ) ;
if_index = 0 ;
if ( * params . binds [ i ] . bindiface )
{
if ( params . binds [ i ] . bind_wait_ifup > 0 )
{
int sec = 0 ;
if ( ! is_interface_online ( params . binds [ i ] . bindiface ) )
{
printf ( " waiting for ifup of %s for up to %d second(s)... \n " , params . binds [ i ] . bindiface , params . binds [ i ] . bind_wait_ifup ) ;
do
{
sleep ( 1 ) ;
sec + + ;
}
while ( ! is_interface_online ( params . binds [ i ] . bindiface ) & & sec < params . binds [ i ] . bind_wait_ifup ) ;
if ( sec > = params . binds [ i ] . bind_wait_ifup )
{
printf ( " wait timed out \n " ) ;
goto exiterr ;
}
}
}
if ( ! ( if_index = if_nametoindex ( params . binds [ i ] . bindiface ) ) & & params . binds [ i ] . bind_wait_ip < = 0 )
{
printf ( " bad iface %s \n " , params . binds [ i ] . bindiface ) ;
goto exiterr ;
}
}
2021-03-05 21:02:34 +03:00
list [ i ] . bind_wait_ip_left = params . binds [ i ] . bind_wait_ip ;
2021-03-04 14:30:38 +03:00
if ( * params . binds [ i ] . bindaddr )
{
if ( inet_pton ( AF_INET , params . binds [ i ] . bindaddr , & ( ( struct sockaddr_in * ) ( & list [ i ] . salisten ) ) - > sin_addr ) )
{
list [ i ] . salisten . ss_family = AF_INET ;
}
else if ( inet_pton ( AF_INET6 , params . binds [ i ] . bindaddr , & ( ( struct sockaddr_in6 * ) ( & list [ i ] . salisten ) ) - > sin6_addr ) )
{
list [ i ] . salisten . ss_family = AF_INET6 ;
list [ i ] . ipv6_only = 1 ;
}
else
{
printf ( " bad bind addr : %s \n " , params . binds [ i ] . bindaddr ) ;
goto exiterr ;
}
}
else
{
if ( * params . binds [ i ] . bindiface | | params . binds [ i ] . bindll )
{
bool found ;
2021-03-08 22:33:21 +03:00
enum bindll bindll_1 ;
2021-03-04 14:30:38 +03:00
int sec = 0 ;
if ( params . binds [ i ] . bind_wait_ip > 0 )
{
printf ( " waiting for ip on %s for up to %d second(s)... \n " , * params . binds [ i ] . bindiface ? params . binds [ i ] . bindiface : " <any> " , params . binds [ i ] . bind_wait_ip ) ;
2021-03-08 22:33:21 +03:00
if ( params . binds [ i ] . bind_wait_ip_ll > 0 )
{
if ( params . binds [ i ] . bindll = = prefer )
printf ( " during the first %d second(s) accepting only link locals... \n " , params . binds [ i ] . bind_wait_ip_ll ) ;
else if ( params . binds [ i ] . bindll = = unwanted )
printf ( " during the first %d second(s) accepting only ipv6 globals... \n " , params . binds [ i ] . bind_wait_ip_ll ) ;
}
2021-03-04 14:30:38 +03:00
}
for ( ; ; )
{
2021-03-08 22:33:21 +03:00
// allow, no, prefer, force
bindll_1 = ( params . binds [ i ] . bindll = = prefer & & sec < params . binds [ i ] . bind_wait_ip_ll ) ? force :
( params . binds [ i ] . bindll = = unwanted & & sec < params . binds [ i ] . bind_wait_ip_ll ) ? no :
params . binds [ i ] . bindll ;
if ( sec & & sec = = params . binds [ i ] . bind_wait_ip_ll )
{
if ( params . binds [ i ] . bindll = = prefer )
printf ( " link local address wait timeout. now accepting globals \n " ) ;
else if ( params . binds [ i ] . bindll = = unwanted )
printf ( " global ipv6 address wait timeout. now accepting link locals \n " ) ;
}
found = find_listen_addr ( & list [ i ] . salisten , params . binds [ i ] . bindiface , params . binds [ i ] . bind_if6 , bindll_1 , & if_index ) ;
2021-03-04 14:30:38 +03:00
if ( found ) break ;
if ( sec > = params . binds [ i ] . bind_wait_ip )
break ;
sleep ( 1 ) ;
sec + + ;
}
if ( ! found )
{
printf ( " suitable ip address not found \n " ) ;
goto exiterr ;
}
2021-03-05 21:02:34 +03:00
list [ i ] . bind_wait_ip_left = params . binds [ i ] . bind_wait_ip - sec ;
2021-03-04 14:30:38 +03:00
list [ i ] . ipv6_only = 1 ;
}
else
{
list [ i ] . salisten . ss_family = AF_INET6 ;
// leave sin6_addr zero
}
}
if ( list [ i ] . salisten . ss_family = = AF_INET6 )
{
list [ i ] . salisten_len = sizeof ( struct sockaddr_in6 ) ;
( ( struct sockaddr_in6 * ) ( & list [ i ] . salisten ) ) - > sin6_port = htons ( params . port ) ;
if ( is_linklocal ( ( struct sockaddr_in6 * ) ( & list [ i ] . salisten ) ) )
( ( struct sockaddr_in6 * ) ( & list [ i ] . salisten ) ) - > sin6_scope_id = if_index ;
}
else
{
list [ i ] . salisten_len = sizeof ( struct sockaddr_in ) ;
( ( struct sockaddr_in * ) ( & list [ i ] . salisten ) ) - > sin_port = htons ( params . port ) ;
}
}
if ( params . bind_wait_only )
{
2021-03-05 21:02:34 +03:00
printf ( " bind wait condition satisfied \n " ) ;
2021-03-04 14:30:38 +03:00
exit_v = 0 ;
goto exiterr ;
}
if ( params . proxy_type = = CONN_TYPE_TRANSPARENT & & ! redir_init ( ) )
{
fprintf ( stderr , " could not initialize redirector !!! \n " ) ;
goto exiterr ;
}
2023-07-03 15:28:42 +03:00
2021-03-04 14:30:38 +03:00
for ( i = 0 ; i < = params . binds_last ; i + + )
{
2021-03-05 21:02:34 +03:00
if ( params . debug )
{
ntop46_port ( ( struct sockaddr * ) & list [ i ] . salisten , ip_port , sizeof ( ip_port ) ) ;
VPRINT ( " Binding %d to %s " , i , ip_port ) ;
}
2021-03-04 14:30:38 +03:00
if ( ( listen_fd [ i ] = socket ( list [ i ] . salisten . ss_family , SOCK_STREAM , 0 ) ) = = - 1 ) {
2021-03-05 21:02:34 +03:00
perror ( " socket " ) ;
2021-03-04 14:30:38 +03:00
goto exiterr ;
}
2023-07-03 15:28:42 +03:00
2021-03-04 14:30:38 +03:00
# ifndef __OpenBSD__
// in OpenBSD always IPV6_ONLY for wildcard sockets
if ( ( list [ i ] . salisten . ss_family = = AF_INET6 ) & & setsockopt ( listen_fd [ i ] , IPPROTO_IPV6 , IPV6_V6ONLY , & list [ i ] . ipv6_only , sizeof ( int ) ) = = - 1 )
{
2021-03-05 21:02:34 +03:00
perror ( " setsockopt (IPV6_ONLY) " ) ;
2021-03-04 14:30:38 +03:00
goto exiterr ;
}
# endif
if ( setsockopt ( listen_fd [ i ] , SOL_SOCKET , SO_REUSEADDR , & yes , sizeof ( yes ) ) = = - 1 )
{
2021-03-05 21:02:34 +03:00
perror ( " setsockopt (SO_REUSEADDR) " ) ;
2021-03-04 14:30:38 +03:00
goto exiterr ;
}
//Mark that this socket can be used for transparent proxying
//This allows the socket to accept connections for non-local IPs
if ( params . proxy_type = = CONN_TYPE_TRANSPARENT )
{
# ifdef __linux__
if ( setsockopt ( listen_fd [ i ] , SOL_IP , IP_TRANSPARENT , & yes , sizeof ( yes ) ) = = - 1 )
{
2021-03-05 21:02:34 +03:00
perror ( " setsockopt (IP_TRANSPARENT) " ) ;
2021-03-04 14:30:38 +03:00
goto exiterr ;
}
# elif defined(BSD) && defined(SO_BINDANY)
if ( setsockopt ( listen_fd [ i ] , SOL_SOCKET , SO_BINDANY , & yes , sizeof ( yes ) ) = = - 1 )
{
2021-03-05 21:02:34 +03:00
perror ( " setsockopt (SO_BINDANY) " ) ;
2021-03-04 14:30:38 +03:00
goto exiterr ;
}
# endif
}
if ( ! set_socket_buffers ( listen_fd [ i ] , params . local_rcvbuf , params . local_sndbuf ) )
goto exiterr ;
if ( ! params . local_rcvbuf )
{
// HACK : dont know why but if dont set RCVBUF explicitly RCVBUF of accept()-ed socket can be very large. may be linux bug ?
int v ;
socklen_t sz = sizeof ( int ) ;
if ( ! getsockopt ( listen_fd [ i ] , SOL_SOCKET , SO_RCVBUF , & v , & sz ) )
{
v / = 2 ;
setsockopt ( listen_fd [ i ] , SOL_SOCKET , SO_RCVBUF , & v , sizeof ( int ) ) ;
}
}
2021-03-05 21:02:34 +03:00
bool bBindBug = false ;
for ( ; ; )
{
if ( bind ( listen_fd [ i ] , ( struct sockaddr * ) & list [ i ] . salisten , list [ i ] . salisten_len ) = = - 1 )
{
// in linux strange behaviour was observed
// just after ifup and address assignment there's short window when bind() can't bind to addresses got from getifaddrs()
2021-03-07 16:59:53 +03:00
// it does not happen to transparent sockets because they can bind to any non-existend ip
2021-03-05 21:02:34 +03:00
// also only ipv6 seem to be buggy this way
if ( errno = = EADDRNOTAVAIL & & params . proxy_type ! = CONN_TYPE_TRANSPARENT & & list [ i ] . bind_wait_ip_left )
{
if ( ! bBindBug )
{
ntop46_port ( ( struct sockaddr * ) & list [ i ] . salisten , ip_port , sizeof ( ip_port ) ) ;
printf ( " address %s is not available. will retry for %d sec \n " , ip_port , list [ i ] . bind_wait_ip_left ) ;
bBindBug = true ;
}
sleep ( 1 ) ;
list [ i ] . bind_wait_ip_left - - ;
continue ;
}
perror ( " bind " ) ;
goto exiterr ;
}
break ;
2021-03-04 14:30:38 +03:00
}
2021-03-05 21:02:34 +03:00
if ( listen ( listen_fd [ i ] , BACKLOG ) = = - 1 )
{
perror ( " listen " ) ;
2021-03-04 14:30:38 +03:00
goto exiterr ;
}
}
set_ulimit ( ) ;
2022-11-22 17:49:53 +03:00
sec_harden ( ) ;
2021-03-04 14:30:38 +03:00
if ( params . droproot & & ! droproot ( params . uid , params . gid ) )
goto exiterr ;
print_id ( ) ;
//splice() causes the process to receive the SIGPIPE-signal if one part (for
//example a socket) is closed during splice(). I would rather have splice()
//fail and return -1, so blocking SIGPIPE.
if ( block_sigpipe ( ) = = - 1 ) {
fprintf ( stderr , " Could not block SIGPIPE signal \n " ) ;
goto exiterr ;
}
printf ( params . proxy_type = = CONN_TYPE_SOCKS ? " socks mode \n " : " transparent proxy mode \n " ) ;
if ( ! params . tamper ) printf ( " TCP proxy mode (no tampering) \n " ) ;
signal ( SIGHUP , onhup ) ;
2023-10-26 15:12:32 +03:00
signal ( SIGUSR2 , onusr2 ) ;
2021-03-04 14:30:38 +03:00
retval = event_loop ( listen_fd , params . binds_last + 1 ) ;
exit_v = retval < 0 ? EXIT_FAILURE : EXIT_SUCCESS ;
printf ( " Exiting \n " ) ;
exiterr :
redir_close ( ) ;
for ( i = 0 ; i < = params . binds_last ; i + + ) if ( listen_fd [ i ] ! = - 1 ) close ( listen_fd [ i ] ) ;
cleanup_params ( ) ;
return exit_v ;
}