2021-03-04 14:30:38 +03:00
|
|
|
#define _GNU_SOURCE
|
|
|
|
|
|
|
|
#include "tamper.h"
|
|
|
|
#include "params.h"
|
|
|
|
#include "hostlist.h"
|
|
|
|
#include "protocol.h"
|
2023-10-12 12:35:06 +03:00
|
|
|
#include "helpers.h"
|
2021-03-04 14:30:38 +03:00
|
|
|
#include <string.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
|
|
|
|
// pHost points to "Host: ..."
|
2024-06-13 12:17:03 +03:00
|
|
|
static bool find_host(uint8_t **pHost,uint8_t *buf,size_t bs)
|
2021-03-04 14:30:38 +03:00
|
|
|
{
|
|
|
|
if (!*pHost)
|
|
|
|
{
|
|
|
|
*pHost = memmem(buf, bs, "\nHost:", 6);
|
|
|
|
if (*pHost)
|
|
|
|
{
|
|
|
|
(*pHost)++;
|
2021-11-12 12:36:25 +03:00
|
|
|
VPRINT("Found Host: at pos %td",*pHost - buf)
|
2021-03-04 14:30:38 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return !!*pHost;
|
|
|
|
}
|
|
|
|
|
2024-06-13 12:17:03 +03:00
|
|
|
static size_t tls_pos(enum tlspos tpos_type, size_t tpos_pos, const uint8_t *tls, size_t sz, uint8_t type)
|
|
|
|
{
|
|
|
|
size_t elen;
|
|
|
|
const uint8_t *ext;
|
|
|
|
switch(tpos_type)
|
|
|
|
{
|
|
|
|
case tlspos_sni:
|
|
|
|
case tlspos_sniext:
|
|
|
|
if (TLSFindExt(tls,sz,0,&ext,&elen,false))
|
|
|
|
return (tpos_type==tlspos_sni) ? ext-tls+6 : ext-tls+1;
|
2024-06-13 13:23:12 +03:00
|
|
|
// fall through
|
2024-06-13 12:17:03 +03:00
|
|
|
case tlspos_pos:
|
|
|
|
return tpos_pos;
|
2024-06-13 15:35:40 +03:00
|
|
|
default:
|
|
|
|
return 0;
|
2024-06-13 12:17:03 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2021-03-04 14:30:38 +03:00
|
|
|
static const char *http_methods[] = { "GET /","POST /","HEAD /","OPTIONS /","PUT /","DELETE /","CONNECT /","TRACE /",NULL };
|
2023-10-12 12:35:06 +03:00
|
|
|
// segment buffer has at least 5 extra bytes to extend data block
|
2024-03-26 11:38:31 +03:00
|
|
|
void tamper_out(t_ctrack *ctrack, uint8_t *segment,size_t segment_buffer_size,size_t *size, size_t *split_pos, uint8_t *split_flags)
|
2021-03-04 14:30:38 +03:00
|
|
|
{
|
2023-10-12 12:35:06 +03:00
|
|
|
uint8_t *p, *pp, *pHost = NULL;
|
2021-03-04 14:30:38 +03:00
|
|
|
size_t method_len = 0, pos;
|
|
|
|
const char **method;
|
2023-10-26 15:12:32 +03:00
|
|
|
bool bIsHttp = false, bBypass = false, bHaveHost = false, bHostExcluded = false;
|
2021-03-04 14:30:38 +03:00
|
|
|
char bRemovedHostSpace = 0;
|
2023-10-26 15:12:32 +03:00
|
|
|
char *pc, Host[256];
|
2021-03-04 14:30:38 +03:00
|
|
|
|
2023-10-26 15:12:32 +03:00
|
|
|
DBGPRINT("tamper_out")
|
|
|
|
|
2021-03-04 14:30:38 +03:00
|
|
|
*split_pos=0;
|
2024-03-26 11:38:31 +03:00
|
|
|
*split_flags=0;
|
2021-03-04 14:30:38 +03:00
|
|
|
|
|
|
|
for (method = http_methods; *method; method++)
|
|
|
|
{
|
|
|
|
method_len = strlen(*method);
|
|
|
|
if (method_len <= *size && !memcmp(segment, *method, method_len))
|
|
|
|
{
|
|
|
|
bIsHttp = true;
|
|
|
|
method_len -= 2; // "GET /" => "GET"
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (bIsHttp)
|
|
|
|
{
|
|
|
|
VPRINT("Data block looks like http request start : %s", *method)
|
2023-10-26 15:12:32 +03:00
|
|
|
if (!ctrack->l7proto) ctrack->l7proto=HTTP;
|
2021-03-04 14:30:38 +03:00
|
|
|
// cpu saving : we search host only if and when required. we do not research host every time we need its position
|
2022-07-26 19:15:28 +03:00
|
|
|
if ((params.hostlist || params.hostlist_exclude) && find_host(&pHost,segment,*size))
|
2021-03-04 14:30:38 +03:00
|
|
|
{
|
|
|
|
p = pHost + 5;
|
|
|
|
while (p < (segment + *size) && (*p == ' ' || *p == '\t')) p++;
|
|
|
|
pp = p;
|
|
|
|
while (pp < (segment + *size) && (pp - p) < (sizeof(Host) - 1) && *pp != '\r' && *pp != '\n') pp++;
|
|
|
|
memcpy(Host, p, pp - p);
|
|
|
|
Host[pp - p] = '\0';
|
2023-10-26 15:12:32 +03:00
|
|
|
bHaveHost = true;
|
2021-03-04 14:30:38 +03:00
|
|
|
VPRINT("Requested Host is : %s", Host)
|
2023-10-12 12:35:06 +03:00
|
|
|
for(pc = Host; *pc; pc++) *pc=tolower(*pc);
|
2024-03-23 22:57:05 +03:00
|
|
|
bBypass = !HostlistCheck(Host, &bHostExcluded);
|
2021-03-04 14:30:38 +03:00
|
|
|
}
|
|
|
|
if (!bBypass)
|
|
|
|
{
|
|
|
|
if (params.unixeol)
|
|
|
|
{
|
|
|
|
p = pp = segment;
|
|
|
|
while ((p = memmem(p, segment + *size - p, "\r\n", 2)))
|
|
|
|
{
|
|
|
|
*p = '\n'; p++;
|
|
|
|
memmove(p, p + 1, segment + *size - p - 1);
|
|
|
|
(*size)--;
|
|
|
|
if (pp == (p - 1))
|
|
|
|
{
|
|
|
|
// probably end of http headers
|
2021-11-12 12:36:25 +03:00
|
|
|
VPRINT("Found double EOL at pos %td. Stop replacing.", pp - segment)
|
2021-03-04 14:30:38 +03:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
pp = p;
|
|
|
|
}
|
|
|
|
pHost = NULL; // invalidate
|
|
|
|
}
|
|
|
|
if (params.methodeol && (*size+1+!params.unixeol)<=segment_buffer_size)
|
|
|
|
{
|
|
|
|
VPRINT("Adding EOL before method")
|
|
|
|
if (params.unixeol)
|
|
|
|
{
|
|
|
|
memmove(segment + 1, segment, *size);
|
|
|
|
(*size)++;;
|
|
|
|
segment[0] = '\n';
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
memmove(segment + 2, segment, *size);
|
|
|
|
*size += 2;
|
|
|
|
segment[0] = '\r';
|
|
|
|
segment[1] = '\n';
|
|
|
|
}
|
|
|
|
pHost = NULL; // invalidate
|
|
|
|
}
|
|
|
|
if (params.methodspace && *size<segment_buffer_size)
|
|
|
|
{
|
|
|
|
// we only work with data blocks looking as HTTP query, so method is at the beginning
|
|
|
|
VPRINT("Adding extra space after method")
|
|
|
|
p = segment + method_len + 1;
|
|
|
|
pos = method_len + 1;
|
|
|
|
memmove(p + 1, p, *size - pos);
|
|
|
|
*p = ' '; // insert extra space
|
|
|
|
(*size)++; // block will grow by 1 byte
|
|
|
|
if (pHost) pHost++; // Host: position will move by 1 byte
|
|
|
|
}
|
|
|
|
if ((params.hostdot || params.hosttab) && *size<segment_buffer_size && find_host(&pHost,segment,*size))
|
|
|
|
{
|
|
|
|
p = pHost + 5;
|
|
|
|
while (p < (segment + *size) && *p != '\r' && *p != '\n') p++;
|
|
|
|
if (p < (segment + *size))
|
|
|
|
{
|
|
|
|
pos = p - segment;
|
|
|
|
VPRINT("Adding %s to host name at pos %zu", params.hostdot ? "dot" : "tab", pos)
|
|
|
|
memmove(p + 1, p, *size - pos);
|
|
|
|
*p = params.hostdot ? '.' : '\t'; // insert dot or tab
|
|
|
|
(*size)++; // block will grow by 1 byte
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (params.domcase && find_host(&pHost,segment,*size))
|
|
|
|
{
|
|
|
|
p = pHost + 5;
|
|
|
|
pos = p - segment;
|
|
|
|
VPRINT("Mixing domain case at pos %zu",pos)
|
|
|
|
for (; p < (segment + *size) && *p != '\r' && *p != '\n'; p++)
|
|
|
|
*p = (((size_t)p) & 1) ? tolower(*p) : toupper(*p);
|
|
|
|
}
|
|
|
|
if (params.hostnospace && find_host(&pHost,segment,*size) && (pHost+5)<(segment+*size) && pHost[5] == ' ')
|
|
|
|
{
|
|
|
|
p = pHost + 6;
|
|
|
|
pos = p - segment;
|
|
|
|
VPRINT("Removing space before host name at pos %zu", pos)
|
|
|
|
memmove(p - 1, p, *size - pos);
|
|
|
|
(*size)--; // block will shrink by 1 byte
|
|
|
|
bRemovedHostSpace = 1;
|
|
|
|
}
|
|
|
|
if (params.hostcase && find_host(&pHost,segment,*size))
|
|
|
|
{
|
2021-11-12 12:36:25 +03:00
|
|
|
VPRINT("Changing 'Host:' => '%c%c%c%c:' at pos %td", params.hostspell[0], params.hostspell[1], params.hostspell[2], params.hostspell[3], pHost - segment)
|
2021-03-04 14:30:38 +03:00
|
|
|
memcpy(pHost, params.hostspell, 4);
|
|
|
|
}
|
|
|
|
if (params.hostpad && find_host(&pHost,segment,*size))
|
|
|
|
{
|
|
|
|
// add : XXXXX: <padding?[\r\n|\n]
|
|
|
|
char s[8];
|
|
|
|
size_t hsize = params.unixeol ? 8 : 9;
|
|
|
|
size_t hostpad = params.hostpad<hsize ? hsize : params.hostpad;
|
|
|
|
|
|
|
|
if ((hsize+*size)>segment_buffer_size)
|
|
|
|
VPRINT("could not add host padding : buffer too small")
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if ((hostpad+*size)>segment_buffer_size)
|
|
|
|
{
|
|
|
|
hostpad=segment_buffer_size-*size;
|
|
|
|
VPRINT("host padding reduced to %zu bytes : buffer too small", hostpad)
|
|
|
|
}
|
|
|
|
else
|
|
|
|
VPRINT("host padding with %zu bytes", hostpad)
|
|
|
|
|
|
|
|
p = pHost;
|
|
|
|
pos = p - segment;
|
|
|
|
memmove(p + hostpad, p, *size - pos);
|
|
|
|
(*size) += hostpad;
|
|
|
|
while(hostpad)
|
|
|
|
{
|
|
|
|
#define MAX_HDR_SIZE 2048
|
|
|
|
size_t padsize = hostpad > hsize ? hostpad-hsize : 0;
|
|
|
|
if (padsize>MAX_HDR_SIZE) padsize=MAX_HDR_SIZE;
|
|
|
|
// if next header would be too small then add extra padding to the current one
|
|
|
|
if ((hostpad-padsize-hsize)<hsize) padsize+=hostpad-padsize-hsize;
|
|
|
|
snprintf(s,sizeof(s),"%c%04x: ", 'a'+rand()%('z'-'a'+1), rand() & 0xFFFF);
|
|
|
|
memcpy(p,s,7);
|
|
|
|
p+=7;
|
|
|
|
memset(p,'a'+rand()%('z'-'a'+1),padsize);
|
|
|
|
p+=padsize;
|
|
|
|
if (params.unixeol)
|
|
|
|
*p++='\n';
|
|
|
|
else
|
|
|
|
{
|
|
|
|
*p++='\r';
|
|
|
|
*p++='\n';
|
|
|
|
}
|
|
|
|
hostpad-=hsize+padsize;
|
|
|
|
}
|
|
|
|
pHost = NULL; // invalidate
|
|
|
|
}
|
|
|
|
}
|
|
|
|
switch (params.split_http_req)
|
|
|
|
{
|
2024-06-13 12:17:03 +03:00
|
|
|
case httpreqpos_method:
|
2021-03-04 14:30:38 +03:00
|
|
|
*split_pos = method_len - 1 + params.methodeol + (params.methodeol && !params.unixeol);
|
|
|
|
break;
|
2024-06-13 12:17:03 +03:00
|
|
|
case httpreqpos_host:
|
2021-03-04 14:30:38 +03:00
|
|
|
if (find_host(&pHost,segment,*size))
|
|
|
|
*split_pos = pHost + 6 - bRemovedHostSpace - segment;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
if (params.split_pos < *size) *split_pos = params.split_pos;
|
|
|
|
}
|
2024-03-26 11:38:31 +03:00
|
|
|
if (params.disorder_http) *split_flags |= SPLIT_FLAG_DISORDER;
|
|
|
|
if (params.oob_http) *split_flags |= SPLIT_FLAG_OOB;
|
2021-03-04 14:30:38 +03:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
VPRINT("Not acting on this request")
|
|
|
|
}
|
|
|
|
}
|
2023-12-19 13:40:28 +03:00
|
|
|
else if (IsTLSClientHello(segment,*size,false))
|
2021-03-04 14:30:38 +03:00
|
|
|
{
|
2024-06-13 12:17:03 +03:00
|
|
|
size_t tpos=0,spos=0;
|
2023-10-12 12:35:06 +03:00
|
|
|
const uint8_t *ext;
|
2023-10-26 15:12:32 +03:00
|
|
|
|
|
|
|
if (!ctrack->l7proto) ctrack->l7proto=TLS;
|
2021-03-04 14:30:38 +03:00
|
|
|
|
2023-10-12 12:35:06 +03:00
|
|
|
VPRINT("packet contains TLS ClientHello")
|
|
|
|
// we need host only if hostlist is present
|
2023-12-19 13:40:28 +03:00
|
|
|
if ((params.hostlist || params.hostlist_exclude) && TLSHelloExtractHost((uint8_t*)segment,*size,Host,sizeof(Host),false))
|
2023-10-12 12:35:06 +03:00
|
|
|
{
|
2023-10-26 15:12:32 +03:00
|
|
|
VPRINT("hostname: %s",Host)
|
|
|
|
bHaveHost = true;
|
2024-03-23 22:57:05 +03:00
|
|
|
bBypass = !HostlistCheck(Host, &bHostExcluded);
|
2021-03-04 14:30:38 +03:00
|
|
|
}
|
2023-10-26 15:12:32 +03:00
|
|
|
if (bBypass)
|
2023-10-12 12:35:06 +03:00
|
|
|
{
|
2023-10-26 15:12:32 +03:00
|
|
|
VPRINT("Not acting on this request")
|
2023-10-12 12:35:06 +03:00
|
|
|
}
|
2023-10-26 15:12:32 +03:00
|
|
|
else
|
2023-10-12 12:35:06 +03:00
|
|
|
{
|
2024-06-13 12:17:03 +03:00
|
|
|
spos = tls_pos(params.split_tls, params.split_pos, segment, *size, 0);
|
|
|
|
|
|
|
|
if ((5+*size)<=segment_buffer_size)
|
2023-10-12 12:35:06 +03:00
|
|
|
{
|
2024-06-13 12:23:13 +03:00
|
|
|
tpos = tls_pos(params.tlsrec, params.tlsrec_pos+5, segment, *size, 0);
|
2024-06-13 12:17:03 +03:00
|
|
|
if (tpos>5)
|
2023-10-26 15:12:32 +03:00
|
|
|
{
|
2024-06-13 12:17:03 +03:00
|
|
|
// construct 2 TLS records from one
|
|
|
|
uint16_t l = pntoh16(segment+3); // length
|
|
|
|
if (l>=2)
|
|
|
|
{
|
|
|
|
// length is checked in IsTLSClientHello and cannot exceed buffer size
|
|
|
|
if ((tpos-5)>=l) tpos=5+1;
|
|
|
|
VPRINT("making 2 TLS records at pos %zu",tpos)
|
|
|
|
memmove(segment+tpos+5,segment+tpos,*size-tpos);
|
|
|
|
segment[tpos] = segment[0];
|
|
|
|
segment[tpos+1] = segment[1];
|
|
|
|
segment[tpos+2] = segment[2];
|
|
|
|
phton16(segment+tpos+3,l-(tpos-5));
|
|
|
|
phton16(segment+3,tpos-5);
|
|
|
|
*size += 5;
|
|
|
|
// split pos present and it is not before tlsrec split. increase split pos by tlsrec header size (5 bytes)
|
|
|
|
if (spos && spos>=tpos) spos+=5;
|
|
|
|
}
|
2023-10-26 15:12:32 +03:00
|
|
|
}
|
2023-10-12 12:35:06 +03:00
|
|
|
}
|
2024-06-13 12:17:03 +03:00
|
|
|
|
|
|
|
if (spos && spos < *size)
|
|
|
|
{
|
|
|
|
VPRINT("split pos %zu",spos);
|
|
|
|
*split_pos = spos;
|
|
|
|
}
|
2024-03-26 11:38:31 +03:00
|
|
|
|
|
|
|
if (params.disorder_tls) *split_flags |= SPLIT_FLAG_DISORDER;
|
|
|
|
if (params.oob_tls) *split_flags |= SPLIT_FLAG_OOB;
|
2023-10-26 15:12:32 +03:00
|
|
|
}
|
2021-03-04 14:30:38 +03:00
|
|
|
}
|
2023-10-26 15:12:32 +03:00
|
|
|
else if (params.split_any_protocol && params.split_pos < *size)
|
2023-10-12 12:35:06 +03:00
|
|
|
*split_pos = params.split_pos;
|
2023-10-26 15:12:32 +03:00
|
|
|
|
2024-04-02 18:14:03 +03:00
|
|
|
if (bHaveHost && bBypass && !bHostExcluded && *params.hostlist_auto_filename)
|
2023-10-26 15:12:32 +03:00
|
|
|
{
|
|
|
|
DBGPRINT("tamper_out put hostname : %s", Host)
|
2024-04-02 18:14:03 +03:00
|
|
|
if (ctrack->hostname) free(ctrack->hostname);
|
2023-10-26 15:12:32 +03:00
|
|
|
ctrack->hostname=strdup(Host);
|
|
|
|
}
|
2024-03-26 11:38:31 +03:00
|
|
|
if (params.disorder) *split_flags |= SPLIT_FLAG_DISORDER;
|
|
|
|
if (params.oob) *split_flags |= SPLIT_FLAG_OOB;
|
2023-10-26 15:12:32 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void auto_hostlist_failed(const char *hostname)
|
|
|
|
{
|
|
|
|
hostfail_pool *fail_counter;
|
|
|
|
|
|
|
|
fail_counter = HostFailPoolFind(params.hostlist_auto_fail_counters, hostname);
|
|
|
|
if (!fail_counter)
|
|
|
|
{
|
|
|
|
fail_counter = HostFailPoolAdd(¶ms.hostlist_auto_fail_counters, hostname, params.hostlist_auto_fail_time);
|
|
|
|
if (!fail_counter)
|
|
|
|
{
|
|
|
|
fprintf(stderr, "HostFailPoolAdd: out of memory\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
fail_counter->counter++;
|
|
|
|
VPRINT("auto hostlist : %s : fail counter %d/%d", hostname, fail_counter->counter, params.hostlist_auto_fail_threshold);
|
2023-11-09 12:08:09 +03:00
|
|
|
HOSTLIST_DEBUGLOG_APPEND("%s : fail counter %d/%d", hostname, fail_counter->counter, params.hostlist_auto_fail_threshold);
|
2023-10-26 15:12:32 +03:00
|
|
|
if (fail_counter->counter >= params.hostlist_auto_fail_threshold)
|
|
|
|
{
|
|
|
|
VPRINT("auto hostlist : fail threshold reached. adding %s to auto hostlist", hostname);
|
|
|
|
HostFailPoolDel(¶ms.hostlist_auto_fail_counters, fail_counter);
|
2023-10-26 16:27:52 +03:00
|
|
|
|
|
|
|
VPRINT("auto hostlist : rechecking %s to avoid duplicates", hostname);
|
|
|
|
bool bExcluded=false;
|
2024-03-23 22:57:05 +03:00
|
|
|
if (!HostlistCheck(hostname, &bExcluded) && !bExcluded)
|
2023-10-26 15:12:32 +03:00
|
|
|
{
|
2023-10-26 16:27:52 +03:00
|
|
|
VPRINT("auto hostlist : adding %s", hostname);
|
2023-11-09 12:08:09 +03:00
|
|
|
HOSTLIST_DEBUGLOG_APPEND("%s : adding", hostname);
|
2023-10-26 16:27:52 +03:00
|
|
|
if (!StrPoolAddStr(¶ms.hostlist, hostname))
|
|
|
|
{
|
|
|
|
fprintf(stderr, "StrPoolAddStr out of memory\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (!append_to_list_file(params.hostlist_auto_filename, hostname))
|
|
|
|
{
|
|
|
|
perror("write to auto hostlist:");
|
|
|
|
return;
|
|
|
|
}
|
2024-03-23 22:57:05 +03:00
|
|
|
params.hostlist_auto_mod_time = file_mod_time(params.hostlist_auto_filename);
|
2023-10-26 15:12:32 +03:00
|
|
|
}
|
2023-10-26 16:27:52 +03:00
|
|
|
else
|
2023-11-09 12:08:09 +03:00
|
|
|
{
|
2024-04-02 18:14:03 +03:00
|
|
|
VPRINT("auto hostlist : NOT adding %s", hostname);
|
2023-11-09 12:08:09 +03:00
|
|
|
HOSTLIST_DEBUGLOG_APPEND("%s : NOT adding, duplicate detected", hostname);
|
|
|
|
}
|
2023-10-26 15:12:32 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void tamper_in(t_ctrack *ctrack, uint8_t *segment,size_t segment_buffer_size,size_t *size)
|
|
|
|
{
|
|
|
|
bool bFail=false;
|
|
|
|
|
|
|
|
DBGPRINT("tamper_in hostname=%s", ctrack->hostname)
|
|
|
|
|
2024-04-03 22:21:17 +03:00
|
|
|
if (*params.hostlist_auto_filename)
|
2023-10-26 15:12:32 +03:00
|
|
|
{
|
2024-04-03 22:21:17 +03:00
|
|
|
HostFailPoolPurgeRateLimited(¶ms.hostlist_auto_fail_counters);
|
|
|
|
|
|
|
|
if (ctrack->l7proto==HTTP && ctrack->hostname)
|
2023-10-26 15:12:32 +03:00
|
|
|
{
|
2024-04-03 22:21:17 +03:00
|
|
|
if (IsHttpReply(segment,*size))
|
2023-11-09 12:08:09 +03:00
|
|
|
{
|
2024-04-03 22:21:17 +03:00
|
|
|
VPRINT("incoming HTTP reply detected for hostname %s", ctrack->hostname);
|
|
|
|
bFail = HttpReplyLooksLikeDPIRedirect(segment, *size, ctrack->hostname);
|
|
|
|
if (bFail)
|
|
|
|
{
|
|
|
|
VPRINT("redirect to another domain detected. possibly DPI redirect.")
|
|
|
|
HOSTLIST_DEBUGLOG_APPEND("%s : redirect to another domain", ctrack->hostname);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
VPRINT("local or in-domain redirect detected. it's not a DPI redirect.")
|
2023-11-09 12:08:09 +03:00
|
|
|
}
|
2023-10-26 15:12:32 +03:00
|
|
|
else
|
2024-04-03 22:21:17 +03:00
|
|
|
{
|
|
|
|
// received not http reply. do not monitor this connection anymore
|
|
|
|
VPRINT("incoming unknown HTTP data detected for hostname %s", ctrack->hostname);
|
|
|
|
}
|
|
|
|
if (bFail)
|
|
|
|
auto_hostlist_failed(ctrack->hostname);
|
|
|
|
|
|
|
|
}
|
2023-10-26 15:12:32 +03:00
|
|
|
}
|
|
|
|
ctrack->bTamperInCutoff = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void rst_in(t_ctrack *ctrack)
|
|
|
|
{
|
|
|
|
DBGPRINT("rst_in hostname=%s", ctrack->hostname)
|
|
|
|
|
2024-04-02 18:14:03 +03:00
|
|
|
if (!*params.hostlist_auto_filename) return;
|
|
|
|
|
2023-10-26 15:12:32 +03:00
|
|
|
HostFailPoolPurgeRateLimited(¶ms.hostlist_auto_fail_counters);
|
|
|
|
|
|
|
|
if (!ctrack->bTamperInCutoff && ctrack->hostname)
|
|
|
|
{
|
|
|
|
VPRINT("incoming RST detected for hostname %s", ctrack->hostname);
|
2023-11-09 12:08:09 +03:00
|
|
|
HOSTLIST_DEBUGLOG_APPEND("%s : incoming RST", ctrack->hostname);
|
2023-10-26 15:12:32 +03:00
|
|
|
auto_hostlist_failed(ctrack->hostname);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
void hup_out(t_ctrack *ctrack)
|
|
|
|
{
|
|
|
|
DBGPRINT("hup_out hostname=%s", ctrack->hostname)
|
|
|
|
|
2024-04-02 18:14:03 +03:00
|
|
|
if (!*params.hostlist_auto_filename) return;
|
|
|
|
|
2023-10-26 15:12:32 +03:00
|
|
|
HostFailPoolPurgeRateLimited(¶ms.hostlist_auto_fail_counters);
|
|
|
|
|
|
|
|
if (!ctrack->bTamperInCutoff && ctrack->hostname)
|
|
|
|
{
|
|
|
|
// local leg dropped connection after first request. probably due to timeout.
|
|
|
|
VPRINT("local leg closed connection after first request (timeout ?). hostname: %s", ctrack->hostname);
|
2023-11-09 12:08:09 +03:00
|
|
|
HOSTLIST_DEBUGLOG_APPEND("%s : client closed connection without server reply", ctrack->hostname);
|
2023-10-26 15:12:32 +03:00
|
|
|
auto_hostlist_failed(ctrack->hostname);
|
|
|
|
}
|
2021-03-04 14:30:38 +03:00
|
|
|
}
|