1
0
mirror of https://github.com/rofl0r/proxychains-ng synced 2026-05-14 17:42:36 +08:00

Compare commits

...

16 Commits

8 changed files with 143 additions and 60 deletions
+2 -1
View File
@@ -30,6 +30,7 @@ INC =
PIC = -fPIC PIC = -fPIC
AR = $(CROSS_COMPILE)ar AR = $(CROSS_COMPILE)ar
RANLIB = $(CROSS_COMPILE)ranlib RANLIB = $(CROSS_COMPILE)ranlib
SOCKET_LIBS =
LDSO_SUFFIX = so LDSO_SUFFIX = so
LD_SET_SONAME = -Wl,-soname= LD_SET_SONAME = -Wl,-soname=
@@ -82,7 +83,7 @@ src/version.o: src/version.h
$(LDSO_PATHNAME): $(LOBJS) $(LDSO_PATHNAME): $(LOBJS)
$(CC) $(LDFLAGS) $(LD_SET_SONAME)$(LDSO_PATHNAME) $(USER_LDFLAGS) \ $(CC) $(LDFLAGS) $(LD_SET_SONAME)$(LDSO_PATHNAME) $(USER_LDFLAGS) \
-shared -o $@ $(LOBJS) -shared -o $@ $(LOBJS) $(SOCKET_LIBS)
$(ALL_TOOLS): $(OBJS) $(ALL_TOOLS): $(OBJS)
$(CC) src/main.o src/common.o $(USER_LDFLAGS) -o $(PXCHAINS) $(CC) src/main.o src/common.o $(USER_LDFLAGS) -o $(PXCHAINS)
+7 -1
View File
@@ -1,4 +1,4 @@
ProxyChains-NG ver 4.12 README ProxyChains-NG ver 4.13 README
============================= =============================
ProxyChains is a UNIX program, that hooks network-related libc functions ProxyChains is a UNIX program, that hooks network-related libc functions
@@ -52,6 +52,12 @@ ProxyChains-NG ver 4.12 README
Changelog: Changelog:
---------- ----------
Version 4.13
- fix robustness of DNS lookup thread and a segfault
- fix socks5 user/pass auth on non-conforming servers
- fix memory leak
- add support for Solaris
Version 4.12 Version 4.12
- fix several build issues - fix several build issues
- for MAC - for MAC
+1 -1
View File
@@ -1 +1 @@
4.12 4.13
Vendored
+62 -29
View File
@@ -14,22 +14,6 @@ done
set +C set +C
trap 'rm "$tmpc"' EXIT INT QUIT TERM HUP trap 'rm "$tmpc"' EXIT INT QUIT TERM HUP
ismac() {
uname -s | grep Darwin >/dev/null
}
isx86_64() {
uname -m | grep -i X86_64 >/dev/null
}
isbsd() {
uname -s | grep BSD >/dev/null
}
isopenbsd() {
uname -s | grep OpenBSD >/dev/null
}
check_compile() { check_compile() {
printf "checking %s ... " "$1" printf "checking %s ... " "$1"
printf "$3" > "$tmpc" printf "$3" > "$tmpc"
@@ -62,6 +46,19 @@ check_compile_run() {
return $res return $res
} }
check_link_silent() {
printf "$2" > "$tmpc"
$CC $OUR_CPPFLAGS $CPPFLAGS $1 $CFLAGS "$tmpc" -o /dev/null >/dev/null 2>&1
}
check_link() {
printf "checking %s ... " "$1"
local res=0
check_link_silent "$2" "$3" || res=1
test x$res = x0 && printf "yes\n" || printf "no\n"
return $res
}
usage() { usage() {
echo "supported arguments" echo "supported arguments"
echo "--prefix=/path default: $prefix" echo "--prefix=/path default: $prefix"
@@ -73,7 +70,7 @@ usage() {
echo "--ignore-cve default: no" echo "--ignore-cve default: no"
echo " if set to yes ignores CVE-2015-3887 and makes it possible" echo " if set to yes ignores CVE-2015-3887 and makes it possible"
echo " to preload from current dir (insecure)" echo " to preload from current dir (insecure)"
ismac && isx86_64 && echo "--fat-binary : build for both i386 and x86_64 architectures on 64-bit Macs" echo "--fat-binary : build for both i386 and x86_64 architectures on 64-bit Macs"
echo "--help : show this text" echo "--help : show this text"
exit 1 exit 1
} }
@@ -133,20 +130,40 @@ if [ -z "$CC" ] ; then
CC=cc CC=cc
fi fi
check_compile 'whether netinet/in.h defines s6_addr16' "" \ echo > config.mak
'#include <netinet/in.h>\nint main(int a, char**c){struct in6_addr x={.s6_addr32[0]=a};return x.s6_addr16[0]; }' \
|| { bsd_detected=false
check_compile 'whether netinet/in.h defines __u6_addr.__u6_addr16' \ isbsd() {
'-Ds6_addr16=__u6_addr.__u6_addr16 -Ds6_addr32=__u6_addr.__u6_addr32' \ $bsd_detected
'#include <netinet/in.h>\nint main(int a, char**c){struct in6_addr x={.s6_addr32[0]=a};return x.s6_addr16[0]; }' }
mac_detected=false
ismac() {
$mac_detected
}
mac_64=false
ismac64() {
$mac_64
}
solaris_detected=false
issolaris() {
$solaris_detected
} }
check_define __OpenBSD__ && \ check_define __APPLE__ && {
mac_detected=true
check_define __x86_64__ && mac_64=true
}
check_define __FreeBSD__ && bsd_detected=true
check_define __OpenBSD__ && {
bsd_detected=true
echo "CFLAGS+=-DIS_OPENBSD">>config.mak
check_compile_run 'whether OpenBSDs fclose() (illegally) calls close()' \ check_compile_run 'whether OpenBSDs fclose() (illegally) calls close()' \
'#include <stdio.h>\n#include<stdlib.h>\nint close(int x){exit(0);}int main(){fclose(stdin);return 1;}' && \ '#include <stdio.h>\n#include<stdlib.h>\nint close(int x){exit(0);}int main(){fclose(stdin);return 1;}' && \
OUR_CPPFLAGS="$OUR_CPPFLAGS -DBROKEN_FCLOSE" OUR_CPPFLAGS="$OUR_CPPFLAGS -DBROKEN_FCLOSE"
}
check_define __sun && check_define __SVR4 && solaris_detected=true
echo "CC=$CC">config.mak echo "CC=$CC">>config.mak
[ -z "$CPPFLAGS" ] || echo "CPPFLAGS=$CPPFLAGS">>config.mak [ -z "$CPPFLAGS" ] || echo "CPPFLAGS=$CPPFLAGS">>config.mak
[ -z "$CFLAGS" ] || echo "USER_CFLAGS=$CFLAGS">>config.mak [ -z "$CFLAGS" ] || echo "USER_CFLAGS=$CFLAGS">>config.mak
[ -z "$LDFLAGS" ] || echo "USER_LDFLAGS=$LDFLAGS">>config.mak [ -z "$LDFLAGS" ] || echo "USER_LDFLAGS=$LDFLAGS">>config.mak
@@ -158,22 +175,38 @@ echo includedir=$includedir>>config.mak
echo sysconfdir=$sysconfdir>>config.mak echo sysconfdir=$sysconfdir>>config.mak
[ "$ignore_cve" = "no" ] && echo "CPPFLAGS+= -DSUPER_SECURE">>config.mak [ "$ignore_cve" = "no" ] && echo "CPPFLAGS+= -DSUPER_SECURE">>config.mak
[ -z "$OUR_CPPFLAGS" ] || echo "CPPFLAGS+= $OUR_CPPFLAGS" >>config.mak [ -z "$OUR_CPPFLAGS" ] || echo "CPPFLAGS+= $OUR_CPPFLAGS" >>config.mak
check_link "whether we can use -Wl,--no-as-needed" "-Wl,--no-as-needed" \
"int main() { return 0; }" || echo NO_AS_NEEDED= >> config.mak
LD_SONAME_FLAG=
printf "checking what's the option to use in linker to set library name ... "
for o in --soname -h -soname -install_name; do
check_link_silent "-shared -Wl,$o,libconftest.so" "void test_func(int a) {}" && LD_SONAME_FLAG=$o && break
done
if [ -z "$LD_SONAME_FLAG" ]; then
printf '\ncannot find an option to set library name\n'
exit 1
fi
echo "$LD_SONAME_FLAG"
echo "LD_SET_SONAME = -Wl,$LD_SONAME_FLAG," >> config.mak
make_cmd=make make_cmd=make
if ismac ; then if ismac ; then
echo NO_AS_NEEDED=>>config.mak
echo LDSO_SUFFIX=dylib>>config.mak echo LDSO_SUFFIX=dylib>>config.mak
echo MAC_CFLAGS+=-DIS_MAC=1>>config.mak echo MAC_CFLAGS+=-DIS_MAC=1>>config.mak
if isx86_64 && [ "$fat_binary" = 1 ] ; then if ismac64 && [ "$fat_binary" = 1 ] ; then
echo "Configuring a fat binary for i386 and x86_64" echo "Configuring a fat binary for i386 and x86_64"
echo MAC_CFLAGS+=-arch i386 -arch x86_64>>config.mak echo MAC_CFLAGS+=-arch i386 -arch x86_64>>config.mak
echo LDFLAGS+=-arch i386 -arch x86_64>>config.mak echo LDFLAGS+=-arch i386 -arch x86_64>>config.mak
fi fi
echo LD_SET_SONAME=-Wl,-install_name,>>config.mak
elif isbsd ; then elif isbsd ; then
echo LIBDL=>>config.mak echo LIBDL=>>config.mak
echo "CFLAGS+=-DIS_BSD">>config.mak echo "CFLAGS+=-DIS_BSD">>config.mak
isopenbsd && echo "CFLAGS+=-DIS_OPENBSD">>config.mak
make_cmd=gmake make_cmd=gmake
elif issolaris; then
echo "CFLAGS+=-DIS_SOLARIS -D__EXTENSIONS__" >> config.mak
echo "SOCKET_LIBS=-lsocket -lnsl" >> config.mak
fi fi
echo "Done, now run $make_cmd && $make_cmd install" echo "Done, now run $make_cmd && $make_cmd install"
+33 -13
View File
@@ -1,3 +1,8 @@
#undef _GNU_SOURCE
#define _GNU_SOURCE
#undef _POSIX_C_SOURCE
#define _DARWIN_C_SOURCE
#include <limits.h>
#include <pthread.h> #include <pthread.h>
#include <unistd.h> #include <unistd.h>
#include <fcntl.h> #include <fcntl.h>
@@ -9,6 +14,7 @@
#include <stdint.h> #include <stdint.h>
#include <stddef.h> #include <stddef.h>
#include <errno.h> #include <errno.h>
#include <sys/mman.h>
#include "allocator_thread.h" #include "allocator_thread.h"
#include "debug.h" #include "debug.h"
#include "ip_type.h" #include "ip_type.h"
@@ -34,9 +40,8 @@ static void *dumpstring(char* s, size_t len) {
return p; return p;
} }
pthread_mutex_t internal_ips_lock; static pthread_mutex_t *internal_ips_lock;
internal_ip_lookup_table *internal_ips = NULL; static internal_ip_lookup_table *internal_ips;
internal_ip_lookup_table internal_ips_buf;
uint32_t index_from_internal_ip(ip_type4 internalip) { uint32_t index_from_internal_ip(ip_type4 internalip) {
PFUNC(); PFUNC();
@@ -151,7 +156,6 @@ struct at_msghdr {
}; };
static pthread_t allocator_thread; static pthread_t allocator_thread;
static pthread_attr_t allocator_thread_attr;
int req_pipefd[2]; int req_pipefd[2];
int resp_pipefd[2]; int resp_pipefd[2];
@@ -276,7 +280,7 @@ static void* threadfunc(void* x) {
ip_type4 at_get_ip_for_host(char* host, size_t len) { ip_type4 at_get_ip_for_host(char* host, size_t len) {
ip_type4 readbuf; ip_type4 readbuf;
MUTEX_LOCK(&internal_ips_lock); MUTEX_LOCK(internal_ips_lock);
if(len > MSG_LEN_MAX) goto inv; if(len > MSG_LEN_MAX) goto inv;
struct at_msghdr msg = {.msgtype = ATM_GETIP, .datalen = len + 1 }; struct at_msghdr msg = {.msgtype = ATM_GETIP, .datalen = len + 1 };
if(sendmessage(ATD_SERVER, &msg, host) && if(sendmessage(ATD_SERVER, &msg, host) &&
@@ -285,19 +289,21 @@ ip_type4 at_get_ip_for_host(char* host, size_t len) {
inv: inv:
readbuf = ip_type_invalid.addr.v4; readbuf = ip_type_invalid.addr.v4;
} }
MUTEX_UNLOCK(&internal_ips_lock); assert(msg.msgtype == ATM_GETIP);
MUTEX_UNLOCK(internal_ips_lock);
return readbuf; return readbuf;
} }
size_t at_get_host_for_ip(ip_type4 ip, char* readbuf) { size_t at_get_host_for_ip(ip_type4 ip, char* readbuf) {
struct at_msghdr msg = {.msgtype = ATM_GETNAME, .datalen = sizeof(ip_type4) }; struct at_msghdr msg = {.msgtype = ATM_GETNAME, .datalen = sizeof(ip_type4) };
size_t res = 0; size_t res = 0;
MUTEX_LOCK(&internal_ips_lock); MUTEX_LOCK(internal_ips_lock);
if(sendmessage(ATD_SERVER, &msg, &ip) && getmessage(ATD_CLIENT, &msg, readbuf)) { if(sendmessage(ATD_SERVER, &msg, &ip) && getmessage(ATD_CLIENT, &msg, readbuf)) {
if((ptrdiff_t) msg.datalen <= 0) res = 0; if((ptrdiff_t) msg.datalen <= 0) res = 0;
else res = msg.datalen - 1; else res = msg.datalen - 1;
} }
MUTEX_UNLOCK(&internal_ips_lock); assert(msg.msgtype == ATM_GETNAME);
MUTEX_UNLOCK(internal_ips_lock);
return res; return res;
} }
@@ -309,18 +315,33 @@ static void initpipe(int* fds) {
} }
} }
#ifndef MAX
#define MAX(x, y) ((x) > (y) ? (x) : (y))
#endif
#if !defined(PTHREAD_STACK_MIN) || defined(__APPLE__)
/* MAC says its min is 8KB, but then crashes in our face. thx hunkOLard */
#define PTHREAD_STACK_MIN 64*1024
#endif
/* initialize with pointers to shared memory. these will /* initialize with pointers to shared memory. these will
* be used to place responses and arguments */ * be used to place responses and arguments */
void at_init(void) { void at_init(void) {
PFUNC(); PFUNC();
MUTEX_INIT(&internal_ips_lock); void *shm = mmap(0, 4096, PROT_WRITE|PROT_READ, MAP_ANON|MAP_SHARED, -1, 0);
internal_ips = &internal_ips_buf; assert(shm);
internal_ips_lock = shm;
internal_ips = (void*)((char*)shm + 2048);
MUTEX_INIT(internal_ips_lock);
memset(internal_ips, 0, sizeof *internal_ips); memset(internal_ips, 0, sizeof *internal_ips);
initpipe(req_pipefd); initpipe(req_pipefd);
initpipe(resp_pipefd); initpipe(resp_pipefd);
pthread_attr_t allocator_thread_attr;
pthread_attr_init(&allocator_thread_attr); pthread_attr_init(&allocator_thread_attr);
pthread_attr_setstacksize(&allocator_thread_attr, 16 * 1024); pthread_attr_setstacksize(&allocator_thread_attr, MAX(16 * 1024, PTHREAD_STACK_MIN));
pthread_create(&allocator_thread, &allocator_thread_attr, threadfunc, 0); pthread_create(&allocator_thread, &allocator_thread_attr, threadfunc, 0);
pthread_attr_destroy(&allocator_thread_attr);
} }
void at_close(void) { void at_close(void) {
@@ -332,6 +353,5 @@ void at_close(void) {
close(req_pipefd[1]); close(req_pipefd[1]);
close(resp_pipefd[0]); close(resp_pipefd[0]);
close(resp_pipefd[1]); close(resp_pipefd[1]);
pthread_attr_destroy(&allocator_thread_attr); MUTEX_DESTROY(internal_ips_lock);
MUTEX_DESTROY(&internal_ips_lock);
} }
+15 -9
View File
@@ -350,12 +350,15 @@ static int tunnel_to(int sock, ip_type ip, unsigned short port, proxy_type pt, c
if(2 != read_n_bytes(sock, in, 2)) if(2 != read_n_bytes(sock, in, 2))
goto err; goto err;
if(in[0] != 1 || in[1] != 0) { /* according to RFC 1929 the version field for the user/pass auth sub-
if(in[0] != 1) negotiation should be 1, which is kinda counter-intuitive, so there
goto err; are some socks5 proxies that return 5 instead. other programs like
else curl work fine when the version is 5, so let's do the same and accept
return BLOCKED; either of them. */
} if(!(in[0] == 5 || in[0] == 1))
goto err;
if(in[1] != 0)
return BLOCKED;
} }
int buff_iter = 0; int buff_iter = 0;
buff[buff_iter++] = 5; // version buff[buff_iter++] = 5; // version
@@ -787,8 +790,8 @@ void proxy_freeaddrinfo(struct addrinfo *res) {
free(res); free(res);
} }
#if defined(IS_MAC) || defined(IS_OPENBSD) #if defined(IS_MAC) || defined(IS_OPENBSD) || defined(IS_SOLARIS)
#ifdef IS_OPENBSD /* OpenBSD has its own incompatible getservbyname_r */ #if defined(IS_OPENBSD) || defined(IS_SOLARIS) /* OpenBSD and Solaris has its own incompatible getservbyname_r */
#define getservbyname_r mygetservbyname_r #define getservbyname_r mygetservbyname_r
#endif #endif
/* getservbyname on mac is using thread local storage, so we dont need mutex /* getservbyname on mac is using thread local storage, so we dont need mutex
@@ -830,7 +833,10 @@ int proxy_getaddrinfo(const char *node, const char *service, const struct addrin
if(node && !inet_aton(node, &((struct sockaddr_in *) &space->sockaddr_space)->sin_addr)) { if(node && !inet_aton(node, &((struct sockaddr_in *) &space->sockaddr_space)->sin_addr)) {
/* some folks (nmap) use getaddrinfo() with AI_NUMERICHOST to check whether a string /* some folks (nmap) use getaddrinfo() with AI_NUMERICHOST to check whether a string
containing a numeric ip was passed. we must return failure in that case. */ containing a numeric ip was passed. we must return failure in that case. */
if(hints && (hints->ai_flags & AI_NUMERICHOST)) return EAI_NONAME; if(hints && (hints->ai_flags & AI_NUMERICHOST)) {
free(space);
return EAI_NONAME;
}
hp = proxy_gethostbyname(node, &ghdata); hp = proxy_gethostbyname(node, &ghdata);
if(hp) if(hp)
memcpy(&((struct sockaddr_in *) &space->sockaddr_space)->sin_addr, memcpy(&((struct sockaddr_in *) &space->sockaddr_space)->sin_addr,
+18 -4
View File
@@ -45,6 +45,12 @@
#define SOCKFAMILY(x) (satosin(x)->sin_family) #define SOCKFAMILY(x) (satosin(x)->sin_family)
#define MAX_CHAIN 512 #define MAX_CHAIN 512
#ifdef IS_SOLARIS
#undef connect
int __xnet_connect(int sock, const struct sockaddr *addr, unsigned int len);
connect_t true___xnet_connect;
#endif
close_t true_close; close_t true_close;
connect_t true_connect; connect_t true_connect;
gethostbyname_t true_gethostbyname; gethostbyname_t true_gethostbyname;
@@ -108,6 +114,9 @@ static void setup_hooks(void) {
SETUP_SYM(gethostbyaddr); SETUP_SYM(gethostbyaddr);
SETUP_SYM(getnameinfo); SETUP_SYM(getnameinfo);
SETUP_SYM(close); SETUP_SYM(close);
#ifdef IS_SOLARIS
SETUP_SYM(__xnet_connect);
#endif
} }
static int close_fds[16]; static int close_fds[16];
@@ -329,8 +338,7 @@ int close(int fd) {
return -1; return -1;
} }
static int is_v4inv6(const struct in6_addr *a) { static int is_v4inv6(const struct in6_addr *a) {
return a->s6_addr32[0] == 0 && a->s6_addr32[1] == 0 && return !memcmp(a->s6_addr, "\0\0\0\0\0\0\0\0\0\0\xff\xff", 12);
a->s6_addr16[4] == 0 && a->s6_addr16[5] == 0xffff;
} }
int connect(int sock, const struct sockaddr *addr, unsigned int len) { int connect(int sock, const struct sockaddr *addr, unsigned int len) {
INIT(); INIT();
@@ -360,7 +368,7 @@ int connect(int sock, const struct sockaddr *addr, unsigned int len) {
: ntohs(((struct sockaddr_in6 *) addr)->sin6_port); : ntohs(((struct sockaddr_in6 *) addr)->sin6_port);
struct in_addr v4inv6; struct in_addr v4inv6;
if(v6 && is_v4inv6(p_addr_in6)) { if(v6 && is_v4inv6(p_addr_in6)) {
memcpy(&v4inv6.s_addr, &p_addr_in6->s6_addr32[3], 4); memcpy(&v4inv6.s_addr, &p_addr_in6->s6_addr[12], 4);
v6 = dest_ip.is_v6 = 0; v6 = dest_ip.is_v6 = 0;
p_addr_in = &v4inv6; p_addr_in = &v4inv6;
} }
@@ -400,6 +408,12 @@ int connect(int sock, const struct sockaddr *addr, unsigned int len) {
return ret; return ret;
} }
#ifdef IS_SOLARIS
int __xnet_connect(int sock, const struct sockaddr *addr, unsigned int len) {
return connect(sock, addr, len);
}
#endif
static struct gethostbyname_data ghbndata; static struct gethostbyname_data ghbndata;
struct hostent *gethostbyname(const char *name) { struct hostent *gethostbyname(const char *name) {
INIT(); INIT();
@@ -455,7 +469,7 @@ int pc_getnameinfo(const struct sockaddr *sa, socklen_t salen,
unsigned scopeid = 0; unsigned scopeid = 0;
if(v6) { if(v6) {
if(is_v4inv6(&((struct sockaddr_in6*)sa)->sin6_addr)) { if(is_v4inv6(&((struct sockaddr_in6*)sa)->sin6_addr)) {
memcpy(v4inv6buf, &((struct sockaddr_in6*)sa)->sin6_addr.s6_addr32[3], 4); memcpy(v4inv6buf, &((struct sockaddr_in6*)sa)->sin6_addr.s6_addr[12], 4);
ip = v4inv6buf; ip = v4inv6buf;
v6 = 0; v6 = 0;
} else } else
+5 -2
View File
@@ -8,9 +8,9 @@
***************************************************************************/ ***************************************************************************/
#undef _POSIX_C_SOURCE #undef _POSIX_C_SOURCE
#define _POSIX_C_SOURCE 200809L #define _POSIX_C_SOURCE 200112L
#undef _XOPEN_SOURCE #undef _XOPEN_SOURCE
#define _XOPEN_SOURCE 700 #define _XOPEN_SOURCE 600
#include <stdio.h> #include <stdio.h>
#include <unistd.h> #include <unistd.h>
#include <stdlib.h> #include <stdlib.h>
@@ -72,6 +72,9 @@ int main(int argc, char *argv[]) {
size_t i; size_t i;
const char *prefix = NULL; const char *prefix = NULL;
if(argc == 2 && !strcmp(argv[1], "--help"))
return usage(argv);
for(i = 0; i < MAX_COMMANDLINE_FLAGS; i++) { for(i = 0; i < MAX_COMMANDLINE_FLAGS; i++) {
if(start_argv < argc && argv[start_argv][0] == '-') { if(start_argv < argc && argv[start_argv][0] == '-') {
if(argv[start_argv][1] == 'q') { if(argv[start_argv][1] == 'q') {