mirror of
https://github.com/rofl0r/proxychains-ng
synced 2026-05-15 01:52:34 +08:00
Compare commits
32 Commits
@@ -30,6 +30,7 @@ INC =
|
|||||||
PIC = -fPIC
|
PIC = -fPIC
|
||||||
AR = $(CROSS_COMPILE)ar
|
AR = $(CROSS_COMPILE)ar
|
||||||
RANLIB = $(CROSS_COMPILE)ranlib
|
RANLIB = $(CROSS_COMPILE)ranlib
|
||||||
|
SOCKET_LIBS =
|
||||||
|
|
||||||
LDSO_SUFFIX = so
|
LDSO_SUFFIX = so
|
||||||
LD_SET_SONAME = -Wl,-soname=
|
LD_SET_SONAME = -Wl,-soname=
|
||||||
@@ -82,7 +83,7 @@ src/version.o: src/version.h
|
|||||||
|
|
||||||
$(LDSO_PATHNAME): $(LOBJS)
|
$(LDSO_PATHNAME): $(LOBJS)
|
||||||
$(CC) $(LDFLAGS) $(LD_SET_SONAME)$(LDSO_PATHNAME) $(USER_LDFLAGS) \
|
$(CC) $(LDFLAGS) $(LD_SET_SONAME)$(LDSO_PATHNAME) $(USER_LDFLAGS) \
|
||||||
-shared -o $@ $(LOBJS)
|
-shared -o $@ $(LOBJS) $(SOCKET_LIBS)
|
||||||
|
|
||||||
$(ALL_TOOLS): $(OBJS)
|
$(ALL_TOOLS): $(OBJS)
|
||||||
$(CC) src/main.o src/common.o $(USER_LDFLAGS) -o $(PXCHAINS)
|
$(CC) src/main.o src/common.o $(USER_LDFLAGS) -o $(PXCHAINS)
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
ProxyChains-NG ver 4.12 README
|
ProxyChains-NG ver 4.14 README
|
||||||
=============================
|
=============================
|
||||||
|
|
||||||
ProxyChains is a UNIX program, that hooks network-related libc functions
|
ProxyChains is a UNIX program, that hooks network-related libc functions
|
||||||
@@ -52,6 +52,20 @@ ProxyChains-NG ver 4.12 README
|
|||||||
|
|
||||||
Changelog:
|
Changelog:
|
||||||
----------
|
----------
|
||||||
|
Version 4.14
|
||||||
|
- allow alternative proto://user:pass@ip:port syntax for proxylist
|
||||||
|
- fix endless loop in round robin mode when all proxies are down (#147)
|
||||||
|
- fix compilation on android (#265)
|
||||||
|
- fix fd leak in forked processes (#273)
|
||||||
|
- skip connection attempt to nullrouted ips
|
||||||
|
- allow hostnames for proxylist under specific circumstances
|
||||||
|
|
||||||
|
Version 4.13
|
||||||
|
- fix robustness of DNS lookup thread and a segfault
|
||||||
|
- fix socks5 user/pass auth on non-conforming servers
|
||||||
|
- fix memory leak
|
||||||
|
- add support for Solaris
|
||||||
|
|
||||||
Version 4.12
|
Version 4.12
|
||||||
- fix several build issues
|
- fix several build issues
|
||||||
- for MAC
|
- for MAC
|
||||||
|
|||||||
@@ -14,27 +14,11 @@ done
|
|||||||
set +C
|
set +C
|
||||||
trap 'rm "$tmpc"' EXIT INT QUIT TERM HUP
|
trap 'rm "$tmpc"' EXIT INT QUIT TERM HUP
|
||||||
|
|
||||||
ismac() {
|
|
||||||
uname -s | grep Darwin >/dev/null
|
|
||||||
}
|
|
||||||
|
|
||||||
isx86_64() {
|
|
||||||
uname -m | grep -i X86_64 >/dev/null
|
|
||||||
}
|
|
||||||
|
|
||||||
isbsd() {
|
|
||||||
uname -s | grep BSD >/dev/null
|
|
||||||
}
|
|
||||||
|
|
||||||
isopenbsd() {
|
|
||||||
uname -s | grep OpenBSD >/dev/null
|
|
||||||
}
|
|
||||||
|
|
||||||
check_compile() {
|
check_compile() {
|
||||||
printf "checking %s ... " "$1"
|
printf "checking %s ... " "$1"
|
||||||
printf "$3" > "$tmpc"
|
printf "$3" > "$tmpc"
|
||||||
local res=0
|
local res=0
|
||||||
$CC $OUR_CPPFLAGS $CPPFLAGS $2 $CFLAGS -c "$tmpc" -o /dev/null >/dev/null 2>&1 \
|
$CC $OUR_CPPFLAGS $CPPFLAGS $2 $CFLAGS "$tmpc" -o /dev/null >/dev/null 2>&1 \
|
||||||
|| res=1
|
|| res=1
|
||||||
test x$res = x0 && \
|
test x$res = x0 && \
|
||||||
{ printf "yes\n" ; test x"$2" = x || OUR_CPPFLAGS="$OUR_CPPFLAGS $2" ; } \
|
{ printf "yes\n" ; test x"$2" = x || OUR_CPPFLAGS="$OUR_CPPFLAGS $2" ; } \
|
||||||
@@ -62,6 +46,19 @@ check_compile_run() {
|
|||||||
return $res
|
return $res
|
||||||
}
|
}
|
||||||
|
|
||||||
|
check_link_silent() {
|
||||||
|
printf "$2" > "$tmpc"
|
||||||
|
$CC $OUR_CPPFLAGS $CPPFLAGS $1 $CFLAGS "$tmpc" -o /dev/null >/dev/null 2>&1
|
||||||
|
}
|
||||||
|
|
||||||
|
check_link() {
|
||||||
|
printf "checking %s ... " "$1"
|
||||||
|
local res=0
|
||||||
|
check_link_silent "$2" "$3" || res=1
|
||||||
|
test x$res = x0 && printf "yes\n" || printf "no\n"
|
||||||
|
return $res
|
||||||
|
}
|
||||||
|
|
||||||
usage() {
|
usage() {
|
||||||
echo "supported arguments"
|
echo "supported arguments"
|
||||||
echo "--prefix=/path default: $prefix"
|
echo "--prefix=/path default: $prefix"
|
||||||
@@ -73,7 +70,7 @@ usage() {
|
|||||||
echo "--ignore-cve default: no"
|
echo "--ignore-cve default: no"
|
||||||
echo " if set to yes ignores CVE-2015-3887 and makes it possible"
|
echo " if set to yes ignores CVE-2015-3887 and makes it possible"
|
||||||
echo " to preload from current dir (insecure)"
|
echo " to preload from current dir (insecure)"
|
||||||
ismac && isx86_64 && echo "--fat-binary : build for both i386 and x86_64 architectures on 64-bit Macs"
|
echo "--fat-binary : build for both i386 and x86_64 architectures on 64-bit Macs"
|
||||||
echo "--help : show this text"
|
echo "--help : show this text"
|
||||||
exit 1
|
exit 1
|
||||||
}
|
}
|
||||||
@@ -133,20 +130,46 @@ if [ -z "$CC" ] ; then
|
|||||||
CC=cc
|
CC=cc
|
||||||
fi
|
fi
|
||||||
|
|
||||||
check_compile 'whether netinet/in.h defines s6_addr16' "" \
|
echo > config.mak
|
||||||
'#include <netinet/in.h>\nint main(int a, char**c){struct in6_addr x={.s6_addr32[0]=a};return x.s6_addr16[0]; }' \
|
|
||||||
|| {
|
bsd_detected=false
|
||||||
check_compile 'whether netinet/in.h defines __u6_addr.__u6_addr16' \
|
isbsd() {
|
||||||
'-Ds6_addr16=__u6_addr.__u6_addr16 -Ds6_addr32=__u6_addr.__u6_addr32' \
|
$bsd_detected
|
||||||
'#include <netinet/in.h>\nint main(int a, char**c){struct in6_addr x={.s6_addr32[0]=a};return x.s6_addr16[0]; }'
|
}
|
||||||
|
mac_detected=false
|
||||||
|
ismac() {
|
||||||
|
$mac_detected
|
||||||
|
}
|
||||||
|
mac_64=false
|
||||||
|
ismac64() {
|
||||||
|
$mac_64
|
||||||
|
}
|
||||||
|
solaris_detected=false
|
||||||
|
issolaris() {
|
||||||
|
$solaris_detected
|
||||||
}
|
}
|
||||||
|
|
||||||
check_define __OpenBSD__ && \
|
check_compile 'whether we have GNU-style getservbyname_r()' "-DHAVE_GNU_GETSERVBYNAME_R" \
|
||||||
|
'#define _GNU_SOURCE\n#include <netdb.h>\nint main() {\nstruct servent *se = 0;struct servent se_buf;char buf[1024];\ngetservbyname_r("foo", (void*) 0, &se_buf, buf, sizeof(buf), &se);\nreturn 0;}'
|
||||||
|
|
||||||
|
check_compile 'whether we have pipe2() and O_CLOEXEC' "-DHAVE_PIPE2" \
|
||||||
|
'#define _GNU_SOURCE\n#include <fcntl.h>\n#include <unistd.h>\nint main() {\nint pipefd[2];\npipe2(pipefd, O_CLOEXEC);\nreturn 0;}'
|
||||||
|
|
||||||
|
check_define __APPLE__ && {
|
||||||
|
mac_detected=true
|
||||||
|
check_define __x86_64__ && mac_64=true
|
||||||
|
}
|
||||||
|
check_define __FreeBSD__ && bsd_detected=true
|
||||||
|
check_define __OpenBSD__ && {
|
||||||
|
bsd_detected=true
|
||||||
|
echo "CFLAGS+=-DIS_OPENBSD">>config.mak
|
||||||
check_compile_run 'whether OpenBSDs fclose() (illegally) calls close()' \
|
check_compile_run 'whether OpenBSDs fclose() (illegally) calls close()' \
|
||||||
'#include <stdio.h>\n#include<stdlib.h>\nint close(int x){exit(0);}int main(){fclose(stdin);return 1;}' && \
|
'#include <stdio.h>\n#include<stdlib.h>\nint close(int x){exit(0);}int main(){fclose(stdin);return 1;}' && \
|
||||||
OUR_CPPFLAGS="$OUR_CPPFLAGS -DBROKEN_FCLOSE"
|
OUR_CPPFLAGS="$OUR_CPPFLAGS -DBROKEN_FCLOSE"
|
||||||
|
}
|
||||||
|
check_define __sun && check_define __SVR4 && solaris_detected=true
|
||||||
|
|
||||||
echo "CC=$CC">config.mak
|
echo "CC=$CC">>config.mak
|
||||||
[ -z "$CPPFLAGS" ] || echo "CPPFLAGS=$CPPFLAGS">>config.mak
|
[ -z "$CPPFLAGS" ] || echo "CPPFLAGS=$CPPFLAGS">>config.mak
|
||||||
[ -z "$CFLAGS" ] || echo "USER_CFLAGS=$CFLAGS">>config.mak
|
[ -z "$CFLAGS" ] || echo "USER_CFLAGS=$CFLAGS">>config.mak
|
||||||
[ -z "$LDFLAGS" ] || echo "USER_LDFLAGS=$LDFLAGS">>config.mak
|
[ -z "$LDFLAGS" ] || echo "USER_LDFLAGS=$LDFLAGS">>config.mak
|
||||||
@@ -158,22 +181,38 @@ echo includedir=$includedir>>config.mak
|
|||||||
echo sysconfdir=$sysconfdir>>config.mak
|
echo sysconfdir=$sysconfdir>>config.mak
|
||||||
[ "$ignore_cve" = "no" ] && echo "CPPFLAGS+= -DSUPER_SECURE">>config.mak
|
[ "$ignore_cve" = "no" ] && echo "CPPFLAGS+= -DSUPER_SECURE">>config.mak
|
||||||
[ -z "$OUR_CPPFLAGS" ] || echo "CPPFLAGS+= $OUR_CPPFLAGS" >>config.mak
|
[ -z "$OUR_CPPFLAGS" ] || echo "CPPFLAGS+= $OUR_CPPFLAGS" >>config.mak
|
||||||
|
|
||||||
|
check_link "whether we can use -Wl,--no-as-needed" "-Wl,--no-as-needed" \
|
||||||
|
"int main() { return 0; }" || echo NO_AS_NEEDED= >> config.mak
|
||||||
|
|
||||||
|
LD_SONAME_FLAG=
|
||||||
|
printf "checking what's the option to use in linker to set library name ... "
|
||||||
|
for o in --soname -h -soname -install_name; do
|
||||||
|
check_link_silent "-shared -Wl,$o,libconftest.so" "void test_func(int a) {}" && LD_SONAME_FLAG=$o && break
|
||||||
|
done
|
||||||
|
if [ -z "$LD_SONAME_FLAG" ]; then
|
||||||
|
printf '\ncannot find an option to set library name\n'
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
echo "$LD_SONAME_FLAG"
|
||||||
|
echo "LD_SET_SONAME = -Wl,$LD_SONAME_FLAG," >> config.mak
|
||||||
|
|
||||||
make_cmd=make
|
make_cmd=make
|
||||||
if ismac ; then
|
if ismac ; then
|
||||||
echo NO_AS_NEEDED=>>config.mak
|
|
||||||
echo LDSO_SUFFIX=dylib>>config.mak
|
echo LDSO_SUFFIX=dylib>>config.mak
|
||||||
echo MAC_CFLAGS+=-DIS_MAC=1>>config.mak
|
echo MAC_CFLAGS+=-DIS_MAC=1>>config.mak
|
||||||
if isx86_64 && [ "$fat_binary" = 1 ] ; then
|
if ismac64 && [ "$fat_binary" = 1 ] ; then
|
||||||
echo "Configuring a fat binary for i386 and x86_64"
|
echo "Configuring a fat binary for i386 and x86_64"
|
||||||
echo MAC_CFLAGS+=-arch i386 -arch x86_64>>config.mak
|
echo MAC_CFLAGS+=-arch i386 -arch x86_64>>config.mak
|
||||||
echo LDFLAGS+=-arch i386 -arch x86_64>>config.mak
|
echo LDFLAGS+=-arch i386 -arch x86_64>>config.mak
|
||||||
fi
|
fi
|
||||||
echo LD_SET_SONAME=-Wl,-install_name,>>config.mak
|
|
||||||
elif isbsd ; then
|
elif isbsd ; then
|
||||||
echo LIBDL=>>config.mak
|
echo LIBDL=>>config.mak
|
||||||
echo "CFLAGS+=-DIS_BSD">>config.mak
|
echo "CFLAGS+=-DIS_BSD">>config.mak
|
||||||
isopenbsd && echo "CFLAGS+=-DIS_OPENBSD">>config.mak
|
|
||||||
make_cmd=gmake
|
make_cmd=gmake
|
||||||
|
elif issolaris; then
|
||||||
|
echo "CFLAGS+=-DIS_SOLARIS -D__EXTENSIONS__" >> config.mak
|
||||||
|
echo "SOCKET_LIBS=-lsocket -lnsl" >> config.mak
|
||||||
fi
|
fi
|
||||||
|
|
||||||
echo "Done, now run $make_cmd && $make_cmd install"
|
echo "Done, now run $make_cmd && $make_cmd install"
|
||||||
|
|||||||
+49
-18
@@ -1,3 +1,8 @@
|
|||||||
|
#undef _GNU_SOURCE
|
||||||
|
#define _GNU_SOURCE
|
||||||
|
#undef _POSIX_C_SOURCE
|
||||||
|
#define _DARWIN_C_SOURCE
|
||||||
|
#include <limits.h>
|
||||||
#include <pthread.h>
|
#include <pthread.h>
|
||||||
#include <unistd.h>
|
#include <unistd.h>
|
||||||
#include <fcntl.h>
|
#include <fcntl.h>
|
||||||
@@ -9,6 +14,7 @@
|
|||||||
#include <stdint.h>
|
#include <stdint.h>
|
||||||
#include <stddef.h>
|
#include <stddef.h>
|
||||||
#include <errno.h>
|
#include <errno.h>
|
||||||
|
#include <sys/mman.h>
|
||||||
#include "allocator_thread.h"
|
#include "allocator_thread.h"
|
||||||
#include "debug.h"
|
#include "debug.h"
|
||||||
#include "ip_type.h"
|
#include "ip_type.h"
|
||||||
@@ -34,9 +40,8 @@ static void *dumpstring(char* s, size_t len) {
|
|||||||
return p;
|
return p;
|
||||||
}
|
}
|
||||||
|
|
||||||
pthread_mutex_t internal_ips_lock;
|
static pthread_mutex_t *internal_ips_lock;
|
||||||
internal_ip_lookup_table *internal_ips = NULL;
|
static internal_ip_lookup_table *internal_ips;
|
||||||
internal_ip_lookup_table internal_ips_buf;
|
|
||||||
|
|
||||||
uint32_t index_from_internal_ip(ip_type4 internalip) {
|
uint32_t index_from_internal_ip(ip_type4 internalip) {
|
||||||
PFUNC();
|
PFUNC();
|
||||||
@@ -111,9 +116,9 @@ static ip_type4 ip_from_internal_list(char* name, size_t len) {
|
|||||||
|
|
||||||
internal_ips->list[internal_ips->counter] = new_mem;
|
internal_ips->list[internal_ips->counter] = new_mem;
|
||||||
internal_ips->list[internal_ips->counter]->hash = hash;
|
internal_ips->list[internal_ips->counter]->hash = hash;
|
||||||
|
|
||||||
new_mem = dumpstring((char*) name, len + 1);
|
new_mem = dumpstring((char*) name, len + 1);
|
||||||
|
|
||||||
if(!new_mem) {
|
if(!new_mem) {
|
||||||
internal_ips->list[internal_ips->counter] = 0;
|
internal_ips->list[internal_ips->counter] = 0;
|
||||||
goto oom;
|
goto oom;
|
||||||
@@ -126,7 +131,7 @@ static ip_type4 ip_from_internal_list(char* name, size_t len) {
|
|||||||
|
|
||||||
return res;
|
return res;
|
||||||
err_plus_unlock:
|
err_plus_unlock:
|
||||||
|
|
||||||
PDEBUG("return err\n");
|
PDEBUG("return err\n");
|
||||||
return ip_type_invalid.addr.v4;
|
return ip_type_invalid.addr.v4;
|
||||||
}
|
}
|
||||||
@@ -151,7 +156,6 @@ struct at_msghdr {
|
|||||||
};
|
};
|
||||||
|
|
||||||
static pthread_t allocator_thread;
|
static pthread_t allocator_thread;
|
||||||
static pthread_attr_t allocator_thread_attr;
|
|
||||||
int req_pipefd[2];
|
int req_pipefd[2];
|
||||||
int resp_pipefd[2];
|
int resp_pipefd[2];
|
||||||
|
|
||||||
@@ -240,7 +244,7 @@ static void* threadfunc(void* x) {
|
|||||||
(void) x;
|
(void) x;
|
||||||
int ret;
|
int ret;
|
||||||
struct at_msghdr msg;
|
struct at_msghdr msg;
|
||||||
union {
|
union {
|
||||||
char host[MSG_LEN_MAX];
|
char host[MSG_LEN_MAX];
|
||||||
ip_type4 ip;
|
ip_type4 ip;
|
||||||
} readbuf;
|
} readbuf;
|
||||||
@@ -276,7 +280,7 @@ static void* threadfunc(void* x) {
|
|||||||
|
|
||||||
ip_type4 at_get_ip_for_host(char* host, size_t len) {
|
ip_type4 at_get_ip_for_host(char* host, size_t len) {
|
||||||
ip_type4 readbuf;
|
ip_type4 readbuf;
|
||||||
MUTEX_LOCK(&internal_ips_lock);
|
MUTEX_LOCK(internal_ips_lock);
|
||||||
if(len > MSG_LEN_MAX) goto inv;
|
if(len > MSG_LEN_MAX) goto inv;
|
||||||
struct at_msghdr msg = {.msgtype = ATM_GETIP, .datalen = len + 1 };
|
struct at_msghdr msg = {.msgtype = ATM_GETIP, .datalen = len + 1 };
|
||||||
if(sendmessage(ATD_SERVER, &msg, host) &&
|
if(sendmessage(ATD_SERVER, &msg, host) &&
|
||||||
@@ -285,42 +289,70 @@ ip_type4 at_get_ip_for_host(char* host, size_t len) {
|
|||||||
inv:
|
inv:
|
||||||
readbuf = ip_type_invalid.addr.v4;
|
readbuf = ip_type_invalid.addr.v4;
|
||||||
}
|
}
|
||||||
MUTEX_UNLOCK(&internal_ips_lock);
|
assert(msg.msgtype == ATM_GETIP);
|
||||||
|
MUTEX_UNLOCK(internal_ips_lock);
|
||||||
return readbuf;
|
return readbuf;
|
||||||
}
|
}
|
||||||
|
|
||||||
size_t at_get_host_for_ip(ip_type4 ip, char* readbuf) {
|
size_t at_get_host_for_ip(ip_type4 ip, char* readbuf) {
|
||||||
struct at_msghdr msg = {.msgtype = ATM_GETNAME, .datalen = sizeof(ip_type4) };
|
struct at_msghdr msg = {.msgtype = ATM_GETNAME, .datalen = sizeof(ip_type4) };
|
||||||
size_t res = 0;
|
size_t res = 0;
|
||||||
MUTEX_LOCK(&internal_ips_lock);
|
MUTEX_LOCK(internal_ips_lock);
|
||||||
if(sendmessage(ATD_SERVER, &msg, &ip) && getmessage(ATD_CLIENT, &msg, readbuf)) {
|
if(sendmessage(ATD_SERVER, &msg, &ip) && getmessage(ATD_CLIENT, &msg, readbuf)) {
|
||||||
if((ptrdiff_t) msg.datalen <= 0) res = 0;
|
if((ptrdiff_t) msg.datalen <= 0) res = 0;
|
||||||
else res = msg.datalen - 1;
|
else res = msg.datalen - 1;
|
||||||
}
|
}
|
||||||
MUTEX_UNLOCK(&internal_ips_lock);
|
assert(msg.msgtype == ATM_GETNAME);
|
||||||
|
MUTEX_UNLOCK(internal_ips_lock);
|
||||||
return res;
|
return res;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
static void initpipe(int* fds) {
|
static void initpipe(int* fds) {
|
||||||
if(pipe(fds) == -1) {
|
int retval;
|
||||||
|
|
||||||
|
#ifdef HAVE_PIPE2
|
||||||
|
retval = pipe2(fds, O_CLOEXEC);
|
||||||
|
#else
|
||||||
|
retval = pipe(fds);
|
||||||
|
if(retval == 0) {
|
||||||
|
fcntl(fds[0], F_SETFD, FD_CLOEXEC);
|
||||||
|
fcntl(fds[1], F_SETFD, FD_CLOEXEC);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
if(retval == -1) {
|
||||||
perror("pipe");
|
perror("pipe");
|
||||||
exit(1);
|
exit(1);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#ifndef MAX
|
||||||
|
#define MAX(x, y) ((x) > (y) ? (x) : (y))
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if !defined(PTHREAD_STACK_MIN) || defined(__APPLE__)
|
||||||
|
/* MAC says its min is 8KB, but then crashes in our face. thx hunkOLard */
|
||||||
|
#define PTHREAD_STACK_MIN 64*1024
|
||||||
|
#endif
|
||||||
|
|
||||||
/* initialize with pointers to shared memory. these will
|
/* initialize with pointers to shared memory. these will
|
||||||
* be used to place responses and arguments */
|
* be used to place responses and arguments */
|
||||||
void at_init(void) {
|
void at_init(void) {
|
||||||
PFUNC();
|
PFUNC();
|
||||||
MUTEX_INIT(&internal_ips_lock);
|
void *shm = mmap(0, 4096, PROT_WRITE|PROT_READ, MAP_ANON|MAP_SHARED, -1, 0);
|
||||||
internal_ips = &internal_ips_buf;
|
assert(shm);
|
||||||
|
internal_ips_lock = shm;
|
||||||
|
internal_ips = (void*)((char*)shm + 2048);
|
||||||
|
|
||||||
|
MUTEX_INIT(internal_ips_lock);
|
||||||
memset(internal_ips, 0, sizeof *internal_ips);
|
memset(internal_ips, 0, sizeof *internal_ips);
|
||||||
initpipe(req_pipefd);
|
initpipe(req_pipefd);
|
||||||
initpipe(resp_pipefd);
|
initpipe(resp_pipefd);
|
||||||
|
pthread_attr_t allocator_thread_attr;
|
||||||
pthread_attr_init(&allocator_thread_attr);
|
pthread_attr_init(&allocator_thread_attr);
|
||||||
pthread_attr_setstacksize(&allocator_thread_attr, 16 * 1024);
|
pthread_attr_setstacksize(&allocator_thread_attr, MAX(16 * 1024, PTHREAD_STACK_MIN));
|
||||||
pthread_create(&allocator_thread, &allocator_thread_attr, threadfunc, 0);
|
pthread_create(&allocator_thread, &allocator_thread_attr, threadfunc, 0);
|
||||||
|
pthread_attr_destroy(&allocator_thread_attr);
|
||||||
}
|
}
|
||||||
|
|
||||||
void at_close(void) {
|
void at_close(void) {
|
||||||
@@ -332,6 +364,5 @@ void at_close(void) {
|
|||||||
close(req_pipefd[1]);
|
close(req_pipefd[1]);
|
||||||
close(resp_pipefd[0]);
|
close(resp_pipefd[0]);
|
||||||
close(resp_pipefd[1]);
|
close(resp_pipefd[1]);
|
||||||
pthread_attr_destroy(&allocator_thread_attr);
|
MUTEX_DESTROY(internal_ips_lock);
|
||||||
MUTEX_DESTROY(&internal_ips_lock);
|
|
||||||
}
|
}
|
||||||
|
|||||||
+40
-27
@@ -38,6 +38,7 @@
|
|||||||
#include "core.h"
|
#include "core.h"
|
||||||
#include "common.h"
|
#include "common.h"
|
||||||
#include "allocator_thread.h"
|
#include "allocator_thread.h"
|
||||||
|
#include "mutex.h"
|
||||||
|
|
||||||
extern int tcp_read_time_out;
|
extern int tcp_read_time_out;
|
||||||
extern int tcp_connect_time_out;
|
extern int tcp_connect_time_out;
|
||||||
@@ -106,7 +107,7 @@ static void encode_base_64(char *src, char *dest, int max_len) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
void proxychains_write_log(char *str, ...) {
|
void proxychains_write_log(char *str, ...) {
|
||||||
char buff[1024*20];
|
char buff[1024*4];
|
||||||
va_list arglist;
|
va_list arglist;
|
||||||
if(!proxychains_quiet_mode) {
|
if(!proxychains_quiet_mode) {
|
||||||
va_start(arglist, str);
|
va_start(arglist, str);
|
||||||
@@ -350,12 +351,15 @@ static int tunnel_to(int sock, ip_type ip, unsigned short port, proxy_type pt, c
|
|||||||
|
|
||||||
if(2 != read_n_bytes(sock, in, 2))
|
if(2 != read_n_bytes(sock, in, 2))
|
||||||
goto err;
|
goto err;
|
||||||
if(in[0] != 1 || in[1] != 0) {
|
/* according to RFC 1929 the version field for the user/pass auth sub-
|
||||||
if(in[0] != 1)
|
negotiation should be 1, which is kinda counter-intuitive, so there
|
||||||
goto err;
|
are some socks5 proxies that return 5 instead. other programs like
|
||||||
else
|
curl work fine when the version is 5, so let's do the same and accept
|
||||||
return BLOCKED;
|
either of them. */
|
||||||
}
|
if(!(in[0] == 5 || in[0] == 1))
|
||||||
|
goto err;
|
||||||
|
if(in[1] != 0)
|
||||||
|
return BLOCKED;
|
||||||
}
|
}
|
||||||
int buff_iter = 0;
|
int buff_iter = 0;
|
||||||
buff[buff_iter++] = 5; // version
|
buff[buff_iter++] = 5; // version
|
||||||
@@ -564,8 +568,8 @@ int connect_proxy_chain(int sock, ip_type target_ip,
|
|||||||
unsigned int offset = 0;
|
unsigned int offset = 0;
|
||||||
unsigned int alive_count = 0;
|
unsigned int alive_count = 0;
|
||||||
unsigned int curr_len = 0;
|
unsigned int curr_len = 0;
|
||||||
unsigned int curr_pos = 0;
|
|
||||||
unsigned int looped = 0; // went back to start of list in RR mode
|
unsigned int looped = 0; // went back to start of list in RR mode
|
||||||
|
unsigned int rr_loop_max = 14;
|
||||||
|
|
||||||
p3 = &p4;
|
p3 = &p4;
|
||||||
|
|
||||||
@@ -602,23 +606,27 @@ int connect_proxy_chain(int sock, ip_type target_ip,
|
|||||||
|
|
||||||
case ROUND_ROBIN_TYPE:
|
case ROUND_ROBIN_TYPE:
|
||||||
alive_count = calc_alive(pd, proxy_count);
|
alive_count = calc_alive(pd, proxy_count);
|
||||||
curr_pos = offset = proxychains_proxy_offset;
|
offset = proxychains_proxy_offset;
|
||||||
if(alive_count < max_chain)
|
if(alive_count < max_chain)
|
||||||
goto error_more;
|
goto error_more;
|
||||||
PDEBUG("1:rr_offset = %d, curr_pos = %d\n", offset, curr_pos);
|
PDEBUG("1:rr_offset = %d\n", offset);
|
||||||
/* Check from current RR offset til end */
|
/* Check from current RR offset til end */
|
||||||
for (;rc != SUCCESS;) {
|
for (;rc != SUCCESS;) {
|
||||||
if (!(p1 = select_proxy(FIFOLY, pd, proxy_count, &offset))) {
|
if (!(p1 = select_proxy(FIFOLY, pd, proxy_count, &offset))) {
|
||||||
/* We've reached the end of the list, go to the start */
|
/* We've reached the end of the list, go to the start */
|
||||||
offset = 0;
|
offset = 0;
|
||||||
looped++;
|
looped++;
|
||||||
continue;
|
if (looped > rr_loop_max) {
|
||||||
} else if (looped && rc > 0 && offset >= curr_pos) {
|
proxychains_proxy_offset = 0;
|
||||||
PDEBUG("GOTO MORE PROXIES 0\n");
|
goto error_more;
|
||||||
/* We've gone back to the start and now past our starting position */
|
} else {
|
||||||
proxychains_proxy_offset = 0;
|
PDEBUG("rr_type all proxies down, release all\n");
|
||||||
goto error_more;
|
release_all(pd, proxy_count);
|
||||||
}
|
/* Each loop we wait 10ms more */
|
||||||
|
usleep(10000 * looped);
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
}
|
||||||
PDEBUG("2:rr_offset = %d\n", offset);
|
PDEBUG("2:rr_offset = %d\n", offset);
|
||||||
rc=start_chain(&ns, p1, RRT);
|
rc=start_chain(&ns, p1, RRT);
|
||||||
}
|
}
|
||||||
@@ -721,10 +729,13 @@ int connect_proxy_chain(int sock, ip_type target_ip,
|
|||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static pthread_mutex_t servbyname_lock;
|
||||||
void core_initialize(void) {
|
void core_initialize(void) {
|
||||||
|
MUTEX_INIT(&servbyname_lock);
|
||||||
}
|
}
|
||||||
|
|
||||||
void core_unload(void) {
|
void core_unload(void) {
|
||||||
|
MUTEX_DESTROY(&servbyname_lock);
|
||||||
}
|
}
|
||||||
|
|
||||||
static void gethostbyname_data_setstring(struct gethostbyname_data* data, char* name) {
|
static void gethostbyname_data_setstring(struct gethostbyname_data* data, char* name) {
|
||||||
@@ -787,18 +798,17 @@ void proxy_freeaddrinfo(struct addrinfo *res) {
|
|||||||
free(res);
|
free(res);
|
||||||
}
|
}
|
||||||
|
|
||||||
#if defined(IS_MAC) || defined(IS_OPENBSD)
|
static int mygetservbyname_r(const char* name, const char* proto, struct servent* result_buf,
|
||||||
#ifdef IS_OPENBSD /* OpenBSD has its own incompatible getservbyname_r */
|
|
||||||
#define getservbyname_r mygetservbyname_r
|
|
||||||
#endif
|
|
||||||
/* getservbyname on mac is using thread local storage, so we dont need mutex
|
|
||||||
TODO: check if the same applies to OpenBSD */
|
|
||||||
static int getservbyname_r(const char* name, const char* proto, struct servent* result_buf,
|
|
||||||
char* buf, size_t buflen, struct servent** result) {
|
char* buf, size_t buflen, struct servent** result) {
|
||||||
PFUNC();
|
PFUNC();
|
||||||
|
#ifdef HAVE_GNU_GETSERVBYNAME_R
|
||||||
|
PDEBUG("using host getservbyname_r\n");
|
||||||
|
return getservbyname_r(name, proto, result_buf, buf, buflen, result);
|
||||||
|
#endif
|
||||||
struct servent *res;
|
struct servent *res;
|
||||||
int ret;
|
int ret;
|
||||||
(void) buf; (void) buflen;
|
(void) buf; (void) buflen;
|
||||||
|
MUTEX_LOCK(&servbyname_lock);
|
||||||
res = getservbyname(name, proto);
|
res = getservbyname(name, proto);
|
||||||
if(res) {
|
if(res) {
|
||||||
*result_buf = *res;
|
*result_buf = *res;
|
||||||
@@ -808,9 +818,9 @@ static int getservbyname_r(const char* name, const char* proto, struct servent*
|
|||||||
*result = NULL;
|
*result = NULL;
|
||||||
ret = ENOENT;
|
ret = ENOENT;
|
||||||
}
|
}
|
||||||
|
MUTEX_UNLOCK(&servbyname_lock);
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
#endif
|
|
||||||
|
|
||||||
int proxy_getaddrinfo(const char *node, const char *service, const struct addrinfo *hints, struct addrinfo **res) {
|
int proxy_getaddrinfo(const char *node, const char *service, const struct addrinfo *hints, struct addrinfo **res) {
|
||||||
struct gethostbyname_data ghdata;
|
struct gethostbyname_data ghdata;
|
||||||
@@ -830,7 +840,10 @@ int proxy_getaddrinfo(const char *node, const char *service, const struct addrin
|
|||||||
if(node && !inet_aton(node, &((struct sockaddr_in *) &space->sockaddr_space)->sin_addr)) {
|
if(node && !inet_aton(node, &((struct sockaddr_in *) &space->sockaddr_space)->sin_addr)) {
|
||||||
/* some folks (nmap) use getaddrinfo() with AI_NUMERICHOST to check whether a string
|
/* some folks (nmap) use getaddrinfo() with AI_NUMERICHOST to check whether a string
|
||||||
containing a numeric ip was passed. we must return failure in that case. */
|
containing a numeric ip was passed. we must return failure in that case. */
|
||||||
if(hints && (hints->ai_flags & AI_NUMERICHOST)) return EAI_NONAME;
|
if(hints && (hints->ai_flags & AI_NUMERICHOST)) {
|
||||||
|
free(space);
|
||||||
|
return EAI_NONAME;
|
||||||
|
}
|
||||||
hp = proxy_gethostbyname(node, &ghdata);
|
hp = proxy_gethostbyname(node, &ghdata);
|
||||||
if(hp)
|
if(hp)
|
||||||
memcpy(&((struct sockaddr_in *) &space->sockaddr_space)->sin_addr,
|
memcpy(&((struct sockaddr_in *) &space->sockaddr_space)->sin_addr,
|
||||||
@@ -838,7 +851,7 @@ int proxy_getaddrinfo(const char *node, const char *service, const struct addrin
|
|||||||
else
|
else
|
||||||
goto err2;
|
goto err2;
|
||||||
}
|
}
|
||||||
if(service) getservbyname_r(service, NULL, &se_buf, buf, sizeof(buf), &se);
|
if(service) mygetservbyname_r(service, NULL, &se_buf, buf, sizeof(buf), &se);
|
||||||
|
|
||||||
port = se ? se->s_port : htons(atoi(service ? service : "0"));
|
port = se ? se->s_port : htons(atoi(service ? service : "0"));
|
||||||
((struct sockaddr_in *) &space->sockaddr_space)->sin_port = port;
|
((struct sockaddr_in *) &space->sockaddr_space)->sin_port = port;
|
||||||
|
|||||||
+144
-10
@@ -45,6 +45,12 @@
|
|||||||
#define SOCKFAMILY(x) (satosin(x)->sin_family)
|
#define SOCKFAMILY(x) (satosin(x)->sin_family)
|
||||||
#define MAX_CHAIN 512
|
#define MAX_CHAIN 512
|
||||||
|
|
||||||
|
#ifdef IS_SOLARIS
|
||||||
|
#undef connect
|
||||||
|
int __xnet_connect(int sock, const struct sockaddr *addr, unsigned int len);
|
||||||
|
connect_t true___xnet_connect;
|
||||||
|
#endif
|
||||||
|
|
||||||
close_t true_close;
|
close_t true_close;
|
||||||
connect_t true_connect;
|
connect_t true_connect;
|
||||||
gethostbyname_t true_gethostbyname;
|
gethostbyname_t true_gethostbyname;
|
||||||
@@ -72,7 +78,7 @@ pthread_once_t init_once = PTHREAD_ONCE_INIT;
|
|||||||
|
|
||||||
static int init_l = 0;
|
static int init_l = 0;
|
||||||
|
|
||||||
static inline void get_chain_data(proxy_data * pd, unsigned int *proxy_count, chain_type * ct);
|
static void get_chain_data(proxy_data * pd, unsigned int *proxy_count, chain_type * ct);
|
||||||
|
|
||||||
static void* load_sym(char* symname, void* proxyfunc) {
|
static void* load_sym(char* symname, void* proxyfunc) {
|
||||||
|
|
||||||
@@ -108,6 +114,9 @@ static void setup_hooks(void) {
|
|||||||
SETUP_SYM(gethostbyaddr);
|
SETUP_SYM(gethostbyaddr);
|
||||||
SETUP_SYM(getnameinfo);
|
SETUP_SYM(getnameinfo);
|
||||||
SETUP_SYM(close);
|
SETUP_SYM(close);
|
||||||
|
#ifdef IS_SOLARIS
|
||||||
|
SETUP_SYM(__xnet_connect);
|
||||||
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
static int close_fds[16];
|
static int close_fds[16];
|
||||||
@@ -151,6 +160,107 @@ static void gcc_init(void) {
|
|||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
|
||||||
|
typedef enum {
|
||||||
|
RS_PT_NONE = 0,
|
||||||
|
RS_PT_SOCKS4,
|
||||||
|
RS_PT_SOCKS5,
|
||||||
|
RS_PT_HTTP
|
||||||
|
} rs_proxyType;
|
||||||
|
|
||||||
|
/*
|
||||||
|
proxy_from_string() taken from rocksock network I/O library (C) rofl0r
|
||||||
|
valid inputs:
|
||||||
|
socks5://user:password@proxy.domain.com:port
|
||||||
|
socks5://proxy.domain.com:port
|
||||||
|
socks4://proxy.domain.com:port
|
||||||
|
http://user:password@proxy.domain.com:port
|
||||||
|
http://proxy.domain.com:port
|
||||||
|
|
||||||
|
supplying port number is obligatory.
|
||||||
|
user:pass@ part is optional for http and socks5.
|
||||||
|
however, user:pass authentication is currently not implemented for http proxies.
|
||||||
|
return 1 on success, 0 on error.
|
||||||
|
*/
|
||||||
|
static int proxy_from_string(const char *proxystring,
|
||||||
|
char *type_buf,
|
||||||
|
char* host_buf,
|
||||||
|
int *port_n,
|
||||||
|
char *user_buf,
|
||||||
|
char* pass_buf)
|
||||||
|
{
|
||||||
|
const char* p;
|
||||||
|
rs_proxyType proxytype;
|
||||||
|
|
||||||
|
size_t next_token = 6, ul = 0, pl = 0, hl;
|
||||||
|
if(!proxystring[0] || !proxystring[1] || !proxystring[2] || !proxystring[3] || !proxystring[4] || !proxystring[5]) goto inv_string;
|
||||||
|
if(*proxystring == 's') {
|
||||||
|
switch(proxystring[5]) {
|
||||||
|
case '5': proxytype = RS_PT_SOCKS5; break;
|
||||||
|
case '4': proxytype = RS_PT_SOCKS4; break;
|
||||||
|
default: goto inv_string;
|
||||||
|
}
|
||||||
|
} else if(*proxystring == 'h') {
|
||||||
|
proxytype = RS_PT_HTTP;
|
||||||
|
next_token = 4;
|
||||||
|
} else goto inv_string;
|
||||||
|
if(
|
||||||
|
proxystring[next_token++] != ':' ||
|
||||||
|
proxystring[next_token++] != '/' ||
|
||||||
|
proxystring[next_token++] != '/') goto inv_string;
|
||||||
|
const char *at = strchr(proxystring+next_token, '@');
|
||||||
|
if(at) {
|
||||||
|
if(proxytype == RS_PT_SOCKS4)
|
||||||
|
return 0;
|
||||||
|
p = strchr(proxystring+next_token, ':');
|
||||||
|
if(!p || p >= at) goto inv_string;
|
||||||
|
const char *u = proxystring+next_token;
|
||||||
|
ul = p-u;
|
||||||
|
p++;
|
||||||
|
pl = at-p;
|
||||||
|
if(proxytype == RS_PT_SOCKS5 && (ul > 255 || pl > 255))
|
||||||
|
return 0;
|
||||||
|
memcpy(user_buf, u, ul);
|
||||||
|
user_buf[ul]=0;
|
||||||
|
memcpy(pass_buf, p, pl);
|
||||||
|
pass_buf[pl]=0;
|
||||||
|
next_token += 2+ul+pl;
|
||||||
|
} else {
|
||||||
|
user_buf[0]=0;
|
||||||
|
pass_buf[0]=0;
|
||||||
|
}
|
||||||
|
const char* h = proxystring+next_token;
|
||||||
|
p = strchr(h, ':');
|
||||||
|
if(!p) goto inv_string;
|
||||||
|
hl = p-h;
|
||||||
|
if(hl > 255)
|
||||||
|
return 0;
|
||||||
|
memcpy(host_buf, h, hl);
|
||||||
|
host_buf[hl]=0;
|
||||||
|
*port_n = atoi(p+1);
|
||||||
|
switch(proxytype) {
|
||||||
|
case RS_PT_SOCKS4:
|
||||||
|
strcpy(type_buf, "socks4");
|
||||||
|
break;
|
||||||
|
case RS_PT_SOCKS5:
|
||||||
|
strcpy(type_buf, "socks5");
|
||||||
|
break;
|
||||||
|
case RS_PT_HTTP:
|
||||||
|
strcpy(type_buf, "http");
|
||||||
|
break;
|
||||||
|
default:
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
return 1;
|
||||||
|
inv_string:
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
static const char* bool_str(int bool_val) {
|
||||||
|
if(bool_val) return "true";
|
||||||
|
return "false";
|
||||||
|
}
|
||||||
|
|
||||||
/* get configuration from config file */
|
/* get configuration from config file */
|
||||||
static void get_chain_data(proxy_data * pd, unsigned int *proxy_count, chain_type * ct) {
|
static void get_chain_data(proxy_data * pd, unsigned int *proxy_count, chain_type * ct) {
|
||||||
int count = 0, port_n = 0, list = 0;
|
int count = 0, port_n = 0, list = 0;
|
||||||
@@ -193,9 +303,11 @@ static void get_chain_data(proxy_data * pd, unsigned int *proxy_count, chain_typ
|
|||||||
|
|
||||||
int ret = sscanf(buff, "%s %s %d %s %s", type, host, &port_n, pd[count].user, pd[count].pass);
|
int ret = sscanf(buff, "%s %s %d %s %s", type, host, &port_n, pd[count].user, pd[count].pass);
|
||||||
if(ret < 3 || ret == EOF) {
|
if(ret < 3 || ret == EOF) {
|
||||||
inv:
|
if(!proxy_from_string(buff, type, host, &port_n, pd[count].user, pd[count].pass)) {
|
||||||
fprintf(stderr, "error: invalid item in proxylist section: %s", buff);
|
inv:
|
||||||
exit(1);
|
fprintf(stderr, "error: invalid item in proxylist section: %s", buff);
|
||||||
|
exit(1);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
memset(&pd[count].ip, 0, sizeof(pd[count].ip));
|
memset(&pd[count].ip, 0, sizeof(pd[count].ip));
|
||||||
@@ -203,8 +315,20 @@ static void get_chain_data(proxy_data * pd, unsigned int *proxy_count, chain_typ
|
|||||||
pd[count].port = htons((unsigned short) port_n);
|
pd[count].port = htons((unsigned short) port_n);
|
||||||
ip_type* host_ip = &pd[count].ip;
|
ip_type* host_ip = &pd[count].ip;
|
||||||
if(1 != inet_pton(host_ip->is_v6 ? AF_INET6 : AF_INET, host, host_ip->addr.v6)) {
|
if(1 != inet_pton(host_ip->is_v6 ? AF_INET6 : AF_INET, host, host_ip->addr.v6)) {
|
||||||
fprintf(stderr, "proxy %s has invalid value or is not numeric\n", host);
|
if(*ct == STRICT_TYPE && proxychains_resolver && count > 0) {
|
||||||
exit(1);
|
/* we can allow dns hostnames for all but the first proxy in the list if chaintype is strict, as remote lookup can be done */
|
||||||
|
ip_type4 internal_ip = at_get_ip_for_host(host, strlen(host));
|
||||||
|
pd[count].ip.is_v6 = 0;
|
||||||
|
host_ip->addr.v4 = internal_ip;
|
||||||
|
if(internal_ip.as_int == ip_type_invalid.addr.v4.as_int)
|
||||||
|
goto inv_host;
|
||||||
|
} else {
|
||||||
|
inv_host:
|
||||||
|
fprintf(stderr, "proxy %s has invalid value or is not numeric\n", host);
|
||||||
|
fprintf(stderr, "non-numeric ips are only allowed under the following circumstances:\n");
|
||||||
|
fprintf(stderr, "chaintype == strict (%s), proxy is not first in list (%s), proxy_dns active (%s)\n\n", bool_str(*ct == STRICT_TYPE), bool_str(count > 0), bool_str(proxychains_resolver));
|
||||||
|
exit(1);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if(!strcmp(type, "http")) {
|
if(!strcmp(type, "http")) {
|
||||||
@@ -308,6 +432,7 @@ static void get_chain_data(proxy_data * pd, unsigned int *proxy_count, chain_typ
|
|||||||
}
|
}
|
||||||
*proxy_count = count;
|
*proxy_count = count;
|
||||||
proxychains_got_chain_data = 1;
|
proxychains_got_chain_data = 1;
|
||||||
|
PDEBUG("proxy_dns: %s\n", proxychains_resolver ? "ON" : "OFF");
|
||||||
}
|
}
|
||||||
|
|
||||||
/******* HOOK FUNCTIONS *******/
|
/******* HOOK FUNCTIONS *******/
|
||||||
@@ -329,8 +454,7 @@ int close(int fd) {
|
|||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
static int is_v4inv6(const struct in6_addr *a) {
|
static int is_v4inv6(const struct in6_addr *a) {
|
||||||
return a->s6_addr32[0] == 0 && a->s6_addr32[1] == 0 &&
|
return !memcmp(a->s6_addr, "\0\0\0\0\0\0\0\0\0\0\xff\xff", 12);
|
||||||
a->s6_addr16[4] == 0 && a->s6_addr16[5] == 0xffff;
|
|
||||||
}
|
}
|
||||||
int connect(int sock, const struct sockaddr *addr, unsigned int len) {
|
int connect(int sock, const struct sockaddr *addr, unsigned int len) {
|
||||||
INIT();
|
INIT();
|
||||||
@@ -360,10 +484,14 @@ int connect(int sock, const struct sockaddr *addr, unsigned int len) {
|
|||||||
: ntohs(((struct sockaddr_in6 *) addr)->sin6_port);
|
: ntohs(((struct sockaddr_in6 *) addr)->sin6_port);
|
||||||
struct in_addr v4inv6;
|
struct in_addr v4inv6;
|
||||||
if(v6 && is_v4inv6(p_addr_in6)) {
|
if(v6 && is_v4inv6(p_addr_in6)) {
|
||||||
memcpy(&v4inv6.s_addr, &p_addr_in6->s6_addr32[3], 4);
|
memcpy(&v4inv6.s_addr, &p_addr_in6->s6_addr[12], 4);
|
||||||
v6 = dest_ip.is_v6 = 0;
|
v6 = dest_ip.is_v6 = 0;
|
||||||
p_addr_in = &v4inv6;
|
p_addr_in = &v4inv6;
|
||||||
}
|
}
|
||||||
|
if(!v6 && !memcmp(p_addr_in, "\0\0\0\0", 4)) {
|
||||||
|
errno = ECONNREFUSED;
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
// PDEBUG("localnet: %s; ", inet_ntop(AF_INET,&in_addr_localnet, str, sizeof(str)));
|
// PDEBUG("localnet: %s; ", inet_ntop(AF_INET,&in_addr_localnet, str, sizeof(str)));
|
||||||
// PDEBUG("netmask: %s; " , inet_ntop(AF_INET, &in_addr_netmask, str, sizeof(str)));
|
// PDEBUG("netmask: %s; " , inet_ntop(AF_INET, &in_addr_netmask, str, sizeof(str)));
|
||||||
@@ -400,6 +528,12 @@ int connect(int sock, const struct sockaddr *addr, unsigned int len) {
|
|||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#ifdef IS_SOLARIS
|
||||||
|
int __xnet_connect(int sock, const struct sockaddr *addr, unsigned int len) {
|
||||||
|
return connect(sock, addr, len);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
static struct gethostbyname_data ghbndata;
|
static struct gethostbyname_data ghbndata;
|
||||||
struct hostent *gethostbyname(const char *name) {
|
struct hostent *gethostbyname(const char *name) {
|
||||||
INIT();
|
INIT();
|
||||||
@@ -455,7 +589,7 @@ int pc_getnameinfo(const struct sockaddr *sa, socklen_t salen,
|
|||||||
unsigned scopeid = 0;
|
unsigned scopeid = 0;
|
||||||
if(v6) {
|
if(v6) {
|
||||||
if(is_v4inv6(&((struct sockaddr_in6*)sa)->sin6_addr)) {
|
if(is_v4inv6(&((struct sockaddr_in6*)sa)->sin6_addr)) {
|
||||||
memcpy(v4inv6buf, &((struct sockaddr_in6*)sa)->sin6_addr.s6_addr32[3], 4);
|
memcpy(v4inv6buf, &((struct sockaddr_in6*)sa)->sin6_addr.s6_addr[12], 4);
|
||||||
ip = v4inv6buf;
|
ip = v4inv6buf;
|
||||||
v6 = 0;
|
v6 = 0;
|
||||||
} else
|
} else
|
||||||
|
|||||||
+5
-2
@@ -8,9 +8,9 @@
|
|||||||
***************************************************************************/
|
***************************************************************************/
|
||||||
|
|
||||||
#undef _POSIX_C_SOURCE
|
#undef _POSIX_C_SOURCE
|
||||||
#define _POSIX_C_SOURCE 200809L
|
#define _POSIX_C_SOURCE 200112L
|
||||||
#undef _XOPEN_SOURCE
|
#undef _XOPEN_SOURCE
|
||||||
#define _XOPEN_SOURCE 700
|
#define _XOPEN_SOURCE 600
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
#include <unistd.h>
|
#include <unistd.h>
|
||||||
#include <stdlib.h>
|
#include <stdlib.h>
|
||||||
@@ -72,6 +72,9 @@ int main(int argc, char *argv[]) {
|
|||||||
size_t i;
|
size_t i;
|
||||||
const char *prefix = NULL;
|
const char *prefix = NULL;
|
||||||
|
|
||||||
|
if(argc == 2 && !strcmp(argv[1], "--help"))
|
||||||
|
return usage(argv);
|
||||||
|
|
||||||
for(i = 0; i < MAX_COMMANDLINE_FLAGS; i++) {
|
for(i = 0; i < MAX_COMMANDLINE_FLAGS; i++) {
|
||||||
if(start_argv < argc && argv[start_argv][0] == '-') {
|
if(start_argv < argc && argv[start_argv][0] == '-') {
|
||||||
if(argv[start_argv][1] == 'q') {
|
if(argv[start_argv][1] == 'q') {
|
||||||
|
|||||||
+20
-13
@@ -3,30 +3,30 @@
|
|||||||
#include <netdb.h>
|
#include <netdb.h>
|
||||||
#include <netinet/in.h>
|
#include <netinet/in.h>
|
||||||
#include <sys/socket.h>
|
#include <sys/socket.h>
|
||||||
|
|
||||||
#ifndef NI_MAXHOST
|
#ifndef NI_MAXHOST
|
||||||
#define NI_MAXHOST 1025
|
#define NI_MAXHOST 1025
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
int main(void) {
|
static int doit(const char* host, const char* service) {
|
||||||
struct addrinfo *result;
|
struct addrinfo *result;
|
||||||
struct addrinfo *res;
|
struct addrinfo *res;
|
||||||
int error;
|
int error;
|
||||||
|
|
||||||
/* resolve the domain name into a list of addresses */
|
/* resolve the domain name into a list of addresses */
|
||||||
error = getaddrinfo("www.example.com", NULL, NULL, &result);
|
error = getaddrinfo(host, service, NULL, &result);
|
||||||
if (error != 0)
|
if (error != 0)
|
||||||
{
|
{
|
||||||
fprintf(stderr, "error in getaddrinfo: %s\n", gai_strerror(error));
|
fprintf(stderr, "error in getaddrinfo: %s\n", gai_strerror(error));
|
||||||
return EXIT_FAILURE;
|
return EXIT_FAILURE;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* loop over all returned results and do inverse lookup */
|
/* loop over all returned results and do inverse lookup */
|
||||||
for (res = result; res != NULL; res = res->ai_next)
|
for (res = result; res != NULL; res = res->ai_next)
|
||||||
{
|
{
|
||||||
char hostname[NI_MAXHOST] = "";
|
char hostname[NI_MAXHOST] = "";
|
||||||
|
|
||||||
error = getnameinfo(res->ai_addr, res->ai_addrlen, hostname, NI_MAXHOST, NULL, 0, 0);
|
error = getnameinfo(res->ai_addr, res->ai_addrlen, hostname, NI_MAXHOST, NULL, 0, 0);
|
||||||
if (error != 0)
|
if (error != 0)
|
||||||
{
|
{
|
||||||
fprintf(stderr, "error in getnameinfo: %s\n", gai_strerror(error));
|
fprintf(stderr, "error in getnameinfo: %s\n", gai_strerror(error));
|
||||||
@@ -34,8 +34,15 @@ int main(void) {
|
|||||||
}
|
}
|
||||||
if (*hostname != '\0')
|
if (*hostname != '\0')
|
||||||
printf("hostname: %s\n", hostname);
|
printf("hostname: %s\n", hostname);
|
||||||
}
|
}
|
||||||
|
|
||||||
freeaddrinfo(result);
|
freeaddrinfo(result);
|
||||||
return EXIT_SUCCESS;
|
return EXIT_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
int main(void) {
|
||||||
|
int ret;
|
||||||
|
ret = doit("www.example.com", NULL);
|
||||||
|
ret = doit("www.example.com", "80");
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user