/* * Copyright (C) 2018 Jigsaw Operations LLC * Copyright (C) 2019 Ambroz Bizjak (modifications) * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. Neither the name of the author nor the * names of its contributors may be used to endorse or promote products * derived from this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include static const int DnsPort = 53; static int addr_comparator (void *unused, BAddr *v1, BAddr *v2); static struct SocksUdpClient_connection * find_connection (SocksUdpClient *o, BAddr addr); static void socks_state_handler (struct SocksUdpClient_connection *con, int event); static void datagram_state_handler (struct SocksUdpClient_connection *con, int event); static void send_monitor_handler (struct SocksUdpClient_connection *con); static void recv_if_handler_send ( struct SocksUdpClient_connection *con, uint8_t *data, int data_len); static struct SocksUdpClient_connection * connection_init ( SocksUdpClient *o, BAddr local_addr, BAddr first_remote_addr, const uint8_t *first_data, int first_data_len); static void connection_free (struct SocksUdpClient_connection *con); static void connection_send (struct SocksUdpClient_connection *con, BAddr remote_addr, const uint8_t *data, int data_len); static void first_job_handler (struct SocksUdpClient_connection *con); static int compute_socks_mtu (int udp_mtu); static int get_dns_id (BAddr *remote_addr, const uint8_t *data, int data_len); int addr_comparator (void *unused, BAddr *v1, BAddr *v2) { return BAddr_CompareOrder(v1, v2); } struct SocksUdpClient_connection * find_connection (SocksUdpClient *o, BAddr addr) { BAVLNode *tree_node = BAVL_LookupExact(&o->connections_tree, &addr); if (!tree_node) { return NULL; } return UPPER_OBJECT(tree_node, struct SocksUdpClient_connection, connections_tree_node); } void socks_state_handler (struct SocksUdpClient_connection *con, int event) { DebugObject_Access(&con->client->d_obj); switch (event) { case BSOCKSCLIENT_EVENT_CONNECTED: { // Get the local address of the SOCKS TCP connection. BAddr tcp_local_addr; if (!BSocksClient_GetLocalAddr(&con->socks, &tcp_local_addr)) { BLog(BLOG_ERROR, "Failed to get TCP local address."); return connection_free(con); } // Sanity check the address type (required by SetPort below). if (tcp_local_addr.type != BADDR_TYPE_IPV4 && tcp_local_addr.type != BADDR_TYPE_IPV6) { BLog(BLOG_ERROR, "Bad address type in TCP local address."); return connection_free(con); } // Bind the UDP socket to the same IP address and let the kernel pick the port. BAddr udp_bound_addr = tcp_local_addr; BAddr_SetPort(&udp_bound_addr, 0); if (!BDatagram_Bind(&con->socket, udp_bound_addr)) { BLog(BLOG_ERROR, "Failed to bind the UDP socket."); return connection_free(con); } // Update udp_bound_addr to the actual address that was bound. if (!BDatagram_GetLocalAddr(&con->socket, &udp_bound_addr)) { BLog(BLOG_ERROR, "Failed to get UDP bound address."); return connection_free(con); } // Set the DST.ADDR for SOCKS. BSocksClient_SetDestAddr(&con->socks, udp_bound_addr); } break; case BSOCKSCLIENT_EVENT_UP: { // The remote address to send datagrams to is the BND.ADDR provided by the // SOCKS server. BAddr remote_addr = BSocksClient_GetBindAddr(&con->socks); // Don't bother setting a source address for datagrams since we are bound. BIPAddr local_addr; BIPAddr_InitInvalid(&local_addr); // Set the addresses for BDatagram. // This will unblock the queue of outgoing packets. BDatagram_SetSendAddrs(&con->socket, remote_addr, local_addr); } break; case BSOCKSCLIENT_EVENT_ERROR: { char local_buffer[BADDR_MAX_PRINT_LEN]; BAddr_Print(&con->local_addr, local_buffer); BLog(BLOG_ERROR, "SOCKS error event for %s, removing connection.", local_buffer); connection_free(con); } break; case BSOCKSCLIENT_EVENT_ERROR_CLOSED: { char local_buffer[BADDR_MAX_PRINT_LEN]; BAddr_Print(&con->local_addr, local_buffer); BLog(BLOG_WARNING, "SOCKS closed event for %s, removing connection.", local_buffer); connection_free(con); } break; } } void datagram_state_handler (struct SocksUdpClient_connection *con, int event) { DebugObject_Access(&con->client->d_obj); if (event == BDATAGRAM_EVENT_ERROR) { char local_buffer[BADDR_MAX_PRINT_LEN]; BAddr_Print(&con->local_addr, local_buffer); BLog(BLOG_ERROR, "Low-level datagram error %s, removing connection.", local_buffer); // Remove the connection. Note that BDatagram requires that we free // the BDatagram after an error is reported. connection_free(con); } } void send_monitor_handler (struct SocksUdpClient_connection *con) { DebugObject_Access(&con->client->d_obj); char local_buffer[BADDR_MAX_PRINT_LEN]; BAddr_Print(&con->local_addr, local_buffer); BLog(BLOG_INFO, "Removing connection for %s due to inactivity.", local_buffer); // The connection has passed its idle timeout. Remove it. connection_free(con); } void recv_if_handler_send ( struct SocksUdpClient_connection *con, uint8_t *data, int data_len) { DebugObject_Access(&con->client->d_obj); SocksUdpClient *o = con->client; ASSERT(data_len >= 0) ASSERT(data_len <= o->socks_mtu) // accept packet PacketPassInterface_Done(&con->recv_if); // check header struct socks_udp_header header; if (data_len < sizeof(header)) { BLog(BLOG_ERROR, "Missing SOCKS-UDP header."); return; } memcpy(&header, data, sizeof(header)); data += sizeof(header); data_len -= sizeof(header); // parse address BAddr remote_addr; switch (header.atyp) { case SOCKS_ATYP_IPV4: { struct socks_addr_ipv4 addr_ipv4; if (data_len < sizeof(addr_ipv4)) { BLog(BLOG_ERROR, "Missing IPv4 address."); return; } memcpy(&addr_ipv4, data, sizeof(addr_ipv4)); data += sizeof(addr_ipv4); data_len -= sizeof(addr_ipv4); remote_addr.type = BADDR_TYPE_IPV4; remote_addr.ipv4.ip = addr_ipv4.addr; remote_addr.ipv4.port = addr_ipv4.port; } break; case SOCKS_ATYP_IPV6: { struct socks_addr_ipv6 addr_ipv6; if (data_len < sizeof(addr_ipv6)) { BLog(BLOG_ERROR, "Missing IPv6 address."); return; } memcpy(&addr_ipv6, data, sizeof(addr_ipv6)); data += sizeof(addr_ipv6); data_len -= sizeof(addr_ipv6); remote_addr.type = BADDR_TYPE_IPV6; memcpy(remote_addr.ipv6.ip, addr_ipv6.addr, sizeof(remote_addr.ipv6.ip)); remote_addr.ipv6.port = addr_ipv6.port; } break; default: { BLog(BLOG_ERROR, "Bad address type"); return; } break; } // check remaining data if (data_len > o->udp_mtu) { BLog(BLOG_ERROR, "too much data"); return; } // pass packet to user SocksUdpClient *client = con->client; client->handler_received(client->user, con->local_addr, remote_addr, data, data_len); // Was this connection used for a DNS query? if (con->dns_id >= 0) { // Get the DNS transaction ID of the response. int recv_dns_id = get_dns_id(&remote_addr, data, data_len); // Does the transaction ID matche that of the request? if (recv_dns_id == con->dns_id) { // We have now forwarded the response, so this connection is no longer needed. char local_buffer[BADDR_MAX_PRINT_LEN]; BAddr_Print(&con->local_addr, local_buffer); BLog(BLOG_DEBUG, "Removing connection for %s after the DNS response.", local_buffer); connection_free(con); } else { BLog(BLOG_INFO, "DNS client port received an unexpected non-DNS packet, " "disabling DNS optimization."); con->dns_id = -1; } } } struct SocksUdpClient_connection * connection_init ( SocksUdpClient *o, BAddr local_addr, BAddr first_remote_addr, const uint8_t *first_data, int first_data_len) { ASSERT(o->num_connections <= o->max_connections) ASSERT(!find_connection(o, local_addr)) char local_buffer[BADDR_MAX_PRINT_LEN]; BAddr_Print(&local_addr, local_buffer); BLog(BLOG_DEBUG, "Creating connection for %s.", local_buffer); // allocate structure struct SocksUdpClient_connection *con = (struct SocksUdpClient_connection *)BAlloc(sizeof(*con)); if (!con) { BLog(BLOG_ERROR, "BAlloc connection failed"); goto fail0; } // set basic things con->client = o; con->local_addr = local_addr; // store first outgoing packet con->first_data = BAlloc(first_data_len); if (!con->first_data) { BLog(BLOG_ERROR, "BAlloc first data failed"); goto fail1; } memcpy(con->first_data, first_data, first_data_len); con->first_data_len = first_data_len; con->first_remote_addr = first_remote_addr; // Get the DNS transaction ID from the packet, if any. con->dns_id = get_dns_id(&first_remote_addr, first_data, first_data_len); BPendingGroup *pg = BReactor_PendingGroup(o->reactor); // Init first job, to send the first packet asynchronously. This has to happen // asynchronously because con->send_writer (a BufferWriter) cannot accept writes until // after it is linked with its PacketBuffer (con->send_buffer), which happens // asynchronously. BPending_Init(&con->first_job, pg, (BPending_handler)first_job_handler, con); // Add the first job to the pending set. BPending acts as a LIFO stack, and // first_job_handler needs to run after async actions that occur in PacketBuffer_Init, // so we need to put first_job on the stack first. BPending_Set(&con->first_job); // Create a datagram socket if (!BDatagram_Init(&con->socket, con->local_addr.type, o->reactor, con, (BDatagram_handler)datagram_state_handler)) { BLog(BLOG_ERROR, "Failed to create a UDP socket"); goto fail2; } // We will set the DST.ADDR for SOCKS later (BSOCKSCLIENT_EVENT_CONNECTED). BAddr dummy_dst_addr; BAddr_InitNone(&dummy_dst_addr); // Initiate connection to socks server if (!BSocksClient_Init(&con->socks, o->server_addr, o->auth_info, o->num_auth_info, dummy_dst_addr, true, (BSocksClient_handler)socks_state_handler, con, o->reactor)) { BLog(BLOG_ERROR, "Failed to initialize SOCKS client"); goto fail3; } // Since we use o->socks_mtu for send and receive pipelines, we can handle maximally // sized packets (o->udp_mtu) including the SOCKS-UDP header. // Send pipeline: send_writer -> send_buffer -> send_monitor -> send_if -> socket. BDatagram_SendAsync_Init(&con->socket, o->socks_mtu); PacketPassInactivityMonitor_Init(&con->send_monitor, BDatagram_SendAsync_GetIf(&con->socket), o->reactor, o->keepalive_time, (PacketPassInactivityMonitor_handler)send_monitor_handler, con); BufferWriter_Init(&con->send_writer, o->socks_mtu, pg); if (!PacketBuffer_Init(&con->send_buffer, BufferWriter_GetOutput(&con->send_writer), PacketPassInactivityMonitor_GetInput(&con->send_monitor), o->send_buf_size, pg)) { BLog(BLOG_ERROR, "Send buffer init failed"); goto fail4; } // Receive pipeline: socket -> recv_buffer -> recv_if BDatagram_RecvAsync_Init(&con->socket, o->socks_mtu); PacketPassInterface_Init(&con->recv_if, o->socks_mtu, (PacketPassInterface_handler_send)recv_if_handler_send, con, pg); if (!SinglePacketBuffer_Init(&con->recv_buffer, BDatagram_RecvAsync_GetIf(&con->socket), &con->recv_if, pg)) { BLog(BLOG_ERROR, "Receive buffer init failed"); goto fail5; } // Insert to connections tree, it must succeed because of the assert. int inserted = BAVL_Insert(&o->connections_tree, &con->connections_tree_node, NULL); ASSERT(inserted) B_USE(inserted) // increment number of connections o->num_connections++; return con; fail5: PacketPassInterface_Free(&con->recv_if); BDatagram_RecvAsync_Free(&con->socket); PacketBuffer_Free(&con->send_buffer); fail4: BufferWriter_Free(&con->send_writer); PacketPassInactivityMonitor_Free(&con->send_monitor); BDatagram_SendAsync_Free(&con->socket); BSocksClient_Free(&con->socks); fail3: BDatagram_Free(&con->socket); fail2: BPending_Free(&con->first_job); BFree(con->first_data); fail1: BFree(con); fail0: return NULL; } void connection_free (struct SocksUdpClient_connection *con) { SocksUdpClient *o = con->client; // decrement number of connections ASSERT(o->num_connections > 0) o->num_connections--; // remove from connections tree BAVL_Remove(&o->connections_tree, &con->connections_tree_node); // Free UDP receive pipeline components SinglePacketBuffer_Free(&con->recv_buffer); PacketPassInterface_Free(&con->recv_if); BDatagram_RecvAsync_Free(&con->socket); // Free UDP send pipeline components PacketBuffer_Free(&con->send_buffer); BufferWriter_Free(&con->send_writer); PacketPassInactivityMonitor_Free(&con->send_monitor); BDatagram_SendAsync_Free(&con->socket); // Free SOCKS client BSocksClient_Free(&con->socks); // Free UDP socket BDatagram_Free(&con->socket); // Free first job BPending_Free(&con->first_job); // Free first outgoing packet BFree(con->first_data); // Free structure BFree(con); } void connection_send (struct SocksUdpClient_connection *con, BAddr remote_addr, const uint8_t *data, int data_len) { ASSERT(data_len >= 0) ASSERT(data_len <= con->client->udp_mtu) if (con->dns_id >= 0) { // So far, this connection has only sent a single DNS query. int new_dns_id = get_dns_id(&remote_addr, data, data_len); if (new_dns_id != con->dns_id) { BLog(BLOG_DEBUG, "Client reused DNS query port. Disabling DNS optimization."); con->dns_id = -1; } } // Check if we're sending to an IPv4 or IPv6 destination. int atyp; size_t address_size; // write address switch (remote_addr.type) { case BADDR_TYPE_IPV4: { atyp = SOCKS_ATYP_IPV4; address_size = sizeof(struct socks_addr_ipv4); } break; case BADDR_TYPE_IPV6: { atyp = SOCKS_ATYP_IPV6; address_size = sizeof(struct socks_addr_ipv6); } break; default: { BLog(BLOG_ERROR, "Bad address type in outgoing packet."); return; } break; } // Determine total packet size in the buffer. // This cannot exceed o->socks_mtu because data_len is required to not exceed // o->udp_mtu and o->socks_mtu is calculated to accomodate any UDP packet not // not exceeding o->udp_mtu. size_t total_len = sizeof(struct socks_udp_header) + address_size + data_len; ASSERT(total_len <= con->client->socks_mtu) // Get a pointer to write the packet to. uint8_t *out_data_begin; if (!BufferWriter_StartPacket(&con->send_writer, &out_data_begin)) { BLog(BLOG_ERROR, "Send buffer is full."); return; } uint8_t *out_data = out_data_begin; // Write header struct socks_udp_header header; header.rsv = 0; header.frag = 0; header.atyp = atyp; memcpy(out_data, &header, sizeof(header)); out_data += sizeof(header); // Write address switch (atyp) { case SOCKS_ATYP_IPV4: { struct socks_addr_ipv4 addr_ipv4; addr_ipv4.addr = remote_addr.ipv4.ip; addr_ipv4.port = remote_addr.ipv4.port; memcpy(out_data, &addr_ipv4, sizeof(addr_ipv4)); out_data += sizeof(addr_ipv4); } break; case SOCKS_ATYP_IPV6: { struct socks_addr_ipv6 addr_ipv6; memcpy(addr_ipv6.addr, remote_addr.ipv6.ip, sizeof(addr_ipv6.addr)); addr_ipv6.port = remote_addr.ipv6.port; memcpy(out_data, &addr_ipv6, sizeof(addr_ipv6)); out_data += sizeof(addr_ipv6); } break; } // Write payload memcpy(out_data, data, data_len); out_data += data_len; ASSERT(out_data - out_data_begin == total_len) // Submit packet to buffer BufferWriter_EndPacket(&con->send_writer, total_len); } void first_job_handler (struct SocksUdpClient_connection *con) { DebugObject_Access(&con->client->d_obj); ASSERT(con->first_data) // Send the first packet. connection_send(con, con->first_remote_addr, con->first_data, con->first_data_len); // Release the first packet buffer. BFree(con->first_data); con->first_data = NULL; con->first_data_len = 0; } int compute_socks_mtu (int udp_mtu) { bsize_t bs = bsize_add( bsize_fromint(udp_mtu), bsize_add( bsize_fromsize(sizeof(struct socks_udp_header)), bsize_fromsize(sizeof(struct socks_addr_ipv6)) ) ); int s; return bsize_toint(bs, &s) ? s : -1; } // Get the DNS transaction ID, or -1 if this does not look like a DNS packet. int get_dns_id (BAddr *remote_addr, const uint8_t *data, int data_len) { if (ntoh16(BAddr_GetPort(remote_addr)) == DnsPort && data_len >= 2) { return (data[0] << 8) | data[1]; } else { return -1; } } int SocksUdpClient_Init (SocksUdpClient *o, int udp_mtu, int max_connections, int send_buf_size, btime_t keepalive_time, BAddr server_addr, const struct BSocksClient_auth_info *auth_info, size_t num_auth_info, BReactor *reactor, void *user, SocksUdpClient_handler_received handler_received) { ASSERT(udp_mtu >= 0) ASSERT(max_connections > 0) ASSERT(send_buf_size > 0) // init simple things o->server_addr = server_addr; o->auth_info = auth_info; o->num_auth_info = num_auth_info; o->num_connections = 0; o->max_connections = max_connections; o->send_buf_size = send_buf_size; o->udp_mtu = udp_mtu; o->keepalive_time = keepalive_time; o->reactor = reactor; o->user = user; o->handler_received = handler_received; // calculate full MTU with SOCKS header o->socks_mtu = compute_socks_mtu(udp_mtu); if (o->socks_mtu < 0) { BLog(BLOG_ERROR, "SocksUdpClient_Init: MTU too large."); goto fail0; } // init connections tree BAVL_Init(&o->connections_tree, OFFSET_DIFF(struct SocksUdpClient_connection, local_addr, connections_tree_node), (BAVL_comparator)addr_comparator, NULL); DebugObject_Init(&o->d_obj); return 1; fail0: return 0; } void SocksUdpClient_Free (SocksUdpClient *o) { DebugObject_Free(&o->d_obj); // free connections while (!BAVL_IsEmpty(&o->connections_tree)) { BAVLNode *node = BAVL_GetFirst(&o->connections_tree); struct SocksUdpClient_connection *con = UPPER_OBJECT(node, struct SocksUdpClient_connection, connections_tree_node); connection_free(con); } } void SocksUdpClient_SubmitPacket (SocksUdpClient *o, BAddr local_addr, BAddr remote_addr, const uint8_t *data, int data_len) { DebugObject_Access(&o->d_obj); ASSERT(local_addr.type == BADDR_TYPE_IPV4 || local_addr.type == BADDR_TYPE_IPV6) ASSERT(remote_addr.type == BADDR_TYPE_IPV4 || remote_addr.type == BADDR_TYPE_IPV6) ASSERT(data_len >= 0) ASSERT(data_len <= o->udp_mtu) // lookup connection struct SocksUdpClient_connection *con = find_connection(o, local_addr); if (!con) { if (o->num_connections >= o->max_connections) { // Drop the packet. BLog(BLOG_WARNING, "Dropping UDP packet, reached max number of connections."); return; } // create new connection and enqueue the packet connection_init(o, local_addr, remote_addr, data, data_len); } else { // send packet connection_send(con, remote_addr, data, data_len); } }