redsocks: add new package
Redsocks is a daemon running on the local system, that will transparently tunnel any TCP connection via a remote SOCKS4, SOCKS5 or HTTP proxy server. It uses the system firewall's redirection facility to intercept TCP connections, thus the redirection is system-wide, with fine-grained control, and does not depend on LD_PRELOAD libraries. Signed-off-by: Johannes Morgenroth <jm@m-network.de>
This commit is contained in:
parent
c36bc9cee0
commit
8c0260db9e
9 changed files with 1010 additions and 0 deletions
56
net/redsocks/Makefile
Normal file
56
net/redsocks/Makefile
Normal file
|
@ -0,0 +1,56 @@
|
|||
#
|
||||
# Copyright (C) 2014 OpenWrt.org
|
||||
#
|
||||
# This is free software, licensed under the GNU General Public License v2.
|
||||
# See /LICENSE for more information.
|
||||
#
|
||||
|
||||
include $(TOPDIR)/rules.mk
|
||||
|
||||
PKG_NAME:=redsocks
|
||||
PKG_VERSION:=0.4
|
||||
PKG_RELEASE:=1
|
||||
|
||||
PKG_BUILD_DIR:=$(BUILD_DIR)/$(PKG_NAME)-release-$(PKG_VERSION)
|
||||
PKG_SOURCE:=release-$(PKG_VERSION).tar.gz
|
||||
PKG_SOURCE_URL:=https://github.com/darkk/redsocks/archive/
|
||||
PKG_MD5SUM:=810102ef06a9ea796f310ae811afc6a8
|
||||
PKG_MAINTAINER:=Johannes Morgenroth <jm@m-network.de>
|
||||
PKG_LICENSE:=Apache-2.0
|
||||
|
||||
include $(INCLUDE_DIR)/package.mk
|
||||
|
||||
define Package/redsocks
|
||||
SECTION:=net
|
||||
CATEGORY:=Network
|
||||
DEPENDS:=+libevent2
|
||||
TITLE:=Redirect any TCP connection to a SOCKS or HTTPS proxy server
|
||||
endef
|
||||
|
||||
define Package/redsocks/conffiles
|
||||
/etc/redsocks.conf
|
||||
endef
|
||||
|
||||
define Package/redsocks/description
|
||||
Redsocks is a daemon running on the local system, that will transparently
|
||||
tunnel any TCP connection via a remote SOCKS4, SOCKS5 or HTTP proxy server. It
|
||||
uses the system firewall's redirection facility to intercept TCP connections,
|
||||
thus the redirection is system-wide, with fine-grained control, and does
|
||||
not depend on LD_PRELOAD libraries.
|
||||
|
||||
Redsocks supports tunneling TCP connections and UDP packets. It has
|
||||
authentication support for both, SOCKS and HTTP proxies.
|
||||
|
||||
Also included is a small DNS server returning answers with the "truncated" flag
|
||||
set for any UDP query, forcing the resolver to use TCP.
|
||||
endef
|
||||
|
||||
define Package/redsocks/install
|
||||
$(INSTALL_DIR) $(1)/usr/sbin/
|
||||
$(INSTALL_BIN) $(PKG_BUILD_DIR)/redsocks $(1)/usr/sbin/
|
||||
$(INSTALL_DIR) $(1)/etc/init.d/
|
||||
$(INSTALL_BIN) files/redsocks.init $(1)/etc/init.d/redsocks
|
||||
$(INSTALL_CONF) files/redsocks.conf $(1)/etc/
|
||||
endef
|
||||
|
||||
$(eval $(call BuildPackage,redsocks))
|
108
net/redsocks/files/redsocks.conf
Normal file
108
net/redsocks/files/redsocks.conf
Normal file
|
@ -0,0 +1,108 @@
|
|||
base {
|
||||
// debug: connection progress & client list on SIGUSR1
|
||||
log_debug = off;
|
||||
|
||||
// info: start and end of client session
|
||||
log_info = on;
|
||||
|
||||
/* possible `log' values are:
|
||||
* stderr
|
||||
* "file:/path/to/file"
|
||||
* syslog:FACILITY facility is any of "daemon", "local0"..."local7"
|
||||
*/
|
||||
// log = stderr;
|
||||
// log = "file:/path/to/file";
|
||||
log = "syslog:local7";
|
||||
|
||||
// detach from console
|
||||
daemon = on;
|
||||
|
||||
/* Change uid, gid and root directory, these options require root
|
||||
* privilegies on startup.
|
||||
* Note, your chroot may requre /etc/localtime if you write log to syslog.
|
||||
* Log is opened before chroot & uid changing.
|
||||
*/
|
||||
// user = nobody;
|
||||
// group = nobody;
|
||||
// chroot = "/var/chroot";
|
||||
|
||||
/* possible `redirector' values are:
|
||||
* iptables - for Linux
|
||||
* ipf - for FreeBSD
|
||||
* pf - for OpenBSD
|
||||
* generic - some generic redirector that MAY work
|
||||
*/
|
||||
redirector = iptables;
|
||||
}
|
||||
|
||||
redsocks {
|
||||
/* `local_ip' defaults to 127.0.0.1 for security reasons,
|
||||
* use 0.0.0.0 if you want to listen on every interface.
|
||||
* `local_*' are used as port to redirect to.
|
||||
*/
|
||||
local_ip = 127.0.0.1;
|
||||
local_port = 12345;
|
||||
|
||||
// listen() queue length. Default value is SOMAXCONN and it should be
|
||||
// good enough for most of us.
|
||||
// listenq = 128; // SOMAXCONN equals 128 on my Linux box.
|
||||
|
||||
// `max_accept_backoff` is a delay to retry `accept()` after accept
|
||||
// failure (e.g. due to lack of file descriptors). It's measured in
|
||||
// milliseconds and maximal value is 65535. `min_accept_backoff` is
|
||||
// used as initial backoff value and as a damper for `accept() after
|
||||
// close()` logic.
|
||||
// min_accept_backoff = 100;
|
||||
// max_accept_backoff = 60000;
|
||||
|
||||
// `ip' and `port' are IP and tcp-port of proxy-server
|
||||
// You can also use hostname instead of IP, only one (random)
|
||||
// address of multihomed host will be used.
|
||||
ip = example.org;
|
||||
port = 1080;
|
||||
|
||||
|
||||
// known types: socks4, socks5, http-connect, http-relay
|
||||
type = socks5;
|
||||
|
||||
// login = "foobar";
|
||||
// password = "baz";
|
||||
}
|
||||
|
||||
redudp {
|
||||
// `local_ip' should not be 0.0.0.0 as it's also used for outgoing
|
||||
// packets that are sent as replies - and it should be fixed
|
||||
// if we want NAT to work properly.
|
||||
local_ip = 127.0.0.1;
|
||||
local_port = 10053;
|
||||
|
||||
// `ip' and `port' of socks5 proxy server.
|
||||
ip = 10.0.0.1;
|
||||
port = 1080;
|
||||
login = username;
|
||||
password = pazzw0rd;
|
||||
|
||||
// redsocks knows about two options while redirecting UDP packets at
|
||||
// linux: TPROXY and REDIRECT. TPROXY requires more complex routing
|
||||
// configuration and fresh kernel (>= 2.6.37 according to squid
|
||||
// developers[1]) but has hack-free way to get original destination
|
||||
// address, REDIRECT is easier to configure, but requires `dest_ip` and
|
||||
// `dest_port` to be set, limiting packet redirection to single
|
||||
// destination.
|
||||
// [1] http://wiki.squid-cache.org/Features/Tproxy4
|
||||
dest_ip = 8.8.8.8;
|
||||
dest_port = 53;
|
||||
|
||||
udp_timeout = 30;
|
||||
udp_timeout_stream = 180;
|
||||
}
|
||||
|
||||
dnstc {
|
||||
// fake and really dumb DNS server that returns "truncated answer" to
|
||||
// every query via UDP, RFC-compliant resolver should repeat same query
|
||||
// via TCP in this case.
|
||||
local_ip = 127.0.0.1;
|
||||
local_port = 5300;
|
||||
}
|
||||
|
||||
// you can add more `redsocks' and `redudp' sections if you need.
|
36
net/redsocks/files/redsocks.init
Normal file
36
net/redsocks/files/redsocks.init
Normal file
|
@ -0,0 +1,36 @@
|
|||
#!/bin/sh /etc/rc.common
|
||||
# Copyright (C) 2007 OpenWrt.org
|
||||
|
||||
START=90
|
||||
|
||||
# check if configuration exists
|
||||
[ -e "/etc/redsocks.conf" ] || exit 0
|
||||
|
||||
start() {
|
||||
if [ -e "/var/run/redsocks.pid" ]; then
|
||||
echo "redsocks is already running"
|
||||
exit 0
|
||||
fi
|
||||
|
||||
/bin/echo -n "running redsocks ..."
|
||||
|
||||
# startup the safety-wrapper for the daemon
|
||||
/usr/sbin/redsocks -p /var/run/redsocks.pid
|
||||
|
||||
/bin/echo " done"
|
||||
}
|
||||
|
||||
stop() {
|
||||
if [ ! -e "/var/run/redsocks.pid" ]; then
|
||||
echo "redsocks is not running"
|
||||
exit 0
|
||||
fi
|
||||
|
||||
/bin/echo -n "stopping redsocks ..."
|
||||
|
||||
# kill the process
|
||||
/bin/kill $(cat /var/run/redsocks.pid)
|
||||
rm /var/run/redsocks.pid
|
||||
|
||||
echo " done"
|
||||
}
|
|
@ -0,0 +1,53 @@
|
|||
From 290f19972e9f7b74f818ae211cb535e32f1f314f Mon Sep 17 00:00:00 2001
|
||||
From: Leonid Evdokimov <leon@darkk.net.ru>
|
||||
Date: Tue, 10 Apr 2012 00:57:26 +0400
|
||||
Subject: [PATCH 01/12] Fix bug in DNS resolution - results were ignored (since
|
||||
8179a1ff).
|
||||
|
||||
---
|
||||
parser.c | 10 +++++-----
|
||||
1 file changed, 5 insertions(+), 5 deletions(-)
|
||||
|
||||
diff --git a/parser.c b/parser.c
|
||||
index 85d3533..6198828 100644
|
||||
--- a/parser.c
|
||||
+++ b/parser.c
|
||||
@@ -295,22 +295,22 @@ static int vp_in_addr(parser_context *context, void *addr, const char *token)
|
||||
memcpy(addr, &ia, sizeof(ia));
|
||||
}
|
||||
else {
|
||||
- struct addrinfo *addr, hints;
|
||||
+ struct addrinfo *ainfo, hints;
|
||||
int err;
|
||||
memset(&hints, 0, sizeof(hints));
|
||||
hints.ai_family = AF_INET; /* IPv4-only */
|
||||
hints.ai_socktype = SOCK_STREAM; /* I want to have one address once and ONLY once, that's why I specify socktype and protocol */
|
||||
hints.ai_protocol = IPPROTO_TCP;
|
||||
hints.ai_flags = AI_ADDRCONFIG; /* I don't need IPv4 addrs without IPv4 connectivity */
|
||||
- err = getaddrinfo(token, NULL, &hints, &addr);
|
||||
+ err = getaddrinfo(token, NULL, &hints, &ainfo);
|
||||
if (err == 0) {
|
||||
int count, taken;
|
||||
struct addrinfo *iter;
|
||||
struct sockaddr_in *resolved_addr;
|
||||
- for (iter = addr, count = 0; iter; iter = iter->ai_next, ++count)
|
||||
+ for (iter = ainfo, count = 0; iter; iter = iter->ai_next, ++count)
|
||||
;
|
||||
taken = rand() % count;
|
||||
- for (iter = addr; taken > 0; iter = iter->ai_next, --taken)
|
||||
+ for (iter = ainfo; taken > 0; iter = iter->ai_next, --taken)
|
||||
;
|
||||
resolved_addr = (struct sockaddr_in*)iter->ai_addr;
|
||||
assert(resolved_addr->sin_family == iter->ai_family && iter->ai_family == AF_INET);
|
||||
@@ -318,7 +318,7 @@ static int vp_in_addr(parser_context *context, void *addr, const char *token)
|
||||
log_error(LOG_WARNING, "%s resolves to %d addresses, using %s",
|
||||
token, count, inet_ntoa(resolved_addr->sin_addr));
|
||||
memcpy(addr, &resolved_addr->sin_addr, sizeof(ia));
|
||||
- freeaddrinfo(addr);
|
||||
+ freeaddrinfo(ainfo);
|
||||
}
|
||||
else {
|
||||
if (err == EAI_SYSTEM)
|
||||
--
|
||||
1.9.1
|
||||
|
161
net/redsocks/patches/0002-inet_ntop-red_inet_ntop.patch
Normal file
161
net/redsocks/patches/0002-inet_ntop-red_inet_ntop.patch
Normal file
|
@ -0,0 +1,161 @@
|
|||
From 6015b3a6f26e04dd5d78cd6c1320886fc9035612 Mon Sep 17 00:00:00 2001
|
||||
From: Leonid Evdokimov <leon@darkk.net.ru>
|
||||
Date: Tue, 10 Apr 2012 01:37:34 +0400
|
||||
Subject: [PATCH 02/12] inet_ntop -> red_inet_ntop
|
||||
|
||||
---
|
||||
redsocks.c | 13 ++++---------
|
||||
redudp.c | 19 +++++++++++--------
|
||||
utils.c | 37 +++++++++++++++++++++++++++++++++----
|
||||
utils.h | 7 +++++++
|
||||
4 files changed, 55 insertions(+), 21 deletions(-)
|
||||
|
||||
diff --git a/redsocks.c b/redsocks.c
|
||||
index d085e10..ba5eab2 100644
|
||||
--- a/redsocks.c
|
||||
+++ b/redsocks.c
|
||||
@@ -207,22 +207,17 @@ void redsocks_log_write_plain(
|
||||
int saved_errno = errno;
|
||||
struct evbuffer *fmt = evbuffer_new();
|
||||
va_list ap;
|
||||
- char clientaddr_str[INET6_ADDRSTRLEN], destaddr_str[INET6_ADDRSTRLEN];
|
||||
+ char clientaddr_str[RED_INET_ADDRSTRLEN], destaddr_str[RED_INET_ADDRSTRLEN];
|
||||
|
||||
if (!fmt) {
|
||||
log_errno(LOG_ERR, "evbuffer_new()");
|
||||
// no return, as I have to call va_start/va_end
|
||||
}
|
||||
|
||||
- if (!inet_ntop(clientaddr->sin_family, &clientaddr->sin_addr, clientaddr_str, sizeof(clientaddr_str)))
|
||||
- strncpy(clientaddr_str, "???", sizeof(clientaddr_str));
|
||||
- if (!inet_ntop(destaddr->sin_family, &destaddr->sin_addr, destaddr_str, sizeof(destaddr_str)))
|
||||
- strncpy(destaddr_str, "???", sizeof(destaddr_str));
|
||||
-
|
||||
if (fmt) {
|
||||
- evbuffer_add_printf(fmt, "[%s:%i->%s:%i]: %s",
|
||||
- clientaddr_str, ntohs(clientaddr->sin_port),
|
||||
- destaddr_str, ntohs(destaddr->sin_port),
|
||||
+ evbuffer_add_printf(fmt, "[%s->%s]: %s",
|
||||
+ red_inet_ntop(clientaddr, clientaddr_str, sizeof(clientaddr_str)),
|
||||
+ red_inet_ntop(destaddr, destaddr_str, sizeof(destaddr_str)),
|
||||
orig_fmt);
|
||||
}
|
||||
|
||||
diff --git a/redudp.c b/redudp.c
|
||||
index 0a97852..9516a50 100644
|
||||
--- a/redudp.c
|
||||
+++ b/redudp.c
|
||||
@@ -436,10 +436,9 @@ static void redudp_pkt_from_socks(int fd, short what, void *_arg)
|
||||
return;
|
||||
|
||||
if (memcmp(&udprelayaddr, &client->udprelayaddr, sizeof(udprelayaddr)) != 0) {
|
||||
- char buf[INET6_ADDRSTRLEN];
|
||||
- const char *addr = inet_ntop(udprelayaddr.sin_family, &udprelayaddr.sin_addr, buf, sizeof(buf));
|
||||
- redudp_log_error(client, LOG_NOTICE, "Got packet from unexpected address %s:%u.",
|
||||
- addr ? addr : "?", ntohs(udprelayaddr.sin_port));
|
||||
+ char buf[RED_INET_ADDRSTRLEN];
|
||||
+ redudp_log_error(client, LOG_NOTICE, "Got packet from unexpected address %s.",
|
||||
+ red_inet_ntop(&udprelayaddr, buf, sizeof(buf)));
|
||||
return;
|
||||
}
|
||||
|
||||
@@ -459,10 +458,14 @@ static void redudp_pkt_from_socks(int fd, short what, void *_arg)
|
||||
if (pkt.header.ip.port != client->instance->config.destaddr.sin_port ||
|
||||
pkt.header.ip.addr != client->instance->config.destaddr.sin_addr.s_addr)
|
||||
{
|
||||
- char buf[INET6_ADDRSTRLEN];
|
||||
- const char *addr = inet_ntop(AF_INET, &pkt.header.ip.addr, buf, sizeof(buf));
|
||||
- redudp_log_error(client, LOG_NOTICE, "Socks5 server relayed packet from unexpected address %s:%u.",
|
||||
- addr ? addr : "?", ntohs(pkt.header.ip.port));
|
||||
+ char buf[RED_INET_ADDRSTRLEN];
|
||||
+ struct sockaddr_in pktaddr = {
|
||||
+ .sin_family = AF_INET,
|
||||
+ .sin_addr = { pkt.header.ip.addr },
|
||||
+ .sin_port = pkt.header.ip.port,
|
||||
+ };
|
||||
+ redudp_log_error(client, LOG_NOTICE, "Socks5 server relayed packet from unexpected address %s.",
|
||||
+ red_inet_ntop(&pktaddr, buf, sizeof(buf)));
|
||||
return;
|
||||
}
|
||||
|
||||
diff --git a/utils.c b/utils.c
|
||||
index c6ced51..6e1f3af 100644
|
||||
--- a/utils.c
|
||||
+++ b/utils.c
|
||||
@@ -18,6 +18,7 @@
|
||||
#include <errno.h>
|
||||
#include <assert.h>
|
||||
#include <fcntl.h>
|
||||
+#include <string.h>
|
||||
#include <sys/socket.h>
|
||||
#include <netinet/in.h>
|
||||
#include <arpa/inet.h>
|
||||
@@ -42,10 +43,9 @@ int red_recv_udp_pkt(int fd, char *buf, size_t buflen, struct sockaddr_in *inadd
|
||||
}
|
||||
|
||||
if (pktlen >= buflen) {
|
||||
- char buf[INET6_ADDRSTRLEN];
|
||||
- const char *addr = inet_ntop(inaddr->sin_family, &inaddr->sin_addr, buf, sizeof(buf));
|
||||
- log_error(LOG_WARNING, "wow! Truncated udp packet of size %zd from %s:%u! impossible! dropping it...",
|
||||
- pktlen, addr ? addr : "?", ntohs(inaddr->sin_port));
|
||||
+ char buf[RED_INET_ADDRSTRLEN];
|
||||
+ log_error(LOG_WARNING, "wow! Truncated udp packet of size %zd from %s! impossible! dropping it...",
|
||||
+ pktlen, red_inet_ntop(inaddr, buf, sizeof(buf)));
|
||||
return -1;
|
||||
}
|
||||
|
||||
@@ -176,4 +176,33 @@ int red_is_socket_connected_ok(struct bufferevent *buffev)
|
||||
}
|
||||
}
|
||||
|
||||
+char *red_inet_ntop(const struct sockaddr_in* sa, char* buffer, size_t buffer_size)
|
||||
+{
|
||||
+ const char *retval = 0;
|
||||
+ size_t len = 0;
|
||||
+ uint16_t port;
|
||||
+ const char placeholder[] = "???:???";
|
||||
+
|
||||
+ assert(buffer_size >= sizeof(placeholder));
|
||||
+
|
||||
+ memset(buffer, buffer_size, 0);
|
||||
+ if (sa->sin_family == AF_INET) {
|
||||
+ retval = inet_ntop(AF_INET, &sa->sin_addr, buffer, buffer_size);
|
||||
+ port = ((struct sockaddr_in*)sa)->sin_port;
|
||||
+ }
|
||||
+ else if (sa->sin_family == AF_INET6) {
|
||||
+ retval = inet_ntop(AF_INET6, &((const struct sockaddr_in6*)sa)->sin6_addr, buffer, buffer_size);
|
||||
+ port = ((struct sockaddr_in6*)sa)->sin6_port;
|
||||
+ }
|
||||
+ if (retval) {
|
||||
+ assert(retval == buffer);
|
||||
+ len = strlen(retval);
|
||||
+ snprintf(buffer + len, buffer_size - len, ":%d", ntohs(port));
|
||||
+ }
|
||||
+ else {
|
||||
+ strcpy(buffer, placeholder);
|
||||
+ }
|
||||
+ return buffer;
|
||||
+}
|
||||
+
|
||||
/* vim:set tabstop=4 softtabstop=4 shiftwidth=4: */
|
||||
diff --git a/utils.h b/utils.h
|
||||
index f691b77..d3af00f 100644
|
||||
--- a/utils.h
|
||||
+++ b/utils.h
|
||||
@@ -57,6 +57,13 @@ int fcntl_nonblock(int fd);
|
||||
(what) & EVBUFFER_TIMEOUT ? "EVBUFFER_TIMEOUT" : "0", \
|
||||
(what) & ~(EVBUFFER_READ|EVBUFFER_WRITE|EVBUFFER_EOF|EVBUFFER_ERROR|EVBUFFER_TIMEOUT)
|
||||
|
||||
+#if INET6_ADDRSTRLEN < INET_ADDRSTRLEN
|
||||
+# error Impossible happens: INET6_ADDRSTRLEN < INET_ADDRSTRLEN
|
||||
+#else
|
||||
+# define RED_INET_ADDRSTRLEN (INET6_ADDRSTRLEN + 1 + 5 + 1) // addr + : + port + \0
|
||||
+#endif
|
||||
+char *red_inet_ntop(const struct sockaddr_in* sa, char* buffer, size_t buffer_size);
|
||||
+
|
||||
/* vim:set tabstop=4 softtabstop=4 shiftwidth=4: */
|
||||
/* vim:set foldmethod=marker foldlevel=32 foldmarker={,}: */
|
||||
#endif /* UTILS_H_SAT_FEB__2_02_24_05_2008 */
|
||||
--
|
||||
1.9.1
|
||||
|
|
@ -0,0 +1,449 @@
|
|||
From 709646d59d96cb73a7e70347f37de9823e4e5f14 Mon Sep 17 00:00:00 2001
|
||||
From: Leonid Evdokimov <leon@darkk.net.ru>
|
||||
Date: Fri, 13 Apr 2012 01:57:23 +0400
|
||||
Subject: [PATCH 03/12] Initial support for UDP + TPROXY redirection. No more
|
||||
dest_ip in redudp.
|
||||
|
||||
* TPROXY requires Linux 2.6.29+ (see man 7 ip[1]).
|
||||
* all redsocks code is running as root to bind to arbitrary port.
|
||||
* Non-Linux and old-Linux builds are broken at the moment.
|
||||
|
||||
[1] http://www.kernel.org/doc/man-pages/online/pages/man7/ip.7.html
|
||||
---
|
||||
dnstc.c | 2 +-
|
||||
redudp.c | 197 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++-----
|
||||
redudp.h | 2 +
|
||||
utils.c | 43 +++++++++++++-
|
||||
utils.h | 2 +-
|
||||
5 files changed, 227 insertions(+), 19 deletions(-)
|
||||
|
||||
diff --git a/dnstc.c b/dnstc.c
|
||||
index 43881d8..5f9fedd 100644
|
||||
--- a/dnstc.c
|
||||
+++ b/dnstc.c
|
||||
@@ -68,7 +68,7 @@ static void dnstc_pkt_from_client(int fd, short what, void *_arg)
|
||||
ssize_t pktlen, outgoing;
|
||||
|
||||
assert(fd == EVENT_FD(&self->listener));
|
||||
- pktlen = red_recv_udp_pkt(fd, buf.raw, sizeof(buf), &clientaddr);
|
||||
+ pktlen = red_recv_udp_pkt(fd, buf.raw, sizeof(buf), &clientaddr, NULL);
|
||||
if (pktlen == -1)
|
||||
return;
|
||||
|
||||
diff --git a/redudp.c b/redudp.c
|
||||
index 9516a50..262af3e 100644
|
||||
--- a/redudp.c
|
||||
+++ b/redudp.c
|
||||
@@ -15,6 +15,7 @@
|
||||
*/
|
||||
|
||||
#include <stdlib.h>
|
||||
+#include <search.h>
|
||||
#include <string.h>
|
||||
#include <sys/types.h>
|
||||
#include <sys/uio.h>
|
||||
@@ -33,30 +34,157 @@
|
||||
#include "redudp.h"
|
||||
|
||||
#define redudp_log_error(client, prio, msg...) \
|
||||
- redsocks_log_write_plain(__FILE__, __LINE__, __func__, 0, &(client)->clientaddr, &(client)->instance->config.destaddr, prio, ## msg)
|
||||
+ redsocks_log_write_plain(__FILE__, __LINE__, __func__, 0, &(client)->clientaddr, get_destaddr(client), prio, ## msg)
|
||||
#define redudp_log_errno(client, prio, msg...) \
|
||||
- redsocks_log_write_plain(__FILE__, __LINE__, __func__, 1, &(client)->clientaddr, &(client)->instance->config.destaddr, prio, ## msg)
|
||||
+ redsocks_log_write_plain(__FILE__, __LINE__, __func__, 1, &(client)->clientaddr, get_destaddr(client), prio, ## msg)
|
||||
|
||||
static void redudp_pkt_from_socks(int fd, short what, void *_arg);
|
||||
static void redudp_drop_client(redudp_client *client);
|
||||
static void redudp_fini_instance(redudp_instance *instance);
|
||||
static int redudp_fini();
|
||||
+static int redudp_transparent(int fd);
|
||||
|
||||
typedef struct redudp_expected_assoc_reply_t {
|
||||
socks5_reply h;
|
||||
socks5_addr_ipv4 ip;
|
||||
} PACKED redudp_expected_assoc_reply;
|
||||
|
||||
+struct bound_udp4_key {
|
||||
+ struct in_addr sin_addr;
|
||||
+ uint16_t sin_port;
|
||||
+};
|
||||
+
|
||||
+struct bound_udp4 {
|
||||
+ struct bound_udp4_key key;
|
||||
+ int ref;
|
||||
+ int fd;
|
||||
+};
|
||||
+
|
||||
/***********************************************************************
|
||||
* Helpers
|
||||
*/
|
||||
+// TODO: separate binding to privileged process (this operation requires uid-0)
|
||||
+static void* root_bound_udp4 = NULL; // to avoid two binds to same IP:port
|
||||
+
|
||||
+static int bound_udp4_cmp(const void *a, const void *b)
|
||||
+{
|
||||
+ return memcmp(a, b, sizeof(struct bound_udp4_key));
|
||||
+}
|
||||
+
|
||||
+static void bound_udp4_mkkey(struct bound_udp4_key *key, const struct sockaddr_in *addr)
|
||||
+{
|
||||
+ memset(key, 0, sizeof(*key));
|
||||
+ key->sin_addr = addr->sin_addr;
|
||||
+ key->sin_port = addr->sin_port;
|
||||
+}
|
||||
+
|
||||
+static int bound_udp4_get(const struct sockaddr_in *addr)
|
||||
+{
|
||||
+ struct bound_udp4_key key;
|
||||
+ struct bound_udp4 *node, **pnode;
|
||||
+
|
||||
+ bound_udp4_mkkey(&key, addr);
|
||||
+ // I assume, that memory allocation for lookup is awful, so I use
|
||||
+ // tfind/tsearch pair instead of tsearch/check-result.
|
||||
+ pnode = tfind(&key, &root_bound_udp4, bound_udp4_cmp);
|
||||
+ if (pnode) {
|
||||
+ assert((*pnode)->ref > 0);
|
||||
+ (*pnode)->ref++;
|
||||
+ return (*pnode)->fd;
|
||||
+ }
|
||||
+
|
||||
+ node = calloc(1, sizeof(*node));
|
||||
+ if (!node) {
|
||||
+ log_errno(LOG_ERR, "calloc");
|
||||
+ goto fail;
|
||||
+ }
|
||||
+
|
||||
+ node->key = key;
|
||||
+ node->ref = 1;
|
||||
+ node->fd = socket(AF_INET, SOCK_DGRAM, 0);
|
||||
+ if (node->fd == -1) {
|
||||
+ log_errno(LOG_ERR, "socket");
|
||||
+ goto fail;
|
||||
+ }
|
||||
+
|
||||
+ if (0 != redudp_transparent(node->fd))
|
||||
+ goto fail;
|
||||
+
|
||||
+ if (0 != bind(node->fd, (struct sockaddr*)addr, sizeof(*addr))) {
|
||||
+ log_errno(LOG_ERR, "bind");
|
||||
+ goto fail;
|
||||
+ }
|
||||
+
|
||||
+ pnode = tsearch(node, &root_bound_udp4, bound_udp4_cmp);
|
||||
+ if (!pnode) {
|
||||
+ log_errno(LOG_ERR, "tsearch(%p) == %p", node, pnode);
|
||||
+ goto fail;
|
||||
+ }
|
||||
+ assert(node == *pnode);
|
||||
+
|
||||
+ return node->fd;
|
||||
+
|
||||
+fail:
|
||||
+ if (node) {
|
||||
+ if (node->fd != -1)
|
||||
+ redsocks_close(node->fd);
|
||||
+ free(node);
|
||||
+ }
|
||||
+ return -1;
|
||||
+}
|
||||
+
|
||||
+static void bound_udp4_put(const struct sockaddr_in *addr)
|
||||
+{
|
||||
+ struct bound_udp4_key key;
|
||||
+ struct bound_udp4 **pnode, *node;
|
||||
+ void *parent;
|
||||
+
|
||||
+ bound_udp4_mkkey(&key, addr);
|
||||
+ pnode = tfind(&key, &root_bound_udp4, bound_udp4_cmp);
|
||||
+ assert(pnode && (*pnode)->ref > 0);
|
||||
+
|
||||
+ node = *pnode;
|
||||
+
|
||||
+ node->ref--;
|
||||
+ if (node->ref)
|
||||
+ return;
|
||||
+
|
||||
+ parent = tdelete(node, &root_bound_udp4, bound_udp4_cmp);
|
||||
+ assert(parent);
|
||||
+
|
||||
+ redsocks_close(node->fd); // expanding `pnode` to avoid use after free
|
||||
+ free(node);
|
||||
+}
|
||||
+
|
||||
+static int redudp_transparent(int fd)
|
||||
+{
|
||||
+ int on = 1;
|
||||
+ int error = setsockopt(fd, SOL_IP, IP_TRANSPARENT, &on, sizeof(on));
|
||||
+ if (error)
|
||||
+ log_errno(LOG_ERR, "setsockopt(..., SOL_IP, IP_TRANSPARENT)");
|
||||
+ return error;
|
||||
+}
|
||||
+
|
||||
+static int do_tproxy(redudp_instance* instance)
|
||||
+{
|
||||
+ return instance->config.destaddr.sin_addr.s_addr == 0;
|
||||
+}
|
||||
+
|
||||
+static struct sockaddr_in* get_destaddr(redudp_client *client)
|
||||
+{
|
||||
+ if (do_tproxy(client->instance))
|
||||
+ return &client->destaddr;
|
||||
+ else
|
||||
+ return &client->instance->config.destaddr;
|
||||
+}
|
||||
+
|
||||
static void redudp_fill_preamble(socks5_udp_preabmle *preamble, redudp_client *client)
|
||||
{
|
||||
preamble->reserved = 0;
|
||||
preamble->frag_no = 0; /* fragmentation is not supported */
|
||||
preamble->addrtype = socks5_addrtype_ipv4;
|
||||
- preamble->ip.addr = client->instance->config.destaddr.sin_addr.s_addr;
|
||||
- preamble->ip.port = client->instance->config.destaddr.sin_port;
|
||||
+ preamble->ip.addr = get_destaddr(client)->sin_addr.s_addr;
|
||||
+ preamble->ip.port = get_destaddr(client)->sin_port;
|
||||
}
|
||||
|
||||
static struct evbuffer* socks5_mkmethods_plain_wrapper(void *p)
|
||||
@@ -104,6 +232,8 @@ static void redudp_drop_client(redudp_client *client)
|
||||
redudp_log_errno(client, LOG_ERR, "event_del");
|
||||
redsocks_close(fd);
|
||||
}
|
||||
+ if (client->sender_fd != -1)
|
||||
+ bound_udp4_put(&client->destaddr);
|
||||
list_for_each_entry_safe(q, tmp, &client->queue, list) {
|
||||
list_del(&q->list);
|
||||
free(q);
|
||||
@@ -344,7 +474,8 @@ static void redudp_relay_connected(struct bufferevent *buffev, void *_arg)
|
||||
redudp_client *client = _arg;
|
||||
int do_password = socks5_is_valid_cred(client->instance->config.login, client->instance->config.password);
|
||||
int error;
|
||||
- redudp_log_error(client, LOG_DEBUG, "<trace>");
|
||||
+ char relayaddr_str[RED_INET_ADDRSTRLEN];
|
||||
+ redudp_log_error(client, LOG_DEBUG, "via %s", red_inet_ntop(&client->instance->config.relayaddr, relayaddr_str, sizeof(relayaddr_str)));
|
||||
|
||||
if (!red_is_socket_connected_ok(buffev)) {
|
||||
redudp_log_errno(client, LOG_NOTICE, "red_is_socket_connected_ok");
|
||||
@@ -382,7 +513,7 @@ static void redudp_timeout(int fd, short what, void *_arg)
|
||||
redudp_drop_client(client);
|
||||
}
|
||||
|
||||
-static void redudp_first_pkt_from_client(redudp_instance *self, struct sockaddr_in *clientaddr, char *buf, size_t pktlen)
|
||||
+static void redudp_first_pkt_from_client(redudp_instance *self, struct sockaddr_in *clientaddr, struct sockaddr_in *destaddr, char *buf, size_t pktlen)
|
||||
{
|
||||
redudp_client *client = calloc(1, sizeof(*client));
|
||||
|
||||
@@ -395,9 +526,13 @@ static void redudp_first_pkt_from_client(redudp_instance *self, struct sockaddr_
|
||||
INIT_LIST_HEAD(&client->queue);
|
||||
client->instance = self;
|
||||
memcpy(&client->clientaddr, clientaddr, sizeof(*clientaddr));
|
||||
+ if (destaddr)
|
||||
+ memcpy(&client->destaddr, destaddr, sizeof(client->destaddr));
|
||||
evtimer_set(&client->timeout, redudp_timeout, client);
|
||||
// XXX: self->relay_ss->init(client);
|
||||
|
||||
+ client->sender_fd = -1; // it's postponed until socks-server replies to avoid trivial DoS
|
||||
+
|
||||
client->relay = red_connect_relay(&client->instance->config.relayaddr,
|
||||
redudp_relay_connected, redudp_relay_error, client);
|
||||
if (!client->relay)
|
||||
@@ -431,7 +566,7 @@ static void redudp_pkt_from_socks(int fd, short what, void *_arg)
|
||||
|
||||
assert(fd == EVENT_FD(&client->udprelay));
|
||||
|
||||
- pktlen = red_recv_udp_pkt(fd, pkt.buf, sizeof(pkt.buf), &udprelayaddr);
|
||||
+ pktlen = red_recv_udp_pkt(fd, pkt.buf, sizeof(pkt.buf), &udprelayaddr, NULL);
|
||||
if (pktlen == -1)
|
||||
return;
|
||||
|
||||
@@ -455,8 +590,8 @@ static void redudp_pkt_from_socks(int fd, short what, void *_arg)
|
||||
return;
|
||||
}
|
||||
|
||||
- if (pkt.header.ip.port != client->instance->config.destaddr.sin_port ||
|
||||
- pkt.header.ip.addr != client->instance->config.destaddr.sin_addr.s_addr)
|
||||
+ if (pkt.header.ip.port != get_destaddr(client)->sin_port ||
|
||||
+ pkt.header.ip.addr != get_destaddr(client)->sin_addr.s_addr)
|
||||
{
|
||||
char buf[RED_INET_ADDRSTRLEN];
|
||||
struct sockaddr_in pktaddr = {
|
||||
@@ -472,8 +607,18 @@ static void redudp_pkt_from_socks(int fd, short what, void *_arg)
|
||||
redsocks_time(&client->last_relay_event);
|
||||
redudp_bump_timeout(client);
|
||||
|
||||
+ if (do_tproxy(client->instance) && client->sender_fd == -1) {
|
||||
+ client->sender_fd = bound_udp4_get(&client->destaddr);
|
||||
+ if (client->sender_fd == -1) {
|
||||
+ redudp_log_error(client, LOG_WARNING, "bound_udp4_get failure");
|
||||
+ return;
|
||||
+ }
|
||||
+ }
|
||||
+
|
||||
fwdlen = pktlen - sizeof(pkt.header);
|
||||
- outgoing = sendto(EVENT_FD(&client->instance->listener),
|
||||
+ outgoing = sendto(do_tproxy(client->instance)
|
||||
+ ? client->sender_fd
|
||||
+ : EVENT_FD(&client->instance->listener),
|
||||
pkt.buf + sizeof(pkt.header), fwdlen, 0,
|
||||
(struct sockaddr*)&client->clientaddr, sizeof(client->clientaddr));
|
||||
if (outgoing != fwdlen) {
|
||||
@@ -486,18 +631,21 @@ static void redudp_pkt_from_socks(int fd, short what, void *_arg)
|
||||
static void redudp_pkt_from_client(int fd, short what, void *_arg)
|
||||
{
|
||||
redudp_instance *self = _arg;
|
||||
- struct sockaddr_in clientaddr;
|
||||
+ struct sockaddr_in clientaddr, destaddr, *pdestaddr;
|
||||
char buf[0xFFFF]; // UDP packet can't be larger then that
|
||||
ssize_t pktlen;
|
||||
redudp_client *tmp, *client = NULL;
|
||||
|
||||
+ pdestaddr = do_tproxy(self) ? &destaddr : NULL;
|
||||
+
|
||||
assert(fd == EVENT_FD(&self->listener));
|
||||
- pktlen = red_recv_udp_pkt(fd, buf, sizeof(buf), &clientaddr);
|
||||
+ pktlen = red_recv_udp_pkt(fd, buf, sizeof(buf), &clientaddr, pdestaddr);
|
||||
if (pktlen == -1)
|
||||
return;
|
||||
|
||||
// TODO: this lookup may be SLOOOOOW.
|
||||
list_for_each_entry(tmp, &self->clients, list) {
|
||||
+ // TODO: check destaddr
|
||||
if (0 == memcmp(&clientaddr, &tmp->clientaddr, sizeof(clientaddr))) {
|
||||
client = tmp;
|
||||
break;
|
||||
@@ -515,7 +663,7 @@ static void redudp_pkt_from_client(int fd, short what, void *_arg)
|
||||
}
|
||||
}
|
||||
else {
|
||||
- redudp_first_pkt_from_client(self, &clientaddr, buf, pktlen);
|
||||
+ redudp_first_pkt_from_client(self, &clientaddr, pdestaddr, buf, pktlen);
|
||||
}
|
||||
}
|
||||
|
||||
@@ -554,7 +702,6 @@ static int redudp_onenter(parser_section *section)
|
||||
instance->config.relayaddr.sin_family = AF_INET;
|
||||
instance->config.relayaddr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
|
||||
instance->config.destaddr.sin_family = AF_INET;
|
||||
- instance->config.destaddr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
|
||||
instance->config.max_pktqueue = 5;
|
||||
instance->config.udp_timeout = 30;
|
||||
instance->config.udp_timeout_stream = 180;
|
||||
@@ -614,6 +761,28 @@ static int redudp_init_instance(redudp_instance *instance)
|
||||
goto fail;
|
||||
}
|
||||
|
||||
+ if (do_tproxy(instance)) {
|
||||
+ int on = 1;
|
||||
+ char buf[RED_INET_ADDRSTRLEN];
|
||||
+ // iptables TPROXY target does not send packets to non-transparent sockets
|
||||
+ if (0 != redudp_transparent(fd))
|
||||
+ goto fail;
|
||||
+
|
||||
+ error = setsockopt(fd, SOL_IP, IP_RECVORIGDSTADDR, &on, sizeof(on));
|
||||
+ if (error) {
|
||||
+ log_errno(LOG_ERR, "setsockopt(listener, SOL_IP, IP_RECVORIGDSTADDR)");
|
||||
+ goto fail;
|
||||
+ }
|
||||
+
|
||||
+ log_error(LOG_DEBUG, "redudp @ %s: TPROXY", red_inet_ntop(&instance->config.bindaddr, buf, sizeof(buf)));
|
||||
+ }
|
||||
+ else {
|
||||
+ char buf1[RED_INET_ADDRSTRLEN], buf2[RED_INET_ADDRSTRLEN];
|
||||
+ log_error(LOG_DEBUG, "redudp @ %s: destaddr=%s",
|
||||
+ red_inet_ntop(&instance->config.bindaddr, buf1, sizeof(buf1)),
|
||||
+ red_inet_ntop(&instance->config.destaddr, buf2, sizeof(buf2)));
|
||||
+ }
|
||||
+
|
||||
error = bind(fd, (struct sockaddr*)&instance->config.bindaddr, sizeof(instance->config.bindaddr));
|
||||
if (error) {
|
||||
log_errno(LOG_ERR, "bind");
|
||||
diff --git a/redudp.h b/redudp.h
|
||||
index 308bd33..3f1d9d1 100644
|
||||
--- a/redudp.h
|
||||
+++ b/redudp.h
|
||||
@@ -24,6 +24,8 @@ typedef struct redudp_client_t {
|
||||
list_head list;
|
||||
redudp_instance *instance;
|
||||
struct sockaddr_in clientaddr;
|
||||
+ struct sockaddr_in destaddr;
|
||||
+ int sender_fd; // shared between several clients socket (bound to `destaddr`)
|
||||
struct event timeout;
|
||||
struct bufferevent *relay;
|
||||
struct event udprelay;
|
||||
diff --git a/utils.c b/utils.c
|
||||
index 6e1f3af..afdeea8 100644
|
||||
--- a/utils.c
|
||||
+++ b/utils.c
|
||||
@@ -26,17 +26,54 @@
|
||||
#include "utils.h"
|
||||
#include "redsocks.h" // for redsocks_close
|
||||
|
||||
-int red_recv_udp_pkt(int fd, char *buf, size_t buflen, struct sockaddr_in *inaddr)
|
||||
+int red_recv_udp_pkt(int fd, char *buf, size_t buflen, struct sockaddr_in *inaddr, struct sockaddr_in *toaddr)
|
||||
{
|
||||
socklen_t addrlen = sizeof(*inaddr);
|
||||
ssize_t pktlen;
|
||||
-
|
||||
- pktlen = recvfrom(fd, buf, buflen, 0, (struct sockaddr*)inaddr, &addrlen);
|
||||
+ struct msghdr msg;
|
||||
+ struct iovec io;
|
||||
+ char control[1024];
|
||||
+
|
||||
+ memset(&msg, 0, sizeof(msg));
|
||||
+ msg.msg_name = inaddr;
|
||||
+ msg.msg_namelen = sizeof(*inaddr);
|
||||
+ msg.msg_iov = &io;
|
||||
+ msg.msg_iovlen = 1;
|
||||
+ msg.msg_control = control;
|
||||
+ msg.msg_controllen = sizeof(control);
|
||||
+ io.iov_base = buf;
|
||||
+ io.iov_len = buflen;
|
||||
+
|
||||
+ pktlen = recvmsg(fd, &msg, 0);
|
||||
if (pktlen == -1) {
|
||||
log_errno(LOG_WARNING, "recvfrom");
|
||||
return -1;
|
||||
}
|
||||
|
||||
+ if (toaddr) {
|
||||
+ memset(toaddr, 0, sizeof(*toaddr));
|
||||
+ for (struct cmsghdr* cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) {
|
||||
+ if (
|
||||
+ cmsg->cmsg_level == SOL_IP &&
|
||||
+ cmsg->cmsg_type == IP_ORIGDSTADDR &&
|
||||
+ cmsg->cmsg_len >= CMSG_LEN(sizeof(*toaddr))
|
||||
+ ) {
|
||||
+ struct sockaddr_in* cmsgaddr = (struct sockaddr_in*)CMSG_DATA(cmsg);
|
||||
+ char buf[RED_INET_ADDRSTRLEN];
|
||||
+ log_error(LOG_DEBUG, "IP_ORIGDSTADDR: %s", red_inet_ntop(cmsgaddr, buf, sizeof(buf)));
|
||||
+ memcpy(toaddr, cmsgaddr, sizeof(*toaddr));
|
||||
+ }
|
||||
+ else {
|
||||
+ log_error(LOG_WARNING, "unexepcted cmsg (level,type) = (%d,%d)",
|
||||
+ cmsg->cmsg_level, cmsg->cmsg_type);
|
||||
+ }
|
||||
+ }
|
||||
+ if (toaddr->sin_family != AF_INET) {
|
||||
+ log_error(LOG_WARNING, "(SOL_IP, IP_ORIGDSTADDR) not found");
|
||||
+ return -1;
|
||||
+ }
|
||||
+ }
|
||||
+
|
||||
if (addrlen != sizeof(*inaddr)) {
|
||||
log_error(LOG_WARNING, "unexpected address length %u instead of %zu", addrlen, sizeof(*inaddr));
|
||||
return -1;
|
||||
diff --git a/utils.h b/utils.h
|
||||
index d3af00f..c2277e9 100644
|
||||
--- a/utils.h
|
||||
+++ b/utils.h
|
||||
@@ -44,7 +44,7 @@ char *redsocks_evbuffer_readline(struct evbuffer *buf);
|
||||
struct bufferevent* red_connect_relay(struct sockaddr_in *addr, evbuffercb writecb, everrorcb errorcb, void *cbarg);
|
||||
int red_socket_geterrno(struct bufferevent *buffev);
|
||||
int red_is_socket_connected_ok(struct bufferevent *buffev);
|
||||
-int red_recv_udp_pkt(int fd, char *buf, size_t buflen, struct sockaddr_in *inaddr);
|
||||
+int red_recv_udp_pkt(int fd, char *buf, size_t buflen, struct sockaddr_in *fromaddr, struct sockaddr_in *toaddr);
|
||||
|
||||
int fcntl_nonblock(int fd);
|
||||
|
||||
--
|
||||
1.9.1
|
||||
|
|
@ -0,0 +1,25 @@
|
|||
From b60b492602448b59aea194afd4991910d3613e5c Mon Sep 17 00:00:00 2001
|
||||
From: Cody Schafer <jmesmon@gmail.com>
|
||||
Date: Tue, 24 Apr 2012 04:33:13 -0500
|
||||
Subject: [PATCH 04/12] Fix transposition of memset parameters.
|
||||
|
||||
---
|
||||
utils.c | 2 +-
|
||||
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||
|
||||
diff --git a/utils.c b/utils.c
|
||||
index afdeea8..31c6894 100644
|
||||
--- a/utils.c
|
||||
+++ b/utils.c
|
||||
@@ -222,7 +222,7 @@ char *red_inet_ntop(const struct sockaddr_in* sa, char* buffer, size_t buffer_si
|
||||
|
||||
assert(buffer_size >= sizeof(placeholder));
|
||||
|
||||
- memset(buffer, buffer_size, 0);
|
||||
+ memset(buffer, 0, buffer_size);
|
||||
if (sa->sin_family == AF_INET) {
|
||||
retval = inet_ntop(AF_INET, &sa->sin_addr, buffer, buffer_size);
|
||||
port = ((struct sockaddr_in*)sa)->sin_port;
|
||||
--
|
||||
1.9.1
|
||||
|
|
@ -0,0 +1,105 @@
|
|||
From 18e2b5ed1ffb3e7c5dfec8ff41b3027163f680ed Mon Sep 17 00:00:00 2001
|
||||
From: Leonid Evdokimov <leon@darkk.net.ru>
|
||||
Date: Wed, 12 Sep 2012 02:05:39 +0400
|
||||
Subject: [PATCH 09/12] Fix compilation on Ubuntu 10.04 LTS and (hopefully)
|
||||
Debian squeeze[1]
|
||||
|
||||
fixes #28, fixes #22, fixes #24
|
||||
[1] current "stable" release
|
||||
---
|
||||
libc-compat.h | 25 +++++++++++++++++++++++++
|
||||
libevent-compat.h | 11 +++++++++++
|
||||
redsocks.c | 1 +
|
||||
redudp.c | 1 +
|
||||
utils.c | 1 +
|
||||
5 files changed, 39 insertions(+)
|
||||
create mode 100644 libc-compat.h
|
||||
create mode 100644 libevent-compat.h
|
||||
|
||||
diff --git a/libc-compat.h b/libc-compat.h
|
||||
new file mode 100644
|
||||
index 0000000..adcf63b
|
||||
--- /dev/null
|
||||
+++ b/libc-compat.h
|
||||
@@ -0,0 +1,25 @@
|
||||
+#ifndef UUID_67C91670_FCCB_4855_BDF7_609F1EECB8B4
|
||||
+#define UUID_67C91670_FCCB_4855_BDF7_609F1EECB8B4
|
||||
+
|
||||
+/* all these definitions, are included into bits/in.h from libc6-dev 2.15-0ubuntu10
|
||||
+ * from Ubuntu 12.04 and is not included into libc6-dev 2.11.1-0ubuntu7.10 from
|
||||
+ * Ubuntu 10.04.
|
||||
+ * linux/in.h is not included directly because of lots of redefinitions,
|
||||
+ * extracting single value from linux/in.h is not done because it looks like
|
||||
+ * autotools reinvention */
|
||||
+#ifndef IP_ORIGDSTADDR
|
||||
+# warning Using hardcoded value for IP_ORIGDSTADDR as libc headers do not define it.
|
||||
+# define IP_ORIGDSTADDR 20
|
||||
+#endif
|
||||
+
|
||||
+#ifndef IP_RECVORIGDSTADDR
|
||||
+# warning Using hardcoded value for IP_RECVORIGDSTADDR as libc headers do not define it.
|
||||
+# define IP_RECVORIGDSTADDR IP_ORIGDSTADDR
|
||||
+#endif
|
||||
+
|
||||
+#ifndef IP_TRANSPARENT
|
||||
+# warning Using hardcoded value for IP_TRANSPARENT as libc headers do not define it.
|
||||
+# define IP_TRANSPARENT 19
|
||||
+#endif
|
||||
+
|
||||
+#endif // 67C91670_FCCB_4855_BDF7_609F1EECB8B4
|
||||
diff --git a/libevent-compat.h b/libevent-compat.h
|
||||
new file mode 100644
|
||||
index 0000000..a7f1ca1
|
||||
--- /dev/null
|
||||
+++ b/libevent-compat.h
|
||||
@@ -0,0 +1,11 @@
|
||||
+#ifndef UUID_FC148CFA_5ECC_488E_8A62_CD39406C9F1E
|
||||
+#define UUID_FC148CFA_5ECC_488E_8A62_CD39406C9F1E
|
||||
+
|
||||
+/* evutil_socket_t is macros in libevent-2.0, not typedef, libevent-1.4 is
|
||||
+ * still supported because of Ubuntu 10.04 LTS */
|
||||
+#ifndef evutil_socket_t
|
||||
+# warning Using hardcoded value for evutil_socket_t as libevent headers do not define it.
|
||||
+# define evutil_socket_t int
|
||||
+#endif
|
||||
+
|
||||
+#endif // FC148CFA_5ECC_488E_8A62_CD39406C9F1E
|
||||
diff --git a/redsocks.c b/redsocks.c
|
||||
index ba5eab2..878576f 100644
|
||||
--- a/redsocks.c
|
||||
+++ b/redsocks.c
|
||||
@@ -33,6 +33,7 @@
|
||||
#include "base.h"
|
||||
#include "redsocks.h"
|
||||
#include "utils.h"
|
||||
+#include "libevent-compat.h"
|
||||
|
||||
|
||||
#define REDSOCKS_RELAY_HALFBUFF 4096
|
||||
diff --git a/redudp.c b/redudp.c
|
||||
index 262af3e..05460dc 100644
|
||||
--- a/redudp.c
|
||||
+++ b/redudp.c
|
||||
@@ -32,6 +32,7 @@
|
||||
#include "main.h"
|
||||
#include "redsocks.h"
|
||||
#include "redudp.h"
|
||||
+#include "libc-compat.h"
|
||||
|
||||
#define redudp_log_error(client, prio, msg...) \
|
||||
redsocks_log_write_plain(__FILE__, __LINE__, __func__, 0, &(client)->clientaddr, get_destaddr(client), prio, ## msg)
|
||||
diff --git a/utils.c b/utils.c
|
||||
index 31c6894..7de3969 100644
|
||||
--- a/utils.c
|
||||
+++ b/utils.c
|
||||
@@ -25,6 +25,7 @@
|
||||
#include "log.h"
|
||||
#include "utils.h"
|
||||
#include "redsocks.h" // for redsocks_close
|
||||
+#include "libc-compat.h"
|
||||
|
||||
int red_recv_udp_pkt(int fd, char *buf, size_t buflen, struct sockaddr_in *inaddr, struct sockaddr_in *toaddr)
|
||||
{
|
||||
--
|
||||
1.9.1
|
||||
|
17
net/redsocks/patches/0006-fix_default_config_location.patch
Normal file
17
net/redsocks/patches/0006-fix_default_config_location.patch
Normal file
|
@ -0,0 +1,17 @@
|
|||
Description: change the default config file location
|
||||
redsocks by default looks for ./redsocks.conf. Change this to
|
||||
/etc/redsocks.conf for a more deterministic behaviour.
|
||||
Author: Apollon Oikonomopoulos <apoikos@gmail.com>
|
||||
Forwared: no
|
||||
Last-Update: 2013-04-23
|
||||
--- a/main.c
|
||||
+++ b/main.c
|
||||
@@ -39,7 +39,7 @@
|
||||
&dnstc_subsys,
|
||||
};
|
||||
|
||||
-static const char *confname = "redsocks.conf";
|
||||
+static const char *confname = "/etc/redsocks.conf";
|
||||
static const char *pidfile = NULL;
|
||||
|
||||
static void terminate(int sig, short what, void *_arg)
|
Loading…
Reference in a new issue