pax_global_header00006660000000000000000000000064134433003520014507gustar00rootroot0000000000000052 comment=e895fb713ac1c1e92ee0795645f220573181c6fb proxychains-ng-4.14/000077500000000000000000000000001344330035200144105ustar00rootroot00000000000000proxychains-ng-4.14/.gitignore000066400000000000000000000002061344330035200163760ustar00rootroot00000000000000proxychains4 *.bz2 *.xz *.o *.so *.la *.lo .deps/ .libs/ *.rcb *.out *~ *.patch version.h # Autoconf stuff libtool config.* stamp-h proxychains-ng-4.14/AUTHORS000066400000000000000000000012771344330035200154670ustar00rootroot00000000000000original code up to version 3.1 N3E7CR34TUR3. http://proxychains.sourceforge.net netcreature@users.sourceforge.net main.c, remote-dns, thread safety, bugfixes, build system, cleanups, mac support rofl0r. https://github.com/rofl0r/proxychains-ng localnet, bugfixes jianing yang. https://github.com/jianingy/proxychains https://sourceforge.net/projects/proxychains/forums/forum/644747/topic/3498696 round-robin crass. https://github.com/crass/proxychains-ng poll_retry (fixes for signal handling) colin cross. https://sourceforge.net/projects/proxychains/forums/forum/644747/topic/2367923 collecting patches from px forum and putting it into a repo adam hamsik. https://github.com/haad/proxychains proxychains-ng-4.14/COPYING000066400000000000000000000354271344330035200154560ustar00rootroot00000000000000 GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow. GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program" means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term "modification".) Each licensee is addressed as "you". Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does. 1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. 2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change. b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License. c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program. In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following: a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.) The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code. 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it. 6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License. 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation. 10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. NO WARRANTY 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS proxychains-ng-4.14/Makefile000066400000000000000000000043151344330035200160530ustar00rootroot00000000000000# # Makefile for proxychains (requires GNU make), stolen from musl # # Use config.mak to override any of the following variables. # Do not make changes here. # exec_prefix = /usr/local bindir = $(exec_prefix)/bin prefix = /usr/local/ includedir = $(prefix)/include libdir = $(prefix)/lib sysconfdir=$(prefix)/etc SRCS = $(sort $(wildcard src/*.c)) OBJS = $(SRCS:.c=.o) LOBJS = src/nameinfo.o src/version.o \ src/core.o src/common.o src/libproxychains.o \ src/allocator_thread.o src/ip_type.o \ src/hostsreader.o src/hash.o src/debug.o GENH = src/version.h CFLAGS += -Wall -O0 -g -std=c99 -D_GNU_SOURCE -pipe NO_AS_NEEDED = -Wl,--no-as-needed LIBDL = -ldl LDFLAGS = -fPIC $(NO_AS_NEEDED) $(LIBDL) -lpthread INC = PIC = -fPIC AR = $(CROSS_COMPILE)ar RANLIB = $(CROSS_COMPILE)ranlib SOCKET_LIBS = LDSO_SUFFIX = so LD_SET_SONAME = -Wl,-soname= INSTALL = ./tools/install.sh LDSO_PATHNAME = libproxychains4.$(LDSO_SUFFIX) SHARED_LIBS = $(LDSO_PATHNAME) ALL_LIBS = $(SHARED_LIBS) PXCHAINS = proxychains4 ALL_TOOLS = $(PXCHAINS) ALL_CONFIGS = src/proxychains.conf -include config.mak CFLAGS+=$(USER_CFLAGS) $(MAC_CFLAGS) CFLAGS_MAIN=-DLIB_DIR=\"$(libdir)\" -DSYSCONFDIR=\"$(sysconfdir)\" -DDLL_NAME=\"$(LDSO_PATHNAME)\" all: $(ALL_LIBS) $(ALL_TOOLS) install: install-libs install-tools $(DESTDIR)$(bindir)/%: % $(INSTALL) -D -m 755 $< $@ $(DESTDIR)$(libdir)/%: % $(INSTALL) -D -m 644 $< $@ $(DESTDIR)$(sysconfdir)/%: src/% $(INSTALL) -D -m 644 $< $@ install-libs: $(ALL_LIBS:%=$(DESTDIR)$(libdir)/%) install-tools: $(ALL_TOOLS:%=$(DESTDIR)$(bindir)/%) install-config: $(ALL_CONFIGS:src/%=$(DESTDIR)$(sysconfdir)/%) clean: rm -f $(ALL_LIBS) rm -f $(ALL_TOOLS) rm -f $(OBJS) rm -f $(GENH) src/version.h: $(wildcard VERSION .git) printf '#define VERSION "%s"\n' "$$(sh tools/version.sh)" > $@ src/version.o: src/version.h %.o: %.c $(CC) $(CPPFLAGS) $(CFLAGS) $(CFLAGS_MAIN) $(INC) $(PIC) -c -o $@ $< $(LDSO_PATHNAME): $(LOBJS) $(CC) $(LDFLAGS) $(LD_SET_SONAME)$(LDSO_PATHNAME) $(USER_LDFLAGS) \ -shared -o $@ $(LOBJS) $(SOCKET_LIBS) $(ALL_TOOLS): $(OBJS) $(CC) src/main.o src/common.o $(USER_LDFLAGS) -o $(PXCHAINS) .PHONY: all clean install install-config install-libs install-tools proxychains-ng-4.14/README000066400000000000000000000206611344330035200152750ustar00rootroot00000000000000ProxyChains-NG ver 4.14 README ============================= ProxyChains is a UNIX program, that hooks network-related libc functions in DYNAMICALLY LINKED programs via a preloaded DLL (dlsym(), LD_PRELOAD) and redirects the connections through SOCKS4a/5 or HTTP proxies. It supports TCP only (no UDP/ICMP etc). The way it works is basically a HACK; so it is possible that it doesn't work with your program, especially when it's a script, or starts numerous processes like background daemons or uses dlopen() to load "modules" (bug in glibc dynlinker). It should work with simple compiled (C/C++) dynamically linked programs though. If your program doesn't work with proxychains, consider using an iptables based solution instead; this is much more robust. Supported Platforms: Linux, BSD, Mac. *********** ATTENTION *********** this program can be used to circumvent censorship. doing so can be VERY DANGEROUS in certain countries. ALWAYS MAKE SURE THAT PROXYCHAINS WORKS AS EXPECTED BEFORE USING IT FOR ANYTHING SERIOUS. this involves both the program and the proxy that you're going to use. for example, you can connect to some "what is my ip" service like ifconfig.me to make sure that it's not using your real ip. ONLY USE PROXYCHAINS IF YOU KNOW WHAT YOU'RE DOING. THE AUTHORS AND MAINTAINERS OF PROXYCHAINS DO NOT TAKE ANY RESPONSIBILITY FOR ANY ABUSE OR MISUSE OF THIS SOFTWARE AND THE RESULTING CONSEQUENCES. *** Installation *** # needs a working C compiler, preferably gcc ./configure --prefix=/usr --sysconfdir=/etc make [optional] sudo make install [optional] sudo make install-config (installs proxychains.conf) if you dont install, you can use proxychains from the build directory like this: ./proxychains4 -f src/proxychains.conf telnet google.com 80 Changelog: ---------- Version 4.14 - allow alternative proto://user:pass@ip:port syntax for proxylist - fix endless loop in round robin mode when all proxies are down (#147) - fix compilation on android (#265) - fix fd leak in forked processes (#273) - skip connection attempt to nullrouted ips - allow hostnames for proxylist under specific circumstances Version 4.13 - fix robustness of DNS lookup thread and a segfault - fix socks5 user/pass auth on non-conforming servers - fix memory leak - add support for Solaris Version 4.12 - fix several build issues - for MAC - with -pie - with custom CC - compatibility fix for some GUI apps (8870140) - compatibility fix for some HTTP proxies (cf9a16d) - fix several warnings for cleaner build on debian - fix random_chain on OSX (0f6b226) Version 4.11 - preliminary IPv6 support - fixed bug in hostsreader - preliminary support for usage on OpenBSD (caveat emptor) Version 4.10 - fix regression in linking order with custom LDFLAGS - fix segfault in DNS mapping code in programs with > ~400 different lookups Version 4.9 - fix a security issue CVE-2015-3887 - add sendto hook to handle MSG_FASTOPEN flag - replace problematic hostentdb with hostsreader - fix compilation on OpenBSD (although doesn't work there) Version 4.8.1: - fix regression in 4.8 install-config Makefile target Version 4.8: - fix for odd cornercase where getaddrinfo was used with AI_NUMERICHOST to test for a numeric ip instead of resolving it (fixes nmap). - allow usage with programs that rely on LD_PRELOAD themselves - reject wrong entries in config file - print version number on startup Version 4.7: - new round_robin chaintype by crass. - fix bug with lazy allocation when GCC constructor was not used. - new configure flag --fat-binary to create a "fat" binary/library on OS X - return EBADF rather than EINTR in close hook. it's legal for a program to retry close() calls when they receive EINTR, which could cause an infinite loop, as seen in chromium. Version 4.6: - some cosmetic fixes to Makefile, fix a bug when non-numeric ip was used as proxy server address. Version 4.5: - hook close() to prevent OpenSSH from messing with internal infrastructure. this caused ssh client to segfault when proxified. Version 4.4: - FreeBSD port - fixes some installation issues on Debian and Mac. Version 4.3: - fixes programs that do dns-lookups in child processes (fork()ed), like irssi. to achieve this, support for compilation without pthreads was sacrified. - fixes thread safety for gethostent() calls. - improved DNS handling speed, since hostent db is cached. Version 4.2: - fixes compilation issues with ubuntu 12.04 toolchain - fixes segfault in rare codepath Version 4.1 - support for mac os x (all archs) - all internal functions are threadsafe when compiled with -DTHREAD_SAFE (default). Version 4.0 - replaced dnsresolver script (which required a dynamically linked "dig" binary to be present) with remote DNS lookup. this speeds up any operation involving DNS, as the old script had to use TCP. additionally it allows to use .onion urls when used with TOR. - removed broken autoconf build system with a simple Makefile. there's a ./configure script though for convenience. it also adds support for a config file passed via command line switches/ environment variables. Version 3.0 - support for DNS resolving through proxy supports SOCKS4, SOCKS5 and HTTP CONNECT proxy servers. Auth-types: socks - "user/pass" , http - "basic". When to use it ? 1) When the only way to get "outside" from your LAN is through proxy server. 2) To get out from behind restrictive firewall which filters outgoing ports. 3) To use two (or more) proxies in chain: like: your_host <--> proxy1 <--> proxy2 <--> target_host 4) To "proxify" some program with no proxy support built-in (like telnet) 5) Access intranet from outside via proxy. 6) To use DNS behind proxy. 7) To access hidden tor onion services. Some cool features: * This program can mix different proxy types in the same chain like: your_host <-->socks5 <--> http <--> socks4 <--> target_host * Different chaining options supported random order from the list ( user defined length of chain ). exact order (as they appear in the list ) dynamic order (smart exclude dead proxies from chain) * You can use it with most TCP client applications, possibly even network scanners, as long as they use standard libc functionality. pcap based scanning does not work. * You can use it with servers, like squid, sendmail, or whatever. * DNS resolving through proxy. Configuration: -------------- proxychains looks for config file in following order: 1) file listed in environment variable PROXYCHAINS_CONF_FILE or provided as a -f argument to proxychains script or binary. 2) ./proxychains.conf 3) $(HOME)/.proxychains/proxychains.conf 4) $(sysconfdir)/proxychains.conf ** ** usually /etc/proxychains.conf Usage Example: $ proxychains telnet targethost.com in this example it will run telnet through proxy(or chained proxies) specified by proxychains.conf Usage Example: $ proxychains -f /etc/proxychains-other.conf telnet targethost2.com in this example it will use different configuration file then proxychains.conf to connect to targethost2.com host. Usage Example: $ proxyresolv targethost.com in this example it will resolve targethost.com through proxy(or chained proxies) specified by proxychains.conf Known Problems: --------------- - newer versions of nmap try to determine the network interface to use even if it's not needed (like when doing simple syn scans which use the standard POSIX socket API. this results in errors when proxychains hands out an ip address to a reserved address space. possible workarounds: disable proxy_dns, use a numeric ip, or use nmap's native support for SOCKS proxies. - Mac OS X 10.11 (El Capitan) ships with a new security feature called SIP that prevents hooking of system apps. workarounds are to partially disable SIP by issuing csrutil enable --without debug in recovery mode, or to copy the system binary into the home directory and run it from there. see github issue #78 for details. - the glibc dynlinker has a bug or security feature that inhibits dlopen()ed modules from being subject to the same dlsym hooks as installed for the main program. this mainly affects scripting languages such as perl or python that heavily rely on dlopen() for modules written in C to work. there are unconfirmed reports that it works as root though. musl libc is unaffected from the bug. Community: ---------- #proxychains on irc.freenode.net Donations: ---------- bitcoins donations are welcome - please send to this address: 1C9LBpuy56veBqw5N33sZMoZW8mwCw3tPh proxychains-ng-4.14/TODO000066400000000000000000000001551344330035200151010ustar00rootroot00000000000000ProxyChains ver 4.0 TODO =================== hooks for reentrant dns functions, i.e. gethostbyaddr_r proxychains-ng-4.14/VERSION000066400000000000000000000000051344330035200154530ustar00rootroot000000000000004.14 proxychains-ng-4.14/configure000077500000000000000000000135521344330035200163250ustar00rootroot00000000000000#!/bin/sh prefix=/usr/local OUR_CPPFLAGS= # Get a temporary filename i=0 set -C while : ; do i=$(($i+1)) tmpc="./conf$$-$PPID-$i.c" 2>|/dev/null > "$tmpc" && break test "$i" -gt 50 && fail "$0: cannot create temporary file $tmpc" done set +C trap 'rm "$tmpc"' EXIT INT QUIT TERM HUP check_compile() { printf "checking %s ... " "$1" printf "$3" > "$tmpc" local res=0 $CC $OUR_CPPFLAGS $CPPFLAGS $2 $CFLAGS "$tmpc" -o /dev/null >/dev/null 2>&1 \ || res=1 test x$res = x0 && \ { printf "yes\n" ; test x"$2" = x || OUR_CPPFLAGS="$OUR_CPPFLAGS $2" ; } \ || printf "no\n" return $res } check_define() { printf "checking whether \$CC defines %s ... " "$1" local res=1 $CC $OUR_CPPFLAGS $CPPFLAGS $CFLAGS -dM -E - /dev/null && res=0 test x$res = x0 && printf "yes\n" || printf "no\n" return $res } check_compile_run() { printf "checking %s ... " "$1" printf "$2" > "$tmpc" local res=0 $CC $OUR_CPPFLAGS $CPPFLAGS $CFLAGS "$tmpc" -o "$tmpc".out >/dev/null 2>&1 \ || res=1 test x$res = x0 && { "$tmpc".out || res=1 ; } rm -f "$tmpc".out test x$res = x0 && printf "yes\n" || printf "no\n" return $res } check_link_silent() { printf "$2" > "$tmpc" $CC $OUR_CPPFLAGS $CPPFLAGS $1 $CFLAGS "$tmpc" -o /dev/null >/dev/null 2>&1 } check_link() { printf "checking %s ... " "$1" local res=0 check_link_silent "$2" "$3" || res=1 test x$res = x0 && printf "yes\n" || printf "no\n" return $res } usage() { echo "supported arguments" echo "--prefix=/path default: $prefix" echo "--exec_prefix=/path default: $prefix/bin" echo "--bindir=/path default: $prefix/bin" echo "--libdir=/path default: $prefix/lib" echo "--includedir=/path default: $prefix/include" echo "--sysconfdir=/path default: $prefix/etc" echo "--ignore-cve default: no" echo " if set to yes ignores CVE-2015-3887 and makes it possible" echo " to preload from current dir (insecure)" echo "--fat-binary : build for both i386 and x86_64 architectures on 64-bit Macs" echo "--help : show this text" exit 1 } spliteq() { arg=$1 echo "${arg#*=}" #alternatives echo "$arg" | cut -d= -f2- # or echo "$arg" | sed 's/[^=]*=//' } fat_binary= ignore_cve=no parsearg() { case "$1" in --prefix=*) prefix=`spliteq $1`;; --exec_prefix=*) exec_prefix=`spliteq $1`;; --bindir=*) bindir=`spliteq $1`;; --libdir=*) libdir=`spliteq $1`;; --includedir=*) includedir=`spliteq $1`;; --sysconfdir=*) sysconfdir=`spliteq $1`;; --ignore-cve) ignore_cve=1;; --ignore-cve=*) ignore_cve=`spliteq $1`;; --fat-binary) fat_binary=1;; --help) usage;; esac } while true ; do case $1 in -*) parsearg "$1"; shift;; *) break ;; esac done if [ -z "$exec_prefix" ] ; then exec_prefix=$prefix fi if [ -z "$libdir" ] ; then libdir=$prefix/lib fi if [ -z "$includedir" ] ; then includedir=$prefix/include fi if [ -z "$sysconfdir" ] ; then sysconfdir=$prefix/etc fi if [ -z "$bindir" ] ; then bindir=$exec_prefix/bin fi if [ -z "$CC" ] ; then CC=cc fi echo > config.mak bsd_detected=false isbsd() { $bsd_detected } mac_detected=false ismac() { $mac_detected } mac_64=false ismac64() { $mac_64 } solaris_detected=false issolaris() { $solaris_detected } check_compile 'whether we have GNU-style getservbyname_r()' "-DHAVE_GNU_GETSERVBYNAME_R" \ '#define _GNU_SOURCE\n#include \nint main() {\nstruct servent *se = 0;struct servent se_buf;char buf[1024];\ngetservbyname_r("foo", (void*) 0, &se_buf, buf, sizeof(buf), &se);\nreturn 0;}' check_compile 'whether we have pipe2() and O_CLOEXEC' "-DHAVE_PIPE2" \ '#define _GNU_SOURCE\n#include \n#include \nint main() {\nint pipefd[2];\npipe2(pipefd, O_CLOEXEC);\nreturn 0;}' check_define __APPLE__ && { mac_detected=true check_define __x86_64__ && mac_64=true } check_define __FreeBSD__ && bsd_detected=true check_define __OpenBSD__ && { bsd_detected=true echo "CFLAGS+=-DIS_OPENBSD">>config.mak check_compile_run 'whether OpenBSDs fclose() (illegally) calls close()' \ '#include \n#include\nint close(int x){exit(0);}int main(){fclose(stdin);return 1;}' && \ OUR_CPPFLAGS="$OUR_CPPFLAGS -DBROKEN_FCLOSE" } check_define __sun && check_define __SVR4 && solaris_detected=true echo "CC=$CC">>config.mak [ -z "$CPPFLAGS" ] || echo "CPPFLAGS=$CPPFLAGS">>config.mak [ -z "$CFLAGS" ] || echo "USER_CFLAGS=$CFLAGS">>config.mak [ -z "$LDFLAGS" ] || echo "USER_LDFLAGS=$LDFLAGS">>config.mak echo prefix=$prefix>>config.mak echo exec_prefix=$exec_prefix>>config.mak echo bindir=$bindir>>config.mak echo libdir=$libdir>>config.mak echo includedir=$includedir>>config.mak echo sysconfdir=$sysconfdir>>config.mak [ "$ignore_cve" = "no" ] && echo "CPPFLAGS+= -DSUPER_SECURE">>config.mak [ -z "$OUR_CPPFLAGS" ] || echo "CPPFLAGS+= $OUR_CPPFLAGS" >>config.mak check_link "whether we can use -Wl,--no-as-needed" "-Wl,--no-as-needed" \ "int main() { return 0; }" || echo NO_AS_NEEDED= >> config.mak LD_SONAME_FLAG= printf "checking what's the option to use in linker to set library name ... " for o in --soname -h -soname -install_name; do check_link_silent "-shared -Wl,$o,libconftest.so" "void test_func(int a) {}" && LD_SONAME_FLAG=$o && break done if [ -z "$LD_SONAME_FLAG" ]; then printf '\ncannot find an option to set library name\n' exit 1 fi echo "$LD_SONAME_FLAG" echo "LD_SET_SONAME = -Wl,$LD_SONAME_FLAG," >> config.mak make_cmd=make if ismac ; then echo LDSO_SUFFIX=dylib>>config.mak echo MAC_CFLAGS+=-DIS_MAC=1>>config.mak if ismac64 && [ "$fat_binary" = 1 ] ; then echo "Configuring a fat binary for i386 and x86_64" echo MAC_CFLAGS+=-arch i386 -arch x86_64>>config.mak echo LDFLAGS+=-arch i386 -arch x86_64>>config.mak fi elif isbsd ; then echo LIBDL=>>config.mak echo "CFLAGS+=-DIS_BSD">>config.mak make_cmd=gmake elif issolaris; then echo "CFLAGS+=-DIS_SOLARIS -D__EXTENSIONS__" >> config.mak echo "SOCKET_LIBS=-lsocket -lnsl" >> config.mak fi echo "Done, now run $make_cmd && $make_cmd install" proxychains-ng-4.14/src/000077500000000000000000000000001344330035200151775ustar00rootroot00000000000000proxychains-ng-4.14/src/allocator_thread.c000066400000000000000000000210031344330035200206460ustar00rootroot00000000000000#undef _GNU_SOURCE #define _GNU_SOURCE #undef _POSIX_C_SOURCE #define _DARWIN_C_SOURCE #include #include #include #include #include #include #include #include #include #include #include #include #include #include "allocator_thread.h" #include "debug.h" #include "ip_type.h" #include "mutex.h" #include "hash.h" /* stuff for our internal translation table */ typedef struct { uint32_t hash; char* string; } string_hash_tuple; typedef struct { uint32_t counter; uint32_t capa; string_hash_tuple** list; } internal_ip_lookup_table; static void *dumpstring(char* s, size_t len) { char* p = malloc(len); if(p) memcpy(p, s, len); return p; } static pthread_mutex_t *internal_ips_lock; static internal_ip_lookup_table *internal_ips; uint32_t index_from_internal_ip(ip_type4 internalip) { PFUNC(); ip_type4 tmp = internalip; uint32_t ret; ret = tmp.octet[3] + (tmp.octet[2] << 8) + (tmp.octet[1] << 16); ret -= 1; return ret; } char *string_from_internal_ip(ip_type4 internalip) { PFUNC(); char *res = NULL; uint32_t index = index_from_internal_ip(internalip); if(index < internal_ips->counter) res = internal_ips->list[index]->string; return res; } extern unsigned int remote_dns_subnet; ip_type4 make_internal_ip(uint32_t index) { ip_type4 ret; index++; // so we can start at .0.0.1 if(index > 0xFFFFFF) return ip_type_invalid.addr.v4; ret.octet[0] = remote_dns_subnet & 0xFF; ret.octet[1] = (index & 0xFF0000) >> 16; ret.octet[2] = (index & 0xFF00) >> 8; ret.octet[3] = index & 0xFF; return ret; } static ip_type4 ip_from_internal_list(char* name, size_t len) { uint32_t hash = dalias_hash((char *) name); size_t i; ip_type4 res; void* new_mem; // see if we already have this dns entry saved. if(internal_ips->counter) { for(i = 0; i < internal_ips->counter; i++) { if(internal_ips->list[i]->hash == hash && !strcmp(name, internal_ips->list[i]->string)) { res = make_internal_ip(i); PDEBUG("got cached ip for %s\n", name); goto have_ip; } } } // grow list if needed. if(internal_ips->capa < internal_ips->counter + 1) { PDEBUG("realloc\n"); new_mem = realloc(internal_ips->list, (internal_ips->capa + 16) * sizeof(void *)); if(new_mem) { internal_ips->capa += 16; internal_ips->list = new_mem; } else { oom: PDEBUG("out of mem\n"); goto err_plus_unlock; } } res = make_internal_ip(internal_ips->counter); if(res.as_int == ip_type_invalid.addr.v4.as_int) goto err_plus_unlock; string_hash_tuple tmp = { 0 }; new_mem = dumpstring((char*) &tmp, sizeof(string_hash_tuple)); if(!new_mem) goto oom; PDEBUG("creating new entry %d for ip of %s\n", (int) internal_ips->counter, name); internal_ips->list[internal_ips->counter] = new_mem; internal_ips->list[internal_ips->counter]->hash = hash; new_mem = dumpstring((char*) name, len + 1); if(!new_mem) { internal_ips->list[internal_ips->counter] = 0; goto oom; } internal_ips->list[internal_ips->counter]->string = new_mem; internal_ips->counter += 1; have_ip: return res; err_plus_unlock: PDEBUG("return err\n"); return ip_type_invalid.addr.v4; } /* stuff for communication with the allocator thread */ enum at_msgtype { ATM_GETIP, ATM_GETNAME, ATM_EXIT, }; enum at_direction { ATD_SERVER = 0, ATD_CLIENT, ATD_MAX, }; struct at_msghdr { enum at_msgtype msgtype; size_t datalen; }; static pthread_t allocator_thread; int req_pipefd[2]; int resp_pipefd[2]; static int wait_data(int readfd) { PFUNC(); fd_set fds; FD_ZERO(&fds); FD_SET(readfd, &fds); int ret; while((ret = select(readfd+1, &fds, NULL, NULL, NULL)) <= 0) { if(ret < 0) { int e = errno; if(e == EINTR) continue; #ifdef __GLIBC__ char emsg[1024]; char* x = strerror_r(errno, emsg, sizeof emsg); dprintf(2, "select2: %s\n", x); #endif return 0; } } return 1; } static int trywrite(int fd, void* buf, size_t bytes) { ssize_t ret; unsigned char *out = buf; again: ret = write(fd, out, bytes); switch(ret) { case -1: if(errno == EINTR) goto again; case 0: return 0; default: if(ret == bytes || !bytes) return 1; out += ret; bytes -= ret; goto again; } } static int sendmessage(enum at_direction dir, struct at_msghdr *hdr, void* data) { static int* destfd[ATD_MAX] = { [ATD_SERVER] = &req_pipefd[1], [ATD_CLIENT] = &resp_pipefd[1] }; int ret = trywrite(*destfd[dir], hdr, sizeof *hdr); if(ret && hdr->datalen) { assert(hdr->datalen <= MSG_LEN_MAX); ret = trywrite(*destfd[dir], data, hdr->datalen); } return ret; } static int tryread(int fd, void* buf, size_t bytes) { ssize_t ret; unsigned char *out = buf; again: ret = read(fd, out, bytes); switch(ret) { case -1: if(errno == EINTR) goto again; case 0: return 0; default: if(ret == bytes || !bytes) return 1; out += ret; bytes -= ret; goto again; } } static int getmessage(enum at_direction dir, struct at_msghdr *hdr, void* data) { static int* readfd[ATD_MAX] = { [ATD_SERVER] = &req_pipefd[0], [ATD_CLIENT] = &resp_pipefd[0] }; ssize_t ret; if((ret = wait_data(*readfd[dir]))) { if(!tryread(*readfd[dir], hdr, sizeof *hdr)) return 0; assert(hdr->datalen <= MSG_LEN_MAX); if(hdr->datalen) { ret = tryread(*readfd[dir], data, hdr->datalen); } } return ret; } static void* threadfunc(void* x) { (void) x; int ret; struct at_msghdr msg; union { char host[MSG_LEN_MAX]; ip_type4 ip; } readbuf; while((ret = getmessage(ATD_SERVER, &msg, &readbuf))) { switch(msg.msgtype) { case ATM_GETIP: /* client wants an ip for a DNS name. iterate our list and check if we have an existing entry. * if not, create a new one. */ readbuf.ip = ip_from_internal_list(readbuf.host, msg.datalen - 1); msg.datalen = sizeof(ip_type4); break; case ATM_GETNAME: { char *host = string_from_internal_ip(readbuf.ip); if(host) { size_t l = strlen(host); assert(l < MSG_LEN_MAX); memcpy(readbuf.host, host, l + 1); msg.datalen = l + 1; } break; } case ATM_EXIT: return 0; default: abort(); } ret = sendmessage(ATD_CLIENT, &msg, &readbuf); } return 0; } /* API to access the internal ip mapping */ ip_type4 at_get_ip_for_host(char* host, size_t len) { ip_type4 readbuf; MUTEX_LOCK(internal_ips_lock); if(len > MSG_LEN_MAX) goto inv; struct at_msghdr msg = {.msgtype = ATM_GETIP, .datalen = len + 1 }; if(sendmessage(ATD_SERVER, &msg, host) && getmessage(ATD_CLIENT, &msg, &readbuf)); else { inv: readbuf = ip_type_invalid.addr.v4; } assert(msg.msgtype == ATM_GETIP); MUTEX_UNLOCK(internal_ips_lock); return readbuf; } size_t at_get_host_for_ip(ip_type4 ip, char* readbuf) { struct at_msghdr msg = {.msgtype = ATM_GETNAME, .datalen = sizeof(ip_type4) }; size_t res = 0; MUTEX_LOCK(internal_ips_lock); if(sendmessage(ATD_SERVER, &msg, &ip) && getmessage(ATD_CLIENT, &msg, readbuf)) { if((ptrdiff_t) msg.datalen <= 0) res = 0; else res = msg.datalen - 1; } assert(msg.msgtype == ATM_GETNAME); MUTEX_UNLOCK(internal_ips_lock); return res; } static void initpipe(int* fds) { int retval; #ifdef HAVE_PIPE2 retval = pipe2(fds, O_CLOEXEC); #else retval = pipe(fds); if(retval == 0) { fcntl(fds[0], F_SETFD, FD_CLOEXEC); fcntl(fds[1], F_SETFD, FD_CLOEXEC); } #endif if(retval == -1) { perror("pipe"); exit(1); } } #ifndef MAX #define MAX(x, y) ((x) > (y) ? (x) : (y)) #endif #if !defined(PTHREAD_STACK_MIN) || defined(__APPLE__) /* MAC says its min is 8KB, but then crashes in our face. thx hunkOLard */ #define PTHREAD_STACK_MIN 64*1024 #endif /* initialize with pointers to shared memory. these will * be used to place responses and arguments */ void at_init(void) { PFUNC(); void *shm = mmap(0, 4096, PROT_WRITE|PROT_READ, MAP_ANON|MAP_SHARED, -1, 0); assert(shm); internal_ips_lock = shm; internal_ips = (void*)((char*)shm + 2048); MUTEX_INIT(internal_ips_lock); memset(internal_ips, 0, sizeof *internal_ips); initpipe(req_pipefd); initpipe(resp_pipefd); pthread_attr_t allocator_thread_attr; pthread_attr_init(&allocator_thread_attr); pthread_attr_setstacksize(&allocator_thread_attr, MAX(16 * 1024, PTHREAD_STACK_MIN)); pthread_create(&allocator_thread, &allocator_thread_attr, threadfunc, 0); pthread_attr_destroy(&allocator_thread_attr); } void at_close(void) { PFUNC(); const int msg = ATM_EXIT; write(req_pipefd[1], &msg, sizeof(int)); pthread_join(allocator_thread, NULL); close(req_pipefd[0]); close(req_pipefd[1]); close(resp_pipefd[0]); close(resp_pipefd[1]); MUTEX_DESTROY(internal_ips_lock); } proxychains-ng-4.14/src/allocator_thread.h000066400000000000000000000005561344330035200206650ustar00rootroot00000000000000#ifndef ALLOCATOR_THREAD_H #define ALLOCATOR_THREAD_H #include #include "ip_type.h" #define MSG_LEN_MAX 256 extern int req_pipefd[2]; extern int resp_pipefd[2]; void at_init(void); void at_close(void); size_t at_get_host_for_ip(ip_type4 ip, char* readbuf); ip_type4 at_get_ip_for_host(char* host, size_t len); //RcB: DEP "allocator_thread.c" #endif proxychains-ng-4.14/src/common.c000066400000000000000000000036671344330035200166470ustar00rootroot00000000000000#include "common.h" #include #include #include const char *proxy_type_strmap[] = { "http", "socks4", "socks5", }; const char *chain_type_strmap[] = { "dynamic_chain", "strict_chain", "random_chain", "round_robin_chain", }; const char *proxy_state_strmap[] = { "play", "down", "blocked", "busy", }; // stolen from libulz (C) rofl0r void pc_stringfromipv4(unsigned char *ip_buf_4_bytes, char *outbuf_16_bytes) { unsigned char *p; char *o = outbuf_16_bytes; unsigned char n; for(p = ip_buf_4_bytes; p < ip_buf_4_bytes + 4; p++) { n = *p; if(*p >= 100) { if(*p >= 200) *(o++) = '2'; else *(o++) = '1'; n %= 100; } if(*p >= 10) { *(o++) = (n / 10) + '0'; n %= 10; } *(o++) = n + '0'; *(o++) = '.'; } o[-1] = 0; } static int check_path(char *path) { if(!path) return 0; return access(path, R_OK) != -1; } char *get_config_path(char* default_path, char* pbuf, size_t bufsize) { char buf[512]; // top priority: user defined path char *path = default_path; if(check_path(path)) goto have; // priority 1: env var PROXYCHAINS_CONF_FILE path = getenv(PROXYCHAINS_CONF_FILE_ENV_VAR); if(check_path(path)) goto have; // priority 2; proxychains conf in actual dir path = getcwd(buf, sizeof(buf)); snprintf(pbuf, bufsize, "%s/%s", path, PROXYCHAINS_CONF_FILE); path = pbuf; if(check_path(path)) goto have; // priority 3; $HOME/.proxychains/proxychains.conf path = getenv("HOME"); snprintf(pbuf, bufsize, "%s/.proxychains/%s", path, PROXYCHAINS_CONF_FILE); path = pbuf; if(check_path(path)) goto have; // priority 4: $SYSCONFDIR/proxychains.conf path = SYSCONFDIR "/" PROXYCHAINS_CONF_FILE; if(check_path(path)) goto have; // priority 5: /etc/proxychains.conf path = "/etc/" PROXYCHAINS_CONF_FILE; if(check_path(path)) goto have; perror("couldnt find configuration file"); exit(1); return NULL; have: return path; } proxychains-ng-4.14/src/common.h000066400000000000000000000011551344330035200166420ustar00rootroot00000000000000#ifndef COMMON_H #define COMMON_H #define PROXYCHAINS_CONF_FILE_ENV_VAR "PROXYCHAINS_CONF_FILE" #define PROXYCHAINS_QUIET_MODE_ENV_VAR "PROXYCHAINS_QUIET_MODE" #define PROXYCHAINS_CONF_FILE "proxychains.conf" #define LOG_PREFIX "[proxychains] " #ifndef SYSCONFDIR #define SYSCONFDIR "/etc" #endif #include extern const char *proxy_type_strmap[]; extern const char *chain_type_strmap[]; extern const char *proxy_state_strmap[]; char *get_config_path(char* default_path, char* pbuf, size_t bufsize); void pc_stringfromipv4(unsigned char *ip_buf_4_bytes, char *outbuf_16_bytes); //RcB: DEP "common.c" #endif proxychains-ng-4.14/src/core.c000066400000000000000000000555011344330035200163010ustar00rootroot00000000000000/*************************************************************************** core.c - description ------------------- begin : Tue May 14 2002 copyright : netcreature (C) 2002 email : netcreature@users.sourceforge.net *************************************************************************** * GPL * *************************************************************************** * * * This program is free software; you can redistribute it and/or modify * * it under the terms of the GNU General Public License as published by * * the Free Software Foundation; either version 2 of the License, or * * (at your option) any later version. * * * ***************************************************************************/ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "core.h" #include "common.h" #include "allocator_thread.h" #include "mutex.h" extern int tcp_read_time_out; extern int tcp_connect_time_out; extern int proxychains_quiet_mode; extern unsigned int proxychains_proxy_offset; extern unsigned int remote_dns_subnet; static int poll_retry(struct pollfd *fds, nfds_t nfsd, int timeout) { int ret; int time_remain = timeout; int time_elapsed = 0; struct timeval start_time; struct timeval tv; gettimeofday(&start_time, NULL); do { //printf("Retry %d\n", time_remain); ret = poll(fds, nfsd, time_remain); gettimeofday(&tv, NULL); time_elapsed = ((tv.tv_sec - start_time.tv_sec) * 1000 + (tv.tv_usec - start_time.tv_usec) / 1000); //printf("Time elapsed %d\n", time_elapsed); time_remain = timeout - time_elapsed; } while(ret == -1 && errno == EINTR && time_remain > 0); //if (ret == -1) //printf("Return %d %d %s\n", ret, errno, strerror(errno)); return ret; } static void encode_base_64(char *src, char *dest, int max_len) { static const char base64[] = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/"; int n, l, i; l = strlen(src); max_len = (max_len - 1) / 4; for(i = 0; i < max_len; i++, src += 3, l -= 3) { switch (l) { case 0: break; case 1: n = src[0] << 16; *dest++ = base64[(n >> 18) & 077]; *dest++ = base64[(n >> 12) & 077]; *dest++ = '='; *dest++ = '='; break; case 2: n = src[0] << 16 | src[1] << 8; *dest++ = base64[(n >> 18) & 077]; *dest++ = base64[(n >> 12) & 077]; *dest++ = base64[(n >> 6) & 077]; *dest++ = '='; break; default: n = src[0] << 16 | src[1] << 8 | src[2]; *dest++ = base64[(n >> 18) & 077]; *dest++ = base64[(n >> 12) & 077]; *dest++ = base64[(n >> 6) & 077]; *dest++ = base64[n & 077]; } if(l < 3) break; } *dest++ = 0; } void proxychains_write_log(char *str, ...) { char buff[1024*4]; va_list arglist; if(!proxychains_quiet_mode) { va_start(arglist, str); vsnprintf(buff, sizeof(buff), str, arglist); va_end(arglist); fprintf(stderr, "%s", buff); fflush(stderr); } } static int write_n_bytes(int fd, char *buff, size_t size) { int i = 0; size_t wrote = 0; for(;;) { i = write(fd, &buff[wrote], size - wrote); if(i <= 0) return i; wrote += i; if(wrote == size) return wrote; } } static int read_n_bytes(int fd, char *buff, size_t size) { int ready; size_t i; struct pollfd pfd[1]; pfd[0].fd = fd; pfd[0].events = POLLIN; for(i = 0; i < size; i++) { pfd[0].revents = 0; ready = poll_retry(pfd, 1, tcp_read_time_out); if(ready != 1 || !(pfd[0].revents & POLLIN) || 1 != read(fd, &buff[i], 1)) return -1; } return (int) size; } static int timed_connect(int sock, const struct sockaddr *addr, socklen_t len) { int ret, value; socklen_t value_len; struct pollfd pfd[1]; PFUNC(); pfd[0].fd = sock; pfd[0].events = POLLOUT; fcntl(sock, F_SETFL, O_NONBLOCK); ret = true_connect(sock, addr, len); PDEBUG("\nconnect ret=%d\n", ret); if(ret == -1 && errno == EINPROGRESS) { ret = poll_retry(pfd, 1, tcp_connect_time_out); PDEBUG("\npoll ret=%d\n", ret); if(ret == 1) { value_len = sizeof(socklen_t); getsockopt(sock, SOL_SOCKET, SO_ERROR, &value, &value_len); PDEBUG("\nvalue=%d\n", value); if(!value) ret = 0; else ret = -1; } else { ret = -1; } } else { #ifdef DEBUG if(ret == -1) perror("true_connect"); #endif if(ret != 0) ret = -1; } fcntl(sock, F_SETFL, !O_NONBLOCK); return ret; } #define INVALID_INDEX 0xFFFFFFFFU static int tunnel_to(int sock, ip_type ip, unsigned short port, proxy_type pt, char *user, char *pass) { char *dns_name = NULL; char hostnamebuf[MSG_LEN_MAX]; size_t dns_len = 0; PFUNC(); // we use ip addresses with 224.* to lookup their dns name in our table, to allow remote DNS resolution // the range 224-255.* is reserved, and it won't go outside (unless the app does some other stuff with // the results returned from gethostbyname et al.) // the hardcoded number 224 can now be changed using the config option remote_dns_subnet to i.e. 127 if(!ip.is_v6 && ip.addr.v4.octet[0] == remote_dns_subnet) { dns_len = at_get_host_for_ip(ip.addr.v4, hostnamebuf); if(!dns_len) goto err; else dns_name = hostnamebuf; } PDEBUG("host dns %s\n", dns_name ? dns_name : ""); size_t ulen = strlen(user); size_t passlen = strlen(pass); if(ulen > 0xFF || passlen > 0xFF || dns_len > 0xFF) { proxychains_write_log(LOG_PREFIX "error: maximum size of 255 for user/pass or domain name!\n"); goto err; } int len; unsigned char buff[BUFF_SIZE]; char ip_buf[INET6_ADDRSTRLEN]; int v6 = ip.is_v6; switch (pt) { case HTTP_TYPE:{ if(!dns_len) { if(!inet_ntop(v6?AF_INET6:AF_INET,ip.addr.v6,ip_buf,sizeof ip_buf)) { proxychains_write_log(LOG_PREFIX "error: ip address conversion failed\n"); goto err; } dns_name = ip_buf; } #define HTTP_AUTH_MAX ((0xFF * 2) + 1 + 1) /* 2 * 0xff: username and pass, plus 1 for ':' and 1 for zero terminator. */ char src[HTTP_AUTH_MAX]; char dst[(4 * HTTP_AUTH_MAX)]; if(ulen) { snprintf(src, sizeof(src), "%s:%s", user, pass); encode_base_64(src, dst, sizeof(dst)); } else dst[0] = 0; uint16_t hs_port = ntohs(port); len = snprintf((char *) buff, sizeof(buff), "CONNECT %s:%d HTTP/1.0\r\nHost: %s:%d\r\n%s%s%s\r\n", dns_name, hs_port, dns_name, hs_port, ulen ? "Proxy-Authorization: Basic " : dst, dst, ulen ? "\r\n" : dst); if(len < 0 || len != send(sock, buff, len, 0)) goto err; len = 0; // read header byte by byte. while(len < BUFF_SIZE) { if(1 == read_n_bytes(sock, (char *) (buff + len), 1)) len++; else goto err; if(len > 4 && buff[len - 1] == '\n' && buff[len - 2] == '\r' && buff[len - 3] == '\n' && buff[len - 4] == '\r') break; } // if not ok (200) or response greather than BUFF_SIZE return BLOCKED; if(len == BUFF_SIZE || !(buff[9] == '2' && buff[10] == '0' && buff[11] == '0')) { PDEBUG("HTTP proxy blocked: buff=\"%s\"\n", buff); return BLOCKED; } return SUCCESS; } break; case SOCKS4_TYPE:{ if(v6) { proxychains_write_log(LOG_PREFIX "error: SOCKS4 doesn't support ipv6 addresses\n"); goto err; } buff[0] = 4; // socks version buff[1] = 1; // connect command memcpy(&buff[2], &port, 2); // dest port if(dns_len) { ip.addr.v4.octet[0] = 0; ip.addr.v4.octet[1] = 0; ip.addr.v4.octet[2] = 0; ip.addr.v4.octet[3] = 1; } memcpy(&buff[4], &ip.addr.v4, 4); // dest host len = ulen + 1; // username if(len > 1) memcpy(&buff[8], user, len); else { buff[8] = 0; } // do socksv4a dns resolution on the server if(dns_len) { memcpy(&buff[8 + len], dns_name, dns_len + 1); len += dns_len + 1; } if((len + 8) != write_n_bytes(sock, (char *) buff, (8 + len))) goto err; if(8 != read_n_bytes(sock, (char *) buff, 8)) goto err; if(buff[0] != 0 || buff[1] != 90) return BLOCKED; return SUCCESS; } break; case SOCKS5_TYPE:{ int n_methods = ulen ? 2 : 1; buff[0] = 5; // version buff[1] = n_methods ; // number of methods buff[2] = 0; // no auth method if(ulen) buff[3] = 2; /// auth method -> username / password if(2+n_methods != write_n_bytes(sock, (char *) buff, 2+n_methods)) goto err; if(2 != read_n_bytes(sock, (char *) buff, 2)) goto err; if(buff[0] != 5 || (buff[1] != 0 && buff[1] != 2)) { if(buff[0] == 5 && buff[1] == 0xFF) return BLOCKED; else goto err; } if(buff[1] == 2) { // authentication char in[2]; char out[515]; char *cur = out; size_t c; *cur++ = 1; // version c = ulen & 0xFF; *cur++ = c; memcpy(cur, user, c); cur += c; c = passlen & 0xFF; *cur++ = c; memcpy(cur, pass, c); cur += c; if((cur - out) != write_n_bytes(sock, out, cur - out)) goto err; if(2 != read_n_bytes(sock, in, 2)) goto err; /* according to RFC 1929 the version field for the user/pass auth sub- negotiation should be 1, which is kinda counter-intuitive, so there are some socks5 proxies that return 5 instead. other programs like curl work fine when the version is 5, so let's do the same and accept either of them. */ if(!(in[0] == 5 || in[0] == 1)) goto err; if(in[1] != 0) return BLOCKED; } int buff_iter = 0; buff[buff_iter++] = 5; // version buff[buff_iter++] = 1; // connect buff[buff_iter++] = 0; // reserved if(!dns_len) { buff[buff_iter++] = v6 ? 4 : 1; // ip v4/v6 memcpy(buff + buff_iter, ip.addr.v6, v6?16:4); // dest host buff_iter += v6?16:4; } else { buff[buff_iter++] = 3; //dns buff[buff_iter++] = dns_len & 0xFF; memcpy(buff + buff_iter, dns_name, dns_len); buff_iter += dns_len; } memcpy(buff + buff_iter, &port, 2); // dest port buff_iter += 2; if(buff_iter != write_n_bytes(sock, (char *) buff, buff_iter)) goto err; if(4 != read_n_bytes(sock, (char *) buff, 4)) goto err; if(buff[0] != 5 || buff[1] != 0) goto err; switch (buff[3]) { case 1: len = 4; break; case 4: len = 16; break; case 3: len = 0; if(1 != read_n_bytes(sock, (char *) &len, 1)) goto err; break; default: goto err; } if(len + 2 != read_n_bytes(sock, (char *) buff, len + 2)) goto err; return SUCCESS; } break; } err: return SOCKET_ERROR; } #define TP " ... " #define DT "Dynamic chain" #define ST "Strict chain" #define RT "Random chain" #define RRT "Round Robin chain" static int start_chain(int *fd, proxy_data * pd, char *begin_mark) { int v6 = pd->ip.is_v6; *fd = socket(v6?PF_INET6:PF_INET, SOCK_STREAM, 0); if(*fd == -1) goto error; char ip_buf[INET6_ADDRSTRLEN]; if(!inet_ntop(v6?AF_INET6:AF_INET,pd->ip.addr.v6,ip_buf,sizeof ip_buf)) goto error; proxychains_write_log(LOG_PREFIX "%s " TP " %s:%d ", begin_mark, ip_buf, htons(pd->port)); pd->ps = PLAY_STATE; struct sockaddr_in addr = { .sin_family = AF_INET, .sin_port = pd->port, .sin_addr.s_addr = (in_addr_t) pd->ip.addr.v4.as_int }; struct sockaddr_in6 addr6 = { .sin6_family = AF_INET6, .sin6_port = pd->port, }; if(v6) memcpy(&addr6.sin6_addr.s6_addr, pd->ip.addr.v6, 16); if(timed_connect(*fd, (struct sockaddr *) (v6?(void*)&addr6:(void*)&addr), v6?sizeof(addr6):sizeof(addr))) { pd->ps = DOWN_STATE; goto error1; } pd->ps = BUSY_STATE; return SUCCESS; error1: proxychains_write_log(TP " timeout\n"); error: if(*fd != -1) close(*fd); return SOCKET_ERROR; } static proxy_data *select_proxy(select_type how, proxy_data * pd, unsigned int proxy_count, unsigned int *offset) { unsigned int i = 0, k = 0; if(*offset >= proxy_count) return NULL; switch (how) { case RANDOMLY: do { k++; i = rand() % proxy_count; } while(pd[i].ps != PLAY_STATE && k < proxy_count * 100); break; case FIFOLY: for(i = *offset; i < proxy_count; i++) { if(pd[i].ps == PLAY_STATE) { *offset = i; break; } } default: break; } if(i >= proxy_count) i = 0; return (pd[i].ps == PLAY_STATE) ? &pd[i] : NULL; } static void release_all(proxy_data * pd, unsigned int proxy_count) { unsigned int i; for(i = 0; i < proxy_count; i++) pd[i].ps = PLAY_STATE; return; } static void release_busy(proxy_data * pd, unsigned int proxy_count) { unsigned int i; for(i = 0; i < proxy_count; i++) if(pd[i].ps == BUSY_STATE) pd[i].ps = PLAY_STATE; return; } static unsigned int calc_alive(proxy_data * pd, unsigned int proxy_count) { unsigned int i; int alive_count = 0; release_busy(pd, proxy_count); for(i = 0; i < proxy_count; i++) if(pd[i].ps == PLAY_STATE) alive_count++; return alive_count; } static int chain_step(int ns, proxy_data * pfrom, proxy_data * pto) { int retcode = -1; char *hostname; char hostname_buf[MSG_LEN_MAX]; char ip_buf[INET6_ADDRSTRLEN]; int v6 = pto->ip.is_v6; PFUNC(); if(!v6 && pto->ip.addr.v4.octet[0] == remote_dns_subnet) { if(!at_get_host_for_ip(pto->ip.addr.v4, hostname_buf)) goto usenumericip; else hostname = hostname_buf; } else { usenumericip: if(!inet_ntop(v6?AF_INET6:AF_INET,pto->ip.addr.v6,ip_buf,sizeof ip_buf)) { pto->ps = DOWN_STATE; proxychains_write_log("<--ip conversion error!\n"); close(ns); return SOCKET_ERROR; } hostname = ip_buf; } proxychains_write_log(TP " %s:%d ", hostname, htons(pto->port)); retcode = tunnel_to(ns, pto->ip, pto->port, pfrom->pt, pfrom->user, pfrom->pass); switch (retcode) { case SUCCESS: pto->ps = BUSY_STATE; break; case BLOCKED: pto->ps = BLOCKED_STATE; proxychains_write_log("<--denied\n"); close(ns); break; case SOCKET_ERROR: pto->ps = DOWN_STATE; proxychains_write_log("<--socket error or timeout!\n"); close(ns); break; } return retcode; } int connect_proxy_chain(int sock, ip_type target_ip, unsigned short target_port, proxy_data * pd, unsigned int proxy_count, chain_type ct, unsigned int max_chain) { proxy_data p4; proxy_data *p1, *p2, *p3; int ns = -1; int rc = -1; unsigned int offset = 0; unsigned int alive_count = 0; unsigned int curr_len = 0; unsigned int looped = 0; // went back to start of list in RR mode unsigned int rr_loop_max = 14; p3 = &p4; PFUNC(); again: rc = -1; DUMP_PROXY_CHAIN(pd, proxy_count); switch (ct) { case DYNAMIC_TYPE: alive_count = calc_alive(pd, proxy_count); offset = 0; do { if(!(p1 = select_proxy(FIFOLY, pd, proxy_count, &offset))) goto error_more; } while(SUCCESS != start_chain(&ns, p1, DT) && offset < proxy_count); for(;;) { p2 = select_proxy(FIFOLY, pd, proxy_count, &offset); if(!p2) break; if(SUCCESS != chain_step(ns, p1, p2)) { PDEBUG("GOTO AGAIN 1\n"); goto again; } p1 = p2; } //proxychains_write_log(TP); p3->ip = target_ip; p3->port = target_port; if(SUCCESS != chain_step(ns, p1, p3)) goto error; break; case ROUND_ROBIN_TYPE: alive_count = calc_alive(pd, proxy_count); offset = proxychains_proxy_offset; if(alive_count < max_chain) goto error_more; PDEBUG("1:rr_offset = %d\n", offset); /* Check from current RR offset til end */ for (;rc != SUCCESS;) { if (!(p1 = select_proxy(FIFOLY, pd, proxy_count, &offset))) { /* We've reached the end of the list, go to the start */ offset = 0; looped++; if (looped > rr_loop_max) { proxychains_proxy_offset = 0; goto error_more; } else { PDEBUG("rr_type all proxies down, release all\n"); release_all(pd, proxy_count); /* Each loop we wait 10ms more */ usleep(10000 * looped); continue; } } PDEBUG("2:rr_offset = %d\n", offset); rc=start_chain(&ns, p1, RRT); } /* Create rest of chain using RR */ for(curr_len = 1; curr_len < max_chain;) { PDEBUG("3:rr_offset = %d, curr_len = %d, max_chain = %d\n", offset, curr_len, max_chain); p2 = select_proxy(FIFOLY, pd, proxy_count, &offset); if(!p2) { /* Try from the beginning to where we started */ offset = 0; continue; } else if(SUCCESS != chain_step(ns, p1, p2)) { PDEBUG("GOTO AGAIN 1\n"); goto again; } else p1 = p2; curr_len++; } //proxychains_write_log(TP); p3->ip = target_ip; p3->port = target_port; proxychains_proxy_offset = offset+1; PDEBUG("pd_offset = %d, curr_len = %d\n", proxychains_proxy_offset, curr_len); if(SUCCESS != chain_step(ns, p1, p3)) goto error; break; case STRICT_TYPE: alive_count = calc_alive(pd, proxy_count); offset = 0; if(!(p1 = select_proxy(FIFOLY, pd, proxy_count, &offset))) { PDEBUG("select_proxy failed\n"); goto error_strict; } if(SUCCESS != start_chain(&ns, p1, ST)) { PDEBUG("start_chain failed\n"); goto error_strict; } while(offset < proxy_count) { if(!(p2 = select_proxy(FIFOLY, pd, proxy_count, &offset))) break; if(SUCCESS != chain_step(ns, p1, p2)) { PDEBUG("chain_step failed\n"); goto error_strict; } p1 = p2; } //proxychains_write_log(TP); p3->ip = target_ip; p3->port = target_port; if(SUCCESS != chain_step(ns, p1, p3)) goto error; break; case RANDOM_TYPE: alive_count = calc_alive(pd, proxy_count); if(alive_count < max_chain) goto error_more; curr_len = offset = 0; do { if(!(p1 = select_proxy(RANDOMLY, pd, proxy_count, &offset))) goto error_more; } while(SUCCESS != start_chain(&ns, p1, RT) && offset < max_chain); while(++curr_len < max_chain) { if(!(p2 = select_proxy(RANDOMLY, pd, proxy_count, &offset))) goto error_more; if(SUCCESS != chain_step(ns, p1, p2)) { PDEBUG("GOTO AGAIN 2\n"); goto again; } p1 = p2; } //proxychains_write_log(TP); p3->ip = target_ip; p3->port = target_port; if(SUCCESS != chain_step(ns, p1, p3)) goto error; } proxychains_write_log(TP " OK\n"); dup2(ns, sock); close(ns); return 0; error: if(ns != -1) close(ns); errno = ECONNREFUSED; // for nmap ;) return -1; error_more: proxychains_write_log("\n!!!need more proxies!!!\n"); error_strict: PDEBUG("error\n"); release_all(pd, proxy_count); if(ns != -1) close(ns); errno = ETIMEDOUT; return -1; } static pthread_mutex_t servbyname_lock; void core_initialize(void) { MUTEX_INIT(&servbyname_lock); } void core_unload(void) { MUTEX_DESTROY(&servbyname_lock); } static void gethostbyname_data_setstring(struct gethostbyname_data* data, char* name) { snprintf(data->addr_name, sizeof(data->addr_name), "%s", name); data->hostent_space.h_name = data->addr_name; } extern ip_type4 hostsreader_get_numeric_ip_for_name(const char* name); struct hostent *proxy_gethostbyname(const char *name, struct gethostbyname_data* data) { PFUNC(); char buff[256]; data->resolved_addr_p[0] = (char *) &data->resolved_addr; data->resolved_addr_p[1] = NULL; data->hostent_space.h_addr_list = data->resolved_addr_p; // let aliases point to the NULL member, mimicking an empty list. data->hostent_space.h_aliases = &data->resolved_addr_p[1]; data->resolved_addr = 0; data->hostent_space.h_addrtype = AF_INET; data->hostent_space.h_length = sizeof(in_addr_t); gethostname(buff, sizeof(buff)); if(!strcmp(buff, name)) { data->resolved_addr = inet_addr(buff); if(data->resolved_addr == (in_addr_t) (-1)) data->resolved_addr = (in_addr_t) (ip_type_localhost.addr.v4.as_int); goto retname; } // this iterates over the "known hosts" db, usually /etc/hosts ip_type4 hdb_res = hostsreader_get_numeric_ip_for_name(name); if(hdb_res.as_int != ip_type_invalid.addr.v4.as_int) { data->resolved_addr = hdb_res.as_int; goto retname; } data->resolved_addr = at_get_ip_for_host((char*) name, strlen(name)).as_int; if(data->resolved_addr == (in_addr_t) ip_type_invalid.addr.v4.as_int) return NULL; retname: gethostbyname_data_setstring(data, (char*) name); PDEBUG("return hostent space\n"); return &data->hostent_space; } struct addrinfo_data { struct addrinfo addrinfo_space; struct sockaddr sockaddr_space; char addr_name[256]; }; void proxy_freeaddrinfo(struct addrinfo *res) { PFUNC(); free(res); } static int mygetservbyname_r(const char* name, const char* proto, struct servent* result_buf, char* buf, size_t buflen, struct servent** result) { PFUNC(); #ifdef HAVE_GNU_GETSERVBYNAME_R PDEBUG("using host getservbyname_r\n"); return getservbyname_r(name, proto, result_buf, buf, buflen, result); #endif struct servent *res; int ret; (void) buf; (void) buflen; MUTEX_LOCK(&servbyname_lock); res = getservbyname(name, proto); if(res) { *result_buf = *res; *result = result_buf; ret = 0; } else { *result = NULL; ret = ENOENT; } MUTEX_UNLOCK(&servbyname_lock); return ret; } int proxy_getaddrinfo(const char *node, const char *service, const struct addrinfo *hints, struct addrinfo **res) { struct gethostbyname_data ghdata; struct addrinfo_data *space; struct servent *se = NULL; struct hostent *hp = NULL; struct servent se_buf; struct addrinfo *p; char buf[1024]; int port; PFUNC(); // printf("proxy_getaddrinfo node %s service %s\n",node,service); space = calloc(1, sizeof(struct addrinfo_data)); if(!space) goto err1; if(node && !inet_aton(node, &((struct sockaddr_in *) &space->sockaddr_space)->sin_addr)) { /* some folks (nmap) use getaddrinfo() with AI_NUMERICHOST to check whether a string containing a numeric ip was passed. we must return failure in that case. */ if(hints && (hints->ai_flags & AI_NUMERICHOST)) { free(space); return EAI_NONAME; } hp = proxy_gethostbyname(node, &ghdata); if(hp) memcpy(&((struct sockaddr_in *) &space->sockaddr_space)->sin_addr, *(hp->h_addr_list), sizeof(in_addr_t)); else goto err2; } if(service) mygetservbyname_r(service, NULL, &se_buf, buf, sizeof(buf), &se); port = se ? se->s_port : htons(atoi(service ? service : "0")); ((struct sockaddr_in *) &space->sockaddr_space)->sin_port = port; *res = p = &space->addrinfo_space; assert((size_t)p == (size_t) space); p->ai_addr = &space->sockaddr_space; if(node) snprintf(space->addr_name, sizeof(space->addr_name), "%s", node); p->ai_canonname = space->addr_name; p->ai_next = NULL; p->ai_family = space->sockaddr_space.sa_family = AF_INET; p->ai_addrlen = sizeof(space->sockaddr_space); if(hints) { p->ai_socktype = hints->ai_socktype; p->ai_flags = hints->ai_flags; p->ai_protocol = hints->ai_protocol; } else { #ifndef AI_V4MAPPED #define AI_V4MAPPED 0 #endif p->ai_flags = (AI_V4MAPPED | AI_ADDRCONFIG); } goto out; err2: free(space); err1: return 1; out: return 0; } proxychains-ng-4.14/src/core.h000066400000000000000000000073571344330035200163140ustar00rootroot00000000000000/*************************************************************************** core.h - description ------------------- begin : Tue May 14 2002 copyright : netcreature (C) 2002 email : netcreature@users.sourceforge.net *************************************************************************** *************************************************************************** * * * This program is free software; you can redistribute it and/or modify * * it under the terms of the GNU General Public License as published by * * the Free Software Foundation; either version 2 of the License, or * * (at your option) any later version. * * * ***************************************************************************/ #include #include #include #include #include #include #ifndef __CORE_HEADER #define __CORE_HEADER #define BUFF_SIZE 8*1024 // used to read responses from proxies. #define MAX_LOCALNET 64 #include "ip_type.h" /*error codes*/ typedef enum { SUCCESS=0, MEMORY_FAIL, // malloc failed SOCKET_ERROR, // look errno for more CHAIN_DOWN, // no proxy in chain responds to tcp CHAIN_EMPTY, // if proxy_count = 0 BLOCKED // target's port blocked on last proxy in the chain } ERR_CODE; typedef enum { HTTP_TYPE, SOCKS4_TYPE, SOCKS5_TYPE } proxy_type; typedef enum { DYNAMIC_TYPE, STRICT_TYPE, RANDOM_TYPE, ROUND_ROBIN_TYPE } chain_type; typedef enum { PLAY_STATE, DOWN_STATE, BLOCKED_STATE, BUSY_STATE } proxy_state; typedef enum { RANDOMLY, FIFOLY } select_type; typedef struct { struct in_addr in_addr, netmask; unsigned short port; } localaddr_arg; typedef struct { ip_type ip; unsigned short port; proxy_type pt; proxy_state ps; char user[256]; char pass[256]; } proxy_data; int connect_proxy_chain (int sock, ip_type target_ip, unsigned short target_port, proxy_data * pd, unsigned int proxy_count, chain_type ct, unsigned int max_chain ); void proxychains_write_log(char *str, ...); typedef int (*close_t)(int); typedef int (*connect_t)(int, const struct sockaddr *, socklen_t); typedef struct hostent* (*gethostbyname_t)(const char *); typedef int (*freeaddrinfo_t)(struct addrinfo *); typedef struct hostent *(*gethostbyaddr_t) (const void *, socklen_t, int); typedef int (*getaddrinfo_t)(const char *, const char *, const struct addrinfo *, struct addrinfo **); typedef int (*getnameinfo_t) (const struct sockaddr *, socklen_t, char *, socklen_t, char *, socklen_t, int); typedef ssize_t (*sendto_t) (int sockfd, const void *buf, size_t len, int flags, const struct sockaddr *dest_addr, socklen_t addrlen); extern connect_t true_connect; extern gethostbyname_t true_gethostbyname; extern getaddrinfo_t true_getaddrinfo; extern freeaddrinfo_t true_freeaddrinfo; extern getnameinfo_t true_getnameinfo; extern gethostbyaddr_t true_gethostbyaddr; struct gethostbyname_data { struct hostent hostent_space; in_addr_t resolved_addr; char *resolved_addr_p[2]; char addr_name[1024 * 8]; }; struct hostent* proxy_gethostbyname(const char *name, struct gethostbyname_data *data); int proxy_getaddrinfo(const char *node, const char *service, const struct addrinfo *hints, struct addrinfo **res); void proxy_freeaddrinfo(struct addrinfo *res); void core_initialize(void); void core_unload(void); #include "debug.h" #endif //RcB: DEP "core.c" //RcB: DEP "libproxychains.c" //RcB: LINK "-Wl,--no-as-needed -ldl -lpthread" proxychains-ng-4.14/src/debug.c000066400000000000000000000015111344330035200164270ustar00rootroot00000000000000 #ifdef DEBUG # include "core.h" # include "common.h" # include "debug.h" #include void DUMP_PROXY_CHAIN(proxy_data *pchain, unsigned int count) { char ip_buf[INET6_ADDRSTRLEN]; for (; count; pchain++, count--) { if(!inet_ntop(pchain->ip.is_v6?AF_INET6:AF_INET,pchain->ip.addr.v6,ip_buf,sizeof ip_buf)) { proxychains_write_log(LOG_PREFIX "error: ip address conversion failed\n"); continue; } PDEBUG("[%s] %s %s:%d", proxy_state_strmap[pchain->ps], proxy_type_strmap[pchain->pt], ip_buf, htons(pchain->port)); if (*pchain->user || *pchain->pass) { PSTDERR(" [u=%s,p=%s]", pchain->user, pchain->pass); } PSTDERR("\n"); } } #else // Do not allow this translation unit to end up empty // for non-DEBUG builds, to satisfy ISO C standards. typedef int __appease_iso_compilers__; #endif proxychains-ng-4.14/src/debug.h000066400000000000000000000010401344330035200164310ustar00rootroot00000000000000#ifndef DEBUG_H #define DEBUG_H #ifdef DEBUG # include # define PSTDERR(fmt, args...) do { dprintf(2,fmt, ## args); } while(0) # define PDEBUG(fmt, args...) PSTDERR("DEBUG:"fmt, ## args) # define DEBUGDECL(args...) args # include "core.h" void DUMP_PROXY_CHAIN(proxy_data *pchain, unsigned int count); #else # define PDEBUG(fmt, args...) do {} while (0) # define DEBUGDECL(args...) # define DUMP_PROXY_CHAIN(args...) do {} while (0) #endif # define PFUNC() do { PDEBUG("pid[%d]:%s\n", getpid(), __FUNCTION__); } while(0) #endif proxychains-ng-4.14/src/hash.c000066400000000000000000000003461344330035200162710ustar00rootroot00000000000000#include "hash.h" /* dalias' version of the elf hash */ uint32_t dalias_hash(char *s0) { unsigned char *s = (void *) s0; uint_fast32_t h = 0; while(*s) { h = 16 * h + *s++; h ^= h >> 24 & 0xf0; } return h & 0xfffffff; } proxychains-ng-4.14/src/hash.h000066400000000000000000000001611344330035200162710ustar00rootroot00000000000000#ifndef HASH_H #define HASH_H #include uint32_t dalias_hash(char *s0); //RcB: DEP "hash.c" #endif proxychains-ng-4.14/src/hostsreader.c000066400000000000000000000051031344330035200176650ustar00rootroot00000000000000#include #include #include /* simple reader for /etc/hosts it only supports comments, blank lines and lines consisting of an ipv4 hostname pair. this is required so we can return entries from the host db without messing up the non-thread-safe state of libc's gethostent(). */ struct hostsreader { FILE *f; char* ip, *name; }; int hostsreader_open(struct hostsreader *ctx) { if(!(ctx->f = fopen("/etc/hosts", "r"))) return 0; return 1; } void hostsreader_close(struct hostsreader *ctx) { fclose(ctx->f); } static int isnumericipv4(const char* ipstring); int hostsreader_get(struct hostsreader *ctx, char* buf, size_t bufsize) { while(1) { if(!fgets(buf, bufsize, ctx->f)) return 0; if(*buf == '#') continue; char *p = buf; size_t l = bufsize; ctx->ip = p; while(*p && !isspace(*p) && l) { p++; l--; } if(!l || !*p || p == ctx->ip) continue; *p = 0; p++; while(*p && isspace(*p) && l) { p++; l--; } if(!l || !*p) continue; ctx->name = p; while(*p && !isspace(*p) && l) { p++; l--; } if(!l || !*p) continue; *p = 0; if(isnumericipv4(ctx->ip)) return 1; } } char* hostsreader_get_ip_for_name(const char* name, char* buf, size_t bufsize) { struct hostsreader ctx; char *res = 0; if(!hostsreader_open(&ctx)) return 0; while(hostsreader_get(&ctx, buf, bufsize)) { if(!strcmp(ctx.name, name)) { res = ctx.ip; break; } } hostsreader_close(&ctx); return res; } #include "ip_type.h" #include #include #include ip_type4 hostsreader_get_numeric_ip_for_name(const char* name) { char *hres; char buf[320]; if((hres = hostsreader_get_ip_for_name(name, buf, sizeof buf))) { struct in_addr c; inet_aton(hres, &c); ip_type4 res; memcpy(res.octet, &c.s_addr, 4); return res; } else return ip_type_invalid.addr.v4; } #ifdef HOSTSREADER_TEST #include "ip_type.c" int main(int a, char**b) { char buf[256]; if(a != 2) return 1; char * ret = hostsreader_get_ip_for_name(b[1], buf, sizeof buf); printf("%s\n", ret ? ret : "null"); } #endif /* isnumericipv4() taken from libulz */ static int isnumericipv4(const char* ipstring) { size_t x = 0, n = 0, d = 0; int wasdot = 0; while(1) { switch(ipstring[x]) { case 0: goto done; case '.': if(!n || wasdot) return 0; d++; wasdot = 1; break; case '0': case '1': case '2': case '3': case '4': case '5': case '6': case '7': case '8': case '9': n++; wasdot = 0; break; default: return 0; } x++; } done: if(d == 3 && n >= 4 && n <= 12) return 1; return 0; } proxychains-ng-4.14/src/ip_type.c000066400000000000000000000002301344330035200170070ustar00rootroot00000000000000#include "ip_type.h" const ip_type ip_type_invalid = { .addr.v4.as_int = -1 }; const ip_type ip_type_localhost = { .addr.v4.octet = {127, 0, 0, 1} }; proxychains-ng-4.14/src/ip_type.h000066400000000000000000000005221344330035200170200ustar00rootroot00000000000000#ifndef IP_TYPE_H #define IP_TYPE_H #include typedef union { unsigned char octet[4]; uint32_t as_int; } ip_type4; typedef struct { union { ip_type4 v4; unsigned char v6[16]; } addr; char is_v6; } ip_type; extern const ip_type ip_type_invalid; extern const ip_type ip_type_localhost; //RcB: DEP "ip_type.c" #endif proxychains-ng-4.14/src/libproxychains.c000066400000000000000000000455171344330035200204150ustar00rootroot00000000000000/*************************************************************************** libproxychains.c - description ------------------- begin : Tue May 14 2002 copyright : netcreature (C) 2002 email : netcreature@users.sourceforge.net ***************************************************************************/ /* GPL */ /*************************************************************************** * * * This program is free software; you can redistribute it and/or modify * * it under the terms of the GNU General Public License as published by * * the Free Software Foundation; either version 2 of the License, or * * (at your option) any later version. * * * ***************************************************************************/ #undef _GNU_SOURCE #define _GNU_SOURCE #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "core.h" #include "common.h" #define satosin(x) ((struct sockaddr_in *) &(x)) #define SOCKADDR(x) (satosin(x)->sin_addr.s_addr) #define SOCKADDR_2(x) (satosin(x)->sin_addr) #define SOCKPORT(x) (satosin(x)->sin_port) #define SOCKFAMILY(x) (satosin(x)->sin_family) #define MAX_CHAIN 512 #ifdef IS_SOLARIS #undef connect int __xnet_connect(int sock, const struct sockaddr *addr, unsigned int len); connect_t true___xnet_connect; #endif close_t true_close; connect_t true_connect; gethostbyname_t true_gethostbyname; getaddrinfo_t true_getaddrinfo; freeaddrinfo_t true_freeaddrinfo; getnameinfo_t true_getnameinfo; gethostbyaddr_t true_gethostbyaddr; sendto_t true_sendto; int tcp_read_time_out; int tcp_connect_time_out; chain_type proxychains_ct; proxy_data proxychains_pd[MAX_CHAIN]; unsigned int proxychains_proxy_count = 0; unsigned int proxychains_proxy_offset = 0; int proxychains_got_chain_data = 0; unsigned int proxychains_max_chain = 1; int proxychains_quiet_mode = 0; int proxychains_resolver = 0; localaddr_arg localnet_addr[MAX_LOCALNET]; size_t num_localnet_addr = 0; unsigned int remote_dns_subnet = 224; pthread_once_t init_once = PTHREAD_ONCE_INIT; static int init_l = 0; static void get_chain_data(proxy_data * pd, unsigned int *proxy_count, chain_type * ct); static void* load_sym(char* symname, void* proxyfunc) { void *funcptr = dlsym(RTLD_NEXT, symname); if(!funcptr) { fprintf(stderr, "Cannot load symbol '%s' %s\n", symname, dlerror()); exit(1); } else { PDEBUG("loaded symbol '%s'" " real addr %p wrapped addr %p\n", symname, funcptr, proxyfunc); } if(funcptr == proxyfunc) { PDEBUG("circular reference detected, aborting!\n"); abort(); } return funcptr; } #define INIT() init_lib_wrapper(__FUNCTION__) #define SETUP_SYM(X) do { if (! true_ ## X ) true_ ## X = load_sym( # X, X ); } while(0) #include "allocator_thread.h" const char *proxychains_get_version(void); static void setup_hooks(void) { SETUP_SYM(connect); SETUP_SYM(sendto); SETUP_SYM(gethostbyname); SETUP_SYM(getaddrinfo); SETUP_SYM(freeaddrinfo); SETUP_SYM(gethostbyaddr); SETUP_SYM(getnameinfo); SETUP_SYM(close); #ifdef IS_SOLARIS SETUP_SYM(__xnet_connect); #endif } static int close_fds[16]; static int close_fds_cnt = 0; static void do_init(void) { srand(time(NULL)); core_initialize(); at_init(); /* read the config file */ get_chain_data(proxychains_pd, &proxychains_proxy_count, &proxychains_ct); DUMP_PROXY_CHAIN(proxychains_pd, proxychains_proxy_count); proxychains_write_log(LOG_PREFIX "DLL init: proxychains-ng %s\n", proxychains_get_version()); setup_hooks(); while(close_fds_cnt) true_close(close_fds[--close_fds_cnt]); init_l = 1; } static void init_lib_wrapper(const char* caller) { #ifndef DEBUG (void) caller; #endif if(!init_l) PDEBUG("%s called from %s\n", __FUNCTION__, caller); pthread_once(&init_once, do_init); } /* if we use gcc >= 3, we can instruct the dynamic loader * to call init_lib at link time. otherwise it gets loaded * lazily, which has the disadvantage that there's a potential * race condition if 2 threads call it before init_l is set * and PTHREAD support was disabled */ #if __GNUC__ > 2 __attribute__((constructor)) static void gcc_init(void) { INIT(); } #endif typedef enum { RS_PT_NONE = 0, RS_PT_SOCKS4, RS_PT_SOCKS5, RS_PT_HTTP } rs_proxyType; /* proxy_from_string() taken from rocksock network I/O library (C) rofl0r valid inputs: socks5://user:password@proxy.domain.com:port socks5://proxy.domain.com:port socks4://proxy.domain.com:port http://user:password@proxy.domain.com:port http://proxy.domain.com:port supplying port number is obligatory. user:pass@ part is optional for http and socks5. however, user:pass authentication is currently not implemented for http proxies. return 1 on success, 0 on error. */ static int proxy_from_string(const char *proxystring, char *type_buf, char* host_buf, int *port_n, char *user_buf, char* pass_buf) { const char* p; rs_proxyType proxytype; size_t next_token = 6, ul = 0, pl = 0, hl; if(!proxystring[0] || !proxystring[1] || !proxystring[2] || !proxystring[3] || !proxystring[4] || !proxystring[5]) goto inv_string; if(*proxystring == 's') { switch(proxystring[5]) { case '5': proxytype = RS_PT_SOCKS5; break; case '4': proxytype = RS_PT_SOCKS4; break; default: goto inv_string; } } else if(*proxystring == 'h') { proxytype = RS_PT_HTTP; next_token = 4; } else goto inv_string; if( proxystring[next_token++] != ':' || proxystring[next_token++] != '/' || proxystring[next_token++] != '/') goto inv_string; const char *at = strchr(proxystring+next_token, '@'); if(at) { if(proxytype == RS_PT_SOCKS4) return 0; p = strchr(proxystring+next_token, ':'); if(!p || p >= at) goto inv_string; const char *u = proxystring+next_token; ul = p-u; p++; pl = at-p; if(proxytype == RS_PT_SOCKS5 && (ul > 255 || pl > 255)) return 0; memcpy(user_buf, u, ul); user_buf[ul]=0; memcpy(pass_buf, p, pl); pass_buf[pl]=0; next_token += 2+ul+pl; } else { user_buf[0]=0; pass_buf[0]=0; } const char* h = proxystring+next_token; p = strchr(h, ':'); if(!p) goto inv_string; hl = p-h; if(hl > 255) return 0; memcpy(host_buf, h, hl); host_buf[hl]=0; *port_n = atoi(p+1); switch(proxytype) { case RS_PT_SOCKS4: strcpy(type_buf, "socks4"); break; case RS_PT_SOCKS5: strcpy(type_buf, "socks5"); break; case RS_PT_HTTP: strcpy(type_buf, "http"); break; default: return 0; } return 1; inv_string: return 0; } static const char* bool_str(int bool_val) { if(bool_val) return "true"; return "false"; } /* get configuration from config file */ static void get_chain_data(proxy_data * pd, unsigned int *proxy_count, chain_type * ct) { int count = 0, port_n = 0, list = 0; char buff[1024], type[1024], host[1024], user[1024]; char *env; char local_in_addr_port[32]; char local_in_addr[32], local_in_port[32], local_netmask[32]; FILE *file = NULL; if(proxychains_got_chain_data) return; //Some defaults tcp_read_time_out = 4 * 1000; tcp_connect_time_out = 10 * 1000; *ct = DYNAMIC_TYPE; env = get_config_path(getenv(PROXYCHAINS_CONF_FILE_ENV_VAR), buff, sizeof(buff)); if( ( file = fopen(env, "r") ) == NULL ) { perror("couldnt read configuration file"); exit(1); } env = getenv(PROXYCHAINS_QUIET_MODE_ENV_VAR); if(env && *env == '1') proxychains_quiet_mode = 1; while(fgets(buff, sizeof(buff), file)) { if(buff[0] != '\n' && buff[strspn(buff, " ")] != '#') { /* proxylist has to come last */ if(list) { if(count >= MAX_CHAIN) break; memset(&pd[count], 0, sizeof(proxy_data)); pd[count].ps = PLAY_STATE; port_n = 0; int ret = sscanf(buff, "%s %s %d %s %s", type, host, &port_n, pd[count].user, pd[count].pass); if(ret < 3 || ret == EOF) { if(!proxy_from_string(buff, type, host, &port_n, pd[count].user, pd[count].pass)) { inv: fprintf(stderr, "error: invalid item in proxylist section: %s", buff); exit(1); } } memset(&pd[count].ip, 0, sizeof(pd[count].ip)); pd[count].ip.is_v6 = !!strchr(host, ':'); pd[count].port = htons((unsigned short) port_n); ip_type* host_ip = &pd[count].ip; if(1 != inet_pton(host_ip->is_v6 ? AF_INET6 : AF_INET, host, host_ip->addr.v6)) { if(*ct == STRICT_TYPE && proxychains_resolver && count > 0) { /* we can allow dns hostnames for all but the first proxy in the list if chaintype is strict, as remote lookup can be done */ ip_type4 internal_ip = at_get_ip_for_host(host, strlen(host)); pd[count].ip.is_v6 = 0; host_ip->addr.v4 = internal_ip; if(internal_ip.as_int == ip_type_invalid.addr.v4.as_int) goto inv_host; } else { inv_host: fprintf(stderr, "proxy %s has invalid value or is not numeric\n", host); fprintf(stderr, "non-numeric ips are only allowed under the following circumstances:\n"); fprintf(stderr, "chaintype == strict (%s), proxy is not first in list (%s), proxy_dns active (%s)\n\n", bool_str(*ct == STRICT_TYPE), bool_str(count > 0), bool_str(proxychains_resolver)); exit(1); } } if(!strcmp(type, "http")) { pd[count].pt = HTTP_TYPE; } else if(!strcmp(type, "socks4")) { pd[count].pt = SOCKS4_TYPE; } else if(!strcmp(type, "socks5")) { pd[count].pt = SOCKS5_TYPE; } else goto inv; if(port_n) count++; } else { if(strstr(buff, "[ProxyList]")) { list = 1; } else if(strstr(buff, "random_chain")) { *ct = RANDOM_TYPE; } else if(strstr(buff, "strict_chain")) { *ct = STRICT_TYPE; } else if(strstr(buff, "dynamic_chain")) { *ct = DYNAMIC_TYPE; } else if(strstr(buff, "round_robin_chain")) { *ct = ROUND_ROBIN_TYPE; } else if(strstr(buff, "tcp_read_time_out")) { sscanf(buff, "%s %d", user, &tcp_read_time_out); } else if(strstr(buff, "tcp_connect_time_out")) { sscanf(buff, "%s %d", user, &tcp_connect_time_out); } else if(strstr(buff, "remote_dns_subnet")) { sscanf(buff, "%s %u", user, &remote_dns_subnet); if(remote_dns_subnet >= 256) { fprintf(stderr, "remote_dns_subnet: invalid value. requires a number between 0 and 255.\n"); exit(1); } } else if(strstr(buff, "localnet")) { if(sscanf(buff, "%s %21[^/]/%15s", user, local_in_addr_port, local_netmask) < 3) { fprintf(stderr, "localnet format error"); exit(1); } /* clean previously used buffer */ memset(local_in_port, 0, sizeof(local_in_port) / sizeof(local_in_port[0])); if(sscanf(local_in_addr_port, "%15[^:]:%5s", local_in_addr, local_in_port) < 2) { PDEBUG("added localnet: netaddr=%s, netmask=%s\n", local_in_addr, local_netmask); } else { PDEBUG("added localnet: netaddr=%s, port=%s, netmask=%s\n", local_in_addr, local_in_port, local_netmask); } if(num_localnet_addr < MAX_LOCALNET) { int error; error = inet_pton(AF_INET, local_in_addr, &localnet_addr[num_localnet_addr].in_addr); if(error <= 0) { fprintf(stderr, "localnet address error\n"); exit(1); } error = inet_pton(AF_INET, local_netmask, &localnet_addr[num_localnet_addr].netmask); if(error <= 0) { fprintf(stderr, "localnet netmask error\n"); exit(1); } if(local_in_port[0]) { localnet_addr[num_localnet_addr].port = (short) atoi(local_in_port); } else { localnet_addr[num_localnet_addr].port = 0; } ++num_localnet_addr; } else { fprintf(stderr, "# of localnet exceed %d.\n", MAX_LOCALNET); } } else if(strstr(buff, "chain_len")) { char *pc; int len; pc = strchr(buff, '='); if(!pc) { fprintf(stderr, "error: missing equals sign '=' in chain_len directive.\n"); exit(1); } len = atoi(++pc); proxychains_max_chain = (len ? len : 1); } else if(strstr(buff, "quiet_mode")) { proxychains_quiet_mode = 1; } else if(strstr(buff, "proxy_dns")) { proxychains_resolver = 1; } } } } #ifndef BROKEN_FCLOSE fclose(file); #endif if(!count) { fprintf(stderr, "error: no valid proxy found in config\n"); exit(1); } *proxy_count = count; proxychains_got_chain_data = 1; PDEBUG("proxy_dns: %s\n", proxychains_resolver ? "ON" : "OFF"); } /******* HOOK FUNCTIONS *******/ int close(int fd) { if(!init_l) { if(close_fds_cnt>=(sizeof close_fds/sizeof close_fds[0])) goto err; close_fds[close_fds_cnt++] = fd; errno = 0; return 0; } /* prevent rude programs (like ssh) from closing our pipes */ if(fd != req_pipefd[0] && fd != req_pipefd[1] && fd != resp_pipefd[0] && fd != resp_pipefd[1]) { return true_close(fd); } err: errno = EBADF; return -1; } static int is_v4inv6(const struct in6_addr *a) { return !memcmp(a->s6_addr, "\0\0\0\0\0\0\0\0\0\0\xff\xff", 12); } int connect(int sock, const struct sockaddr *addr, unsigned int len) { INIT(); PFUNC(); int socktype = 0, flags = 0, ret = 0; socklen_t optlen = 0; ip_type dest_ip; DEBUGDECL(char str[256]); struct in_addr *p_addr_in; struct in6_addr *p_addr_in6; unsigned short port; size_t i; int remote_dns_connect = 0; optlen = sizeof(socktype); sa_family_t fam = SOCKFAMILY(*addr); getsockopt(sock, SOL_SOCKET, SO_TYPE, &socktype, &optlen); if(!((fam == AF_INET || fam == AF_INET6) && socktype == SOCK_STREAM)) return true_connect(sock, addr, len); int v6 = dest_ip.is_v6 = fam == AF_INET6; p_addr_in = &((struct sockaddr_in *) addr)->sin_addr; p_addr_in6 = &((struct sockaddr_in6 *) addr)->sin6_addr; port = !v6 ? ntohs(((struct sockaddr_in *) addr)->sin_port) : ntohs(((struct sockaddr_in6 *) addr)->sin6_port); struct in_addr v4inv6; if(v6 && is_v4inv6(p_addr_in6)) { memcpy(&v4inv6.s_addr, &p_addr_in6->s6_addr[12], 4); v6 = dest_ip.is_v6 = 0; p_addr_in = &v4inv6; } if(!v6 && !memcmp(p_addr_in, "\0\0\0\0", 4)) { errno = ECONNREFUSED; return -1; } // PDEBUG("localnet: %s; ", inet_ntop(AF_INET,&in_addr_localnet, str, sizeof(str))); // PDEBUG("netmask: %s; " , inet_ntop(AF_INET, &in_addr_netmask, str, sizeof(str))); PDEBUG("target: %s\n", inet_ntop(v6 ? AF_INET6 : AF_INET, v6 ? (void*)p_addr_in6 : (void*)p_addr_in, str, sizeof(str))); PDEBUG("port: %d\n", port); // check if connect called from proxydns remote_dns_connect = !v6 && (ntohl(p_addr_in->s_addr) >> 24 == remote_dns_subnet); if (!v6) for(i = 0; i < num_localnet_addr && !remote_dns_connect; i++) { if((localnet_addr[i].in_addr.s_addr & localnet_addr[i].netmask.s_addr) == (p_addr_in->s_addr & localnet_addr[i].netmask.s_addr)) { if(!localnet_addr[i].port || localnet_addr[i].port == port) { PDEBUG("accessing localnet using true_connect\n"); return true_connect(sock, addr, len); } } } flags = fcntl(sock, F_GETFL, 0); if(flags & O_NONBLOCK) fcntl(sock, F_SETFL, !O_NONBLOCK); memcpy(dest_ip.addr.v6, v6 ? (void*)p_addr_in6 : (void*)p_addr_in, v6?16:4); ret = connect_proxy_chain(sock, dest_ip, htons(port), proxychains_pd, proxychains_proxy_count, proxychains_ct, proxychains_max_chain); fcntl(sock, F_SETFL, flags); if(ret != SUCCESS) errno = ECONNREFUSED; return ret; } #ifdef IS_SOLARIS int __xnet_connect(int sock, const struct sockaddr *addr, unsigned int len) { return connect(sock, addr, len); } #endif static struct gethostbyname_data ghbndata; struct hostent *gethostbyname(const char *name) { INIT(); PDEBUG("gethostbyname: %s\n", name); if(proxychains_resolver) return proxy_gethostbyname(name, &ghbndata); else return true_gethostbyname(name); return NULL; } int getaddrinfo(const char *node, const char *service, const struct addrinfo *hints, struct addrinfo **res) { INIT(); PDEBUG("getaddrinfo: %s %s\n", node ? node : "null", service ? service : "null"); if(proxychains_resolver) return proxy_getaddrinfo(node, service, hints, res); else return true_getaddrinfo(node, service, hints, res); } void freeaddrinfo(struct addrinfo *res) { INIT(); PDEBUG("freeaddrinfo %p \n", (void *) res); if(!proxychains_resolver) true_freeaddrinfo(res); else proxy_freeaddrinfo(res); } int pc_getnameinfo(const struct sockaddr *sa, socklen_t salen, char *host, socklen_t hostlen, char *serv, socklen_t servlen, int flags) { INIT(); PFUNC(); if(!proxychains_resolver) { return true_getnameinfo(sa, salen, host, hostlen, serv, servlen, flags); } else { if(!salen || !(SOCKFAMILY(*sa) == AF_INET || SOCKFAMILY(*sa) == AF_INET6)) return EAI_FAMILY; int v6 = SOCKFAMILY(*sa) == AF_INET6; if(salen < (v6?sizeof(struct sockaddr_in6):sizeof(struct sockaddr_in))) return EAI_FAMILY; if(hostlen) { unsigned char v4inv6buf[4]; const void *ip = v6 ? (void*)&((struct sockaddr_in6*)sa)->sin6_addr : (void*)&((struct sockaddr_in*)sa)->sin_addr; unsigned scopeid = 0; if(v6) { if(is_v4inv6(&((struct sockaddr_in6*)sa)->sin6_addr)) { memcpy(v4inv6buf, &((struct sockaddr_in6*)sa)->sin6_addr.s6_addr[12], 4); ip = v4inv6buf; v6 = 0; } else scopeid = ((struct sockaddr_in6 *)sa)->sin6_scope_id; } if(!inet_ntop(v6?AF_INET6:AF_INET,ip,host,hostlen)) return EAI_OVERFLOW; if(scopeid) { size_t l = strlen(host); if(snprintf(host+l, hostlen-l, "%%%u", scopeid) >= hostlen-l) return EAI_OVERFLOW; } } if(servlen) { if(snprintf(serv, servlen, "%d", ntohs(SOCKPORT(*sa))) >= servlen) return EAI_OVERFLOW; } } return 0; } struct hostent *gethostbyaddr(const void *addr, socklen_t len, int type) { INIT(); PDEBUG("TODO: proper gethostbyaddr hook\n"); static char buf[16]; static char ipv4[4]; static char *list[2]; static char *aliases[1]; static struct hostent he; if(!proxychains_resolver) return true_gethostbyaddr(addr, len, type); else { PDEBUG("len %u\n", len); if(len != 4) return NULL; he.h_name = buf; memcpy(ipv4, addr, 4); list[0] = ipv4; list[1] = NULL; he.h_addr_list = list; he.h_addrtype = AF_INET; aliases[0] = NULL; he.h_aliases = aliases; he.h_length = 4; pc_stringfromipv4((unsigned char *) addr, buf); return &he; } return NULL; } #ifndef MSG_FASTOPEN # define MSG_FASTOPEN 0x20000000 #endif ssize_t sendto(int sockfd, const void *buf, size_t len, int flags, const struct sockaddr *dest_addr, socklen_t addrlen) { INIT(); PFUNC(); if (flags & MSG_FASTOPEN) { if (!connect(sockfd, dest_addr, addrlen) && errno != EINPROGRESS) { return -1; } dest_addr = NULL; addrlen = 0; flags &= ~MSG_FASTOPEN; } return true_sendto(sockfd, buf, len, flags, dest_addr, addrlen); } proxychains-ng-4.14/src/main.c000066400000000000000000000076161344330035200163010ustar00rootroot00000000000000/* (C) 2011, 2012 rofl0r * * * This program is free software; you can redistribute it and/or modify * * it under the terms of the GNU General Public License as published by * * the Free Software Foundation; either version 2 of the License, or * * (at your option) any later version. * * * ***************************************************************************/ #undef _POSIX_C_SOURCE #define _POSIX_C_SOURCE 200112L #undef _XOPEN_SOURCE #define _XOPEN_SOURCE 600 #include #include #include #include #include #include #include #include "common.h" static int usage(char **argv) { printf("\nUsage:\t%s -q -f config_file program_name [arguments]\n" "\t-q makes proxychains quiet - this overrides the config setting\n" "\t-f allows one to manually specify a configfile to use\n" "\tfor example : proxychains telnet somehost.com\n" "More help in README file\n\n", argv[0]); return EXIT_FAILURE; } static const char *dll_name = DLL_NAME; static char own_dir[256]; static const char *dll_dirs[] = { #ifndef SUPER_SECURE /* CVE-2015-3887 */ ".", #endif own_dir, LIB_DIR, "/lib", "/usr/lib", "/usr/local/lib", "/lib64", NULL }; static void set_own_dir(const char *argv0) { size_t l = strlen(argv0); while(l && argv0[l - 1] != '/') l--; if(l == 0) #ifdef SUPER_SECURE memcpy(own_dir, "/dev/null/", 11); #else memcpy(own_dir, ".", 2); #endif else { memcpy(own_dir, argv0, l - 1); own_dir[l] = 0; } } #define MAX_COMMANDLINE_FLAGS 2 int main(int argc, char *argv[]) { char *path = NULL; char buf[256]; char pbuf[256]; int start_argv = 1; int quiet = 0; size_t i; const char *prefix = NULL; if(argc == 2 && !strcmp(argv[1], "--help")) return usage(argv); for(i = 0; i < MAX_COMMANDLINE_FLAGS; i++) { if(start_argv < argc && argv[start_argv][0] == '-') { if(argv[start_argv][1] == 'q') { quiet = 1; start_argv++; } else if(argv[start_argv][1] == 'f') { if(start_argv + 1 < argc) path = argv[start_argv + 1]; else return usage(argv); start_argv += 2; } } else break; } if(start_argv >= argc) return usage(argv); /* check if path of config file has not been passed via command line */ path = get_config_path(path, pbuf, sizeof(pbuf)); if(!quiet) fprintf(stderr, LOG_PREFIX "config file found: %s\n", path); /* Set PROXYCHAINS_CONF_FILE to get proxychains lib to use new config file. */ setenv(PROXYCHAINS_CONF_FILE_ENV_VAR, path, 1); if(quiet) setenv(PROXYCHAINS_QUIET_MODE_ENV_VAR, "1", 1); // search DLL set_own_dir(argv[0]); i = 0; while(dll_dirs[i]) { snprintf(buf, sizeof(buf), "%s/%s", dll_dirs[i], dll_name); if(access(buf, R_OK) != -1) { prefix = dll_dirs[i]; break; } i++; } if(!prefix) { fprintf(stderr, "couldnt locate %s\n", dll_name); return EXIT_FAILURE; } if(!quiet) fprintf(stderr, LOG_PREFIX "preloading %s/%s\n", prefix, dll_name); #ifdef IS_MAC putenv("DYLD_FORCE_FLAT_NAMESPACE=1"); #define LD_PRELOAD_ENV "DYLD_INSERT_LIBRARIES" #define LD_PRELOAD_SEP ":" #else #define LD_PRELOAD_ENV "LD_PRELOAD" /* all historic implementations of BSD and linux dynlinkers seem to support space as LD_PRELOAD separator, with colon added only recently. we use the old syntax for maximum compat */ #define LD_PRELOAD_SEP " " #endif char *old_val = getenv(LD_PRELOAD_ENV); snprintf(buf, sizeof(buf), LD_PRELOAD_ENV "=%s/%s%s%s", prefix, dll_name, /* append previous LD_PRELOAD content, if existent */ old_val ? LD_PRELOAD_SEP : "", old_val ? old_val : ""); putenv(buf); execvp(argv[start_argv], &argv[start_argv]); perror("proxychains can't load process...."); return EXIT_FAILURE; } proxychains-ng-4.14/src/mutex.h000066400000000000000000000004021344330035200165060ustar00rootroot00000000000000#ifndef MUTEX_H #define MUTEX_H #include # define MUTEX_LOCK(x) pthread_mutex_lock(x) # define MUTEX_UNLOCK(x) pthread_mutex_unlock(x) # define MUTEX_INIT(x) pthread_mutex_init(x, NULL) # define MUTEX_DESTROY(x) pthread_mutex_destroy(x) #endif proxychains-ng-4.14/src/nameinfo.c000066400000000000000000000006671344330035200171500ustar00rootroot00000000000000#include extern int pc_getnameinfo(const void *sa, socklen_t salen, char *host, socklen_t hostlen, char *serv, socklen_t servlen, int flags); int getnameinfo(const void *sa, socklen_t salen, char *host, socklen_t hostlen, char *serv, socklen_t servlen, int flags) { return pc_getnameinfo(sa, salen, host, hostlen, serv, servlen, flags); } proxychains-ng-4.14/src/proxychains.conf000066400000000000000000000071241344330035200204210ustar00rootroot00000000000000# proxychains.conf VER 4.x # # HTTP, SOCKS4a, SOCKS5 tunneling proxifier with DNS. # The option below identifies how the ProxyList is treated. # only one option should be uncommented at time, # otherwise the last appearing option will be accepted # #dynamic_chain # # Dynamic - Each connection will be done via chained proxies # all proxies chained in the order as they appear in the list # at least one proxy must be online to play in chain # (dead proxies are skipped) # otherwise EINTR is returned to the app # strict_chain # # Strict - Each connection will be done via chained proxies # all proxies chained in the order as they appear in the list # all proxies must be online to play in chain # otherwise EINTR is returned to the app # #round_robin_chain # # Round Robin - Each connection will be done via chained proxies # of chain_len length # all proxies chained in the order as they appear in the list # at least one proxy must be online to play in chain # (dead proxies are skipped). # the start of the current proxy chain is the proxy after the last # proxy in the previously invoked proxy chain. # if the end of the proxy chain is reached while looking for proxies # start at the beginning again. # otherwise EINTR is returned to the app # These semantics are not guaranteed in a multithreaded environment. # #random_chain # # Random - Each connection will be done via random proxy # (or proxy chain, see chain_len) from the list. # this option is good to test your IDS :) # Make sense only if random_chain or round_robin_chain #chain_len = 2 # Quiet mode (no output from library) #quiet_mode # Proxy DNS requests - no leak for DNS data proxy_dns # set the class A subnet number to use for the internal remote DNS mapping # we use the reserved 224.x.x.x range by default, # if the proxified app does a DNS request, we will return an IP from that range. # on further accesses to this ip we will send the saved DNS name to the proxy. # in case some control-freak app checks the returned ip, and denies to # connect, you can use another subnet, e.g. 10.x.x.x or 127.x.x.x. # of course you should make sure that the proxified app does not need # *real* access to this subnet. # i.e. dont use the same subnet then in the localnet section #remote_dns_subnet 127 #remote_dns_subnet 10 remote_dns_subnet 224 # Some timeouts in milliseconds tcp_read_time_out 15000 tcp_connect_time_out 8000 ### Examples for localnet exclusion ## localnet ranges will *not* use a proxy to connect. ## Exclude connections to 192.168.1.0/24 with port 80 # localnet 192.168.1.0:80/255.255.255.0 ## Exclude connections to 192.168.100.0/24 # localnet 192.168.100.0/255.255.255.0 ## Exclude connections to ANYwhere with port 80 # localnet 0.0.0.0:80/0.0.0.0 ## RFC5735 Loopback address range ## if you enable this, you have to make sure remote_dns_subnet is not 127 ## you'll need to enable it if you want to use an application that ## connects to localhost. # localnet 127.0.0.0/255.0.0.0 ## RFC1918 Private Address Ranges # localnet 10.0.0.0/255.0.0.0 # localnet 172.16.0.0/255.240.0.0 # localnet 192.168.0.0/255.255.0.0 # ProxyList format # type ip port [user pass] # (values separated by 'tab' or 'blank') # # only numeric ipv4 addresses are valid # # # Examples: # # socks5 192.168.67.78 1080 lamer secret # http 192.168.89.3 8080 justu hidden # socks4 192.168.1.49 1080 # http 192.168.39.93 8080 # # # proxy types: http, socks4, socks5 # ( auth types supported: "basic"-http "user/pass"-socks ) # [ProxyList] # add proxy here ... # meanwile # defaults set to "tor" socks4 127.0.0.1 9050 proxychains-ng-4.14/src/proxyresolv000077500000000000000000000006571344330035200175510ustar00rootroot00000000000000#!/bin/sh # This is a legacy script that uses "dig" to do DNS lookups via TCP. # it is not actively maintained since proxychains no longer depends # on it. i leave it here as a bonus. # DNS server used to resolve names DNS_SERVER=8.8.8.8 if [ $# = 0 ] ; then echo " usage:" echo " proxyresolv " exit fi export LD_PRELOAD=libproxychains4.so dig $1 @$DNS_SERVER +tcp | awk '/A.?[0-9]+\.[0-9]+\.[0-9]/{print $5;}' proxychains-ng-4.14/src/version.c000066400000000000000000000001741344330035200170320ustar00rootroot00000000000000#include "version.h" static const char version[] = VERSION; const char *proxychains_get_version(void) { return version; } proxychains-ng-4.14/tests/000077500000000000000000000000001344330035200155525ustar00rootroot00000000000000proxychains-ng-4.14/tests/test_getaddrinfo.c000066400000000000000000000020761344330035200212500ustar00rootroot00000000000000#include #include #include #include #include #ifndef NI_MAXHOST #define NI_MAXHOST 1025 #endif static int doit(const char* host, const char* service) { struct addrinfo *result; struct addrinfo *res; int error; /* resolve the domain name into a list of addresses */ error = getaddrinfo(host, service, NULL, &result); if (error != 0) { fprintf(stderr, "error in getaddrinfo: %s\n", gai_strerror(error)); return EXIT_FAILURE; } /* loop over all returned results and do inverse lookup */ for (res = result; res != NULL; res = res->ai_next) { char hostname[NI_MAXHOST] = ""; error = getnameinfo(res->ai_addr, res->ai_addrlen, hostname, NI_MAXHOST, NULL, 0, 0); if (error != 0) { fprintf(stderr, "error in getnameinfo: %s\n", gai_strerror(error)); continue; } if (*hostname != '\0') printf("hostname: %s\n", hostname); } freeaddrinfo(result); return EXIT_SUCCESS; } int main(void) { int ret; ret = doit("www.example.com", NULL); ret = doit("www.example.com", "80"); return ret; } proxychains-ng-4.14/tests/test_gethostent.c000066400000000000000000000007261344330035200211460ustar00rootroot00000000000000#include #include #include "../src/common.h" void printhostent(struct hostent *hp) { char ipbuf[16]; pc_stringfromipv4(hp->h_addr_list[0], ipbuf); printf("alias: %p, len: %d, name: %s, addrlist: %p, addrtype: %d, ip: %s\n", hp->h_aliases, hp->h_length, hp->h_name, hp->h_addr_list, hp->h_addrtype, ipbuf ); } int main(int argc, char** argv) { struct hostent *hp; while((hp = gethostent())) { printhostent(hp); } return 0; } proxychains-ng-4.14/tests/test_gethostent_r.c000066400000000000000000000032571344330035200214710ustar00rootroot00000000000000#include #include #include #include "../src/common.h" /* int gethostent_r( struct hostent *ret, char *buf, size_t buflen, struct hostent **result, int *h_errnop); Glibc2 also has reentrant versions gethostent_r(), gethostbyaddr_r(), gethostbyname_r() and gethostbyname2_r(). The caller supplies a hostent structure ret which will be filled in on success, and a temporary work buffer buf of size buflen. After the call, result will point to the result on success. In case of an error or if no entry is found result will be NULL. The functions return 0 on success and a nonzero error number on failure. In addition to the errors returned by the nonreentrant versions of these functions, if buf is too small, the functions will return ERANGE, and the call should be retried with a larger buffer. The global variable h_errno is not modified, but the address of a variable in which to store error numbers is passed in h_errnop. */ void printhostent(struct hostent *hp) { char ipbuf[16]; pc_stringfromipv4(hp->h_addr_list[0], ipbuf); printf("alias: %p, len: %d, name: %s, addrlist: %p, addrtype: %d, ip: %s\n", hp->h_aliases, hp->h_length, hp->h_name, hp->h_addr_list, hp->h_addrtype, ipbuf ); } int main(int argc, char** argv) { struct hostent he_buf; struct hostent *he_res; char h_buf[1024]; int ch_errno; int ret; do { ret = gethostent_r(&he_buf, h_buf, sizeof(h_buf), &he_res, &ch_errno); printf("ret: %d, h_errno: %d\n", ret, ch_errno); if(ret != 0) { errno = ret; ret = -1; } if(ret == -1) { perror("gethostent_r"); break; } if(he_res) { printhostent(he_res); } } while (he_res); return 0; }proxychains-ng-4.14/tests/test_getnameinfo.c000066400000000000000000000070671344330035200212630ustar00rootroot00000000000000#include #include #include #include #include #include #define satosin(x) ((struct sockaddr_in *) &(x)) #define SOCKADDR(x) (satosin(x)->sin_addr.s_addr) #define SOCKADDR_2(x) (satosin(x)->sin_addr) #define SOCKPORT(x) (satosin(x)->sin_port) #define SOCKFAMILY(x) (satosin(x)->sin_family) #define ASSERT(X) { if(!(X)) printf("ASSERTION FAILED: %s @%s:%d\n", # X, __FILE__, __LINE__); } #define CLR() { hbuf[0] = 0; sbuf[0] = 0; } int main() { struct sockaddr_in a = {0}, *sa = &a; char hbuf[NI_MAXHOST], sbuf[NI_MAXSERV]; a.sin_port = htons(80); memcpy( &a.sin_addr , (char[]) {127,0,0,1}, 4); int ret; if ((ret = getnameinfo((void*)sa, 0, hbuf, sizeof(hbuf), sbuf, sizeof(sbuf), NI_NUMERICHOST | NI_NUMERICSERV)) == 0) printf("host=%s, serv=%s\n", hbuf, sbuf); else printf("%s\n", gai_strerror(ret)); ASSERT(ret == EAI_FAMILY); CLR(); if ((ret = getnameinfo((void*)sa, sizeof a, hbuf, sizeof(hbuf), sbuf, sizeof(sbuf), NI_NUMERICHOST | NI_NUMERICSERV)) == 0) printf("host=%s, serv=%s\n", hbuf, sbuf); else printf("%s\n", gai_strerror(ret)); ASSERT(ret == EAI_FAMILY); CLR(); SOCKFAMILY(a) = AF_INET; if ((ret = getnameinfo((void*)sa, sizeof a, hbuf, 1, sbuf, sizeof(sbuf), NI_NUMERICHOST | NI_NUMERICSERV)) == 0) printf("host=%s, serv=%s\n", hbuf, sbuf); else printf("%s\n", gai_strerror(ret)); ASSERT(ret == EAI_OVERFLOW); CLR(); if ((ret = getnameinfo((void*)sa, sizeof a, hbuf, 0, sbuf, 1, NI_NUMERICHOST | NI_NUMERICSERV)) == 0) printf("host=%s, serv=%s\n", hbuf, sbuf); else printf("%s\n", gai_strerror(ret)); ASSERT(ret == EAI_OVERFLOW); CLR(); if ((ret = getnameinfo((void*)sa, sizeof(a) - 1, hbuf, 0, sbuf, sizeof(sbuf), NI_NUMERICHOST | NI_NUMERICSERV)) == 0) printf("host=%s, serv=%s\n", hbuf, sbuf); else printf("%s\n", gai_strerror(ret)); ASSERT(ret == EAI_FAMILY); CLR(); if ((ret = getnameinfo((void*)sa, sizeof a, hbuf, 0, sbuf, sizeof(sbuf), NI_NUMERICHOST | NI_NUMERICSERV)) == 0) printf("host=%s, serv=%s\n", hbuf, sbuf); else printf("%s\n", gai_strerror(ret)); ASSERT(ret == 0 && !strcmp("80", sbuf)); CLR(); if ((ret = getnameinfo((void*)sa, sizeof a, hbuf, sizeof hbuf, sbuf, 0, NI_NUMERICHOST | NI_NUMERICSERV)) == 0) printf("host=%s, serv=%s\n", hbuf, sbuf); else printf("%s\n", gai_strerror(ret)); ASSERT(ret == 0 && !strcmp("127.0.0.1",hbuf)); CLR(); if ((ret = getnameinfo((void*)sa, sizeof a, hbuf, sizeof(hbuf), sbuf, sizeof(sbuf), NI_NUMERICHOST | NI_NUMERICSERV)) == 0) printf("host=%s, serv=%s\n", hbuf, sbuf); else printf("%s\n", gai_strerror(ret)); ASSERT(ret == 0 && !strcmp("127.0.0.1",hbuf) && !strcmp("80", sbuf)); CLR(); struct sockaddr_in6 b = {0}, *sb = &b; b.sin6_port = htons(8080); b.sin6_family = AF_INET6; memcpy(&b.sin6_addr,"\0\0\0\0\0\0\0\0\0\0\xff\xff\xc0\xa8\1\2", 16); if ((ret = getnameinfo((void*)sb, sizeof b, hbuf, sizeof(hbuf), sbuf, sizeof(sbuf), NI_NUMERICHOST | NI_NUMERICSERV)) == 0) printf("host=%s, serv=%s\n", hbuf, sbuf); else printf("%s\n", gai_strerror(ret)); ASSERT(ret == 0 && !strcmp("192.168.1.2",hbuf) && !strcmp("8080", sbuf)); CLR(); b.sin6_scope_id = 3; memcpy(&b.sin6_addr,"\0\0\xaa\0\0\0\0\0\0\0\0\xff\xc0\xa8\1\2", 16); if ((ret = getnameinfo((void*)sb, sizeof b, hbuf, sizeof(hbuf), sbuf, sizeof(sbuf), NI_NUMERICHOST | NI_NUMERICSERV | NI_NUMERICSCOPE)) == 0) printf("host=%s, serv=%s\n", hbuf, sbuf); else printf("%s\n", gai_strerror(ret)); ASSERT(ret == 0); return 0; } proxychains-ng-4.14/tests/test_proxy_gethostbyname.c000066400000000000000000000010471344330035200230710ustar00rootroot00000000000000#include "../src/core.h" #include "../src/common.h" #include void printhostent(struct hostent *hp) { char ipbuf[16]; pc_stringfromipv4(hp->h_addr_list[0], ipbuf); printf("alias: %p, len: %d, name: %s, addrlist: %p, addrtype: %d, ip: %s\n", hp->h_aliases, hp->h_length, hp->h_name, hp->h_addr_list, hp->h_addrtype, ipbuf ); } int main(int argc, char**argv) { struct hostent* ret; struct gethostbyname_data data; if(argc == 1) return 1; ret = proxy_gethostbyname(argv[1], &data); if(ret) printhostent(ret); return 0; }proxychains-ng-4.14/tests/test_sendto.c000066400000000000000000000032701344330035200202530ustar00rootroot00000000000000#include #include #include #include #include #include #include #include #ifndef MSG_FASTOPEN # define MSG_FASTOPEN 0x20000000 #endif void error(const char *msg) { perror(msg); exit(1); } int main(int argc, char *argv[]) { if (argc < 4) { printf("Usage: %s host port method(connect or sendto)\n", argv[0]); return 1; } const char *hostname = argv[1]; const int portno = atoi(argv[2]); const char *method = argv[3]; char request[BUFSIZ]; sprintf(request, "GET / HTTP/1.0\r\nHost: %s\r\n\r\n", hostname); int sockfd, n; struct sockaddr_in serv_addr; struct hostent *server; char buffer[BUFSIZ]; sockfd = socket(AF_INET, SOCK_STREAM, 0); if (sockfd < 0) error("ERROR opening socket"); server = gethostbyname(hostname); if (server == NULL) { fprintf(stderr, "%s: no such host\n", hostname); return 1; } memset(&serv_addr, 0, sizeof(serv_addr)); serv_addr.sin_family = AF_INET; memcpy(&serv_addr.sin_addr.s_addr, server->h_addr, server->h_length); serv_addr.sin_port = htons(portno); if (!strcmp(method, "connect")) { if (connect(sockfd, (struct sockaddr *)&serv_addr, sizeof(serv_addr)) < 0) error("connect"); n = send(sockfd, request, strlen(request), 0); } else if (!strcmp(method, "sendto")) { n = sendto(sockfd, request, strlen(request), MSG_FASTOPEN, (struct sockaddr *)&serv_addr, sizeof(serv_addr)); } else { printf("Unknown method %s\n", method); return 1; } if (n < 0) error("send"); memset(buffer, 0, BUFSIZ); n = read(sockfd, buffer, BUFSIZ - 1); if (n < 0) error("ERROR reading from socket"); printf("%s\n", buffer); close(sockfd); return 0; } proxychains-ng-4.14/tests/test_shm.c000066400000000000000000000013341344330035200175450ustar00rootroot00000000000000#include "../src/shm.h" #include #define s(A) (sizeof(A) - 1) #define ss(A) (A), s(A) int main() { char buf4096[4096]; struct stringpool sp; stringpool_init(&sp); char *r; size_t pos = 0; r = stringpool_add(&sp, ss("AAAAA")); assert(r == sp.start); pos += s("AAAAA"); assert(sp.alloced == 4096); assert(sp.used == pos); r = stringpool_add(&sp, buf4096, sizeof(buf4096)); assert(r == sp.start + pos); pos += sizeof(buf4096); assert(sp.alloced == 4096 * 2); assert(sp.used == pos); r = stringpool_add(&sp, buf4096, 4096 - s("AAAAA")); assert(r == sp.start + pos); pos += 4096 - s("AAAAA"); assert(pos == 4096 * 2); assert(sp.alloced == 4096 * 2); assert(sp.used == pos); return 0; }proxychains-ng-4.14/tests/test_v4_in_v6.c000066400000000000000000000022001344330035200204010ustar00rootroot00000000000000#include #include #include #include #include #include static void v4_to_v6(const struct in_addr *v4, struct in6_addr *v6) { memset(v6, 0, sizeof(*v6)); v6->s6_addr[10]=0xff; v6->s6_addr[11]=0xff; memcpy(&v6->s6_addr[12], &v4->s_addr, 4); } int main(void) { struct addrinfo *result; struct addrinfo *res; const struct addrinfo hints = { .ai_family = AF_INET }; int error, sock; /* resolve the domain name into a list of addresses */ error = getaddrinfo("www.example.com", NULL, &hints, &result); if (error != 0) { fprintf(stderr, "error in getaddrinfo: %s\n", gai_strerror(error)); return EXIT_FAILURE; } if((sock=socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) == -1) { perror("socket"); return EXIT_FAILURE; } struct sockaddr_in6 a = { .sin6_family = AF_INET6, .sin6_port = htons(80) }; v4_to_v6(&((struct sockaddr_in *)result->ai_addr)->sin_addr, &a.sin6_addr); freeaddrinfo(result); if((error = connect(sock, (struct sockaddr *)&a, sizeof(a))) == -1) { perror("connect"); return EXIT_FAILURE; } return EXIT_SUCCESS; } proxychains-ng-4.14/tools/000077500000000000000000000000001344330035200155505ustar00rootroot00000000000000proxychains-ng-4.14/tools/install.sh000077500000000000000000000016341344330035200175610ustar00rootroot00000000000000#!/bin/sh # # This is an actually-safe install command which installs the new # file atomically in the new location, rather than overwriting # existing files. # usage() { printf "usage: %s [-D] [-l] [-m mode] src dest\n" "$0" 1>&2 exit 1 } mkdirp= symlink= mode=755 while getopts Dlm: name ; do case "$name" in D) mkdirp=yes ;; l) symlink=yes ;; m) mode=$OPTARG ;; ?) usage ;; esac done shift $(($OPTIND - 1)) test "$#" -eq 2 || usage src=$1 dst=$2 tmp="$dst.tmp.$$" case "$dst" in */) printf "%s: %s ends in /\n", "$0" "$dst" 1>&2 ; exit 1 ;; esac set -C set -e if test "$mkdirp" ; then umask 022 case "$2" in */*) mkdir -p "${dst%/*}" ;; esac fi trap 'rm -f "$tmp"' EXIT INT QUIT TERM HUP umask 077 if test "$symlink" ; then ln -s "$1" "$tmp" else cat < "$1" > "$tmp" chmod "$mode" "$tmp" fi mv -f "$tmp" "$2" test -d "$2" && { rm -f "$2/$tmp" printf "%s: %s is a directory\n" "$0" "$dst" 1>&2 exit 1 } exit 0 proxychains-ng-4.14/tools/version.sh000066400000000000000000000003211344330035200175650ustar00rootroot00000000000000#!/bin/sh if test -d .git ; then if type git >/dev/null 2>&1 ; then git describe --tags --match 'v[0-9]*' 2>/dev/null \ | sed -e 's/^v//' -e 's/-/-git-/' else sed 's/$/-git/' < VERSION fi else cat VERSION fi