redsocks: add new package 939/head
authorJohannes Morgenroth <jm@m-network.de>
Sun, 22 Feb 2015 16:11:33 +0000 (17:11 +0100)
committerJohannes Morgenroth <jm@m-network.de>
Sun, 22 Feb 2015 16:11:33 +0000 (17:11 +0100)
Redsocks is a daemon running on the local system, that will transparently
tunnel any TCP connection via a remote SOCKS4, SOCKS5 or HTTP proxy server. It
uses the system firewall's redirection facility to intercept TCP connections,
thus the redirection is system-wide, with fine-grained control, and does
not depend on LD_PRELOAD libraries.

Signed-off-by: Johannes Morgenroth <jm@m-network.de>
net/redsocks/Makefile [new file with mode: 0644]
net/redsocks/files/redsocks.conf [new file with mode: 0644]
net/redsocks/files/redsocks.init [new file with mode: 0644]
net/redsocks/patches/0001-Fix-bug-in-DNS-resolution-results-were-ignored-since.patch [new file with mode: 0644]
net/redsocks/patches/0002-inet_ntop-red_inet_ntop.patch [new file with mode: 0644]
net/redsocks/patches/0003-Initial-support-for-UDP-TPROXY-redirection.-No-more-.patch [new file with mode: 0644]
net/redsocks/patches/0004-Fix-transposition-of-memset-parameters.patch [new file with mode: 0644]
net/redsocks/patches/0005-Fix-compilation-on-Ubuntu-10.04-LTS-and-hopefully-De.patch [new file with mode: 0644]
net/redsocks/patches/0006-fix_default_config_location.patch [new file with mode: 0644]

diff --git a/net/redsocks/Makefile b/net/redsocks/Makefile
new file mode 100644 (file)
index 0000000..91f0477
--- /dev/null
@@ -0,0 +1,56 @@
+#
+# Copyright (C) 2014 OpenWrt.org
+#
+# This is free software, licensed under the GNU General Public License v2.
+# See /LICENSE for more information.
+#
+
+include $(TOPDIR)/rules.mk
+
+PKG_NAME:=redsocks
+PKG_VERSION:=0.4
+PKG_RELEASE:=1
+
+PKG_BUILD_DIR:=$(BUILD_DIR)/$(PKG_NAME)-release-$(PKG_VERSION)
+PKG_SOURCE:=release-$(PKG_VERSION).tar.gz
+PKG_SOURCE_URL:=https://github.com/darkk/redsocks/archive/
+PKG_MD5SUM:=810102ef06a9ea796f310ae811afc6a8
+PKG_MAINTAINER:=Johannes Morgenroth <jm@m-network.de>
+PKG_LICENSE:=Apache-2.0
+
+include $(INCLUDE_DIR)/package.mk
+
+define Package/redsocks
+  SECTION:=net
+  CATEGORY:=Network
+  DEPENDS:=+libevent2
+  TITLE:=Redirect any TCP connection to a SOCKS or HTTPS proxy server
+endef
+
+define Package/redsocks/conffiles
+/etc/redsocks.conf
+endef
+
+define Package/redsocks/description
+ Redsocks is a daemon running on the local system, that will transparently
+ tunnel any TCP connection via a remote SOCKS4, SOCKS5 or HTTP proxy server. It
+ uses the system firewall's redirection facility to intercept TCP connections,
+ thus the redirection is system-wide, with fine-grained control, and does
+ not depend on LD_PRELOAD libraries.
+ Redsocks supports tunneling TCP connections and UDP packets. It has
+ authentication support for both, SOCKS and HTTP proxies.
+ Also included is a small DNS server returning answers with the "truncated" flag
+ set for any UDP query, forcing the resolver to use TCP.
+endef
+
+define Package/redsocks/install
+       $(INSTALL_DIR) $(1)/usr/sbin/
+       $(INSTALL_BIN) $(PKG_BUILD_DIR)/redsocks $(1)/usr/sbin/
+       $(INSTALL_DIR) $(1)/etc/init.d/
+       $(INSTALL_BIN) files/redsocks.init $(1)/etc/init.d/redsocks
+       $(INSTALL_CONF) files/redsocks.conf $(1)/etc/
+endef
+
+$(eval $(call BuildPackage,redsocks))
diff --git a/net/redsocks/files/redsocks.conf b/net/redsocks/files/redsocks.conf
new file mode 100644 (file)
index 0000000..64307c7
--- /dev/null
@@ -0,0 +1,108 @@
+base {
+       // debug: connection progress & client list on SIGUSR1
+       log_debug = off;
+
+       // info: start and end of client session
+       log_info = on;
+
+       /* possible `log' values are:
+        *   stderr
+        *   "file:/path/to/file"
+        *   syslog:FACILITY  facility is any of "daemon", "local0"..."local7"
+        */
+       // log = stderr;
+       // log = "file:/path/to/file";
+       log = "syslog:local7";
+
+       // detach from console
+       daemon = on;
+
+       /* Change uid, gid and root directory, these options require root
+        * privilegies on startup.
+        * Note, your chroot may requre /etc/localtime if you write log to syslog.
+        * Log is opened before chroot & uid changing.
+        */
+       // user = nobody;
+       // group = nobody;
+       // chroot = "/var/chroot";
+
+       /* possible `redirector' values are:
+        *   iptables   - for Linux
+        *   ipf        - for FreeBSD
+        *   pf         - for OpenBSD
+        *   generic    - some generic redirector that MAY work
+        */
+       redirector = iptables;
+}
+
+redsocks {
+       /* `local_ip' defaults to 127.0.0.1 for security reasons,
+        * use 0.0.0.0 if you want to listen on every interface.
+        * `local_*' are used as port to redirect to.
+        */
+       local_ip = 127.0.0.1;
+       local_port = 12345;
+
+       // listen() queue length. Default value is SOMAXCONN and it should be
+       // good enough for most of us.
+       // listenq = 128; // SOMAXCONN equals 128 on my Linux box.
+
+       // `max_accept_backoff` is a delay to retry `accept()` after accept
+       // failure (e.g. due to lack of file descriptors). It's measured in
+       // milliseconds and maximal value is 65535. `min_accept_backoff` is
+       // used as initial backoff value and as a damper for `accept() after
+       // close()` logic.
+       // min_accept_backoff = 100;
+       // max_accept_backoff = 60000;
+
+       // `ip' and `port' are IP and tcp-port of proxy-server
+       // You can also use hostname instead of IP, only one (random)
+       // address of multihomed host will be used.
+       ip = example.org;
+       port = 1080;
+
+
+       // known types: socks4, socks5, http-connect, http-relay
+       type = socks5;
+
+       // login = "foobar";
+       // password = "baz";
+}
+
+redudp {
+       // `local_ip' should not be 0.0.0.0 as it's also used for outgoing
+       // packets that are sent as replies - and it should be fixed
+       // if we want NAT to work properly.
+       local_ip = 127.0.0.1;
+       local_port = 10053;
+
+       // `ip' and `port' of socks5 proxy server.
+       ip = 10.0.0.1;
+       port = 1080;
+       login = username;
+       password = pazzw0rd;
+
+       // redsocks knows about two options while redirecting UDP packets at
+       // linux: TPROXY and REDIRECT.  TPROXY requires more complex routing
+       // configuration and fresh kernel (>= 2.6.37 according to squid
+       // developers[1]) but has hack-free way to get original destination
+       // address, REDIRECT is easier to configure, but requires `dest_ip` and
+       // `dest_port` to be set, limiting packet redirection to single
+       // destination.
+       // [1] http://wiki.squid-cache.org/Features/Tproxy4
+       dest_ip = 8.8.8.8;
+       dest_port = 53;
+
+       udp_timeout = 30;
+       udp_timeout_stream = 180;
+}
+
+dnstc {
+       // fake and really dumb DNS server that returns "truncated answer" to
+       // every query via UDP, RFC-compliant resolver should repeat same query
+       // via TCP in this case.
+       local_ip = 127.0.0.1;
+       local_port = 5300;
+}
+
+// you can add more `redsocks' and `redudp' sections if you need.
diff --git a/net/redsocks/files/redsocks.init b/net/redsocks/files/redsocks.init
new file mode 100644 (file)
index 0000000..56c9de3
--- /dev/null
@@ -0,0 +1,36 @@
+#!/bin/sh /etc/rc.common
+# Copyright (C) 2007 OpenWrt.org
+
+START=90
+
+# check if configuration exists
+[ -e "/etc/redsocks.conf" ] || exit 0
+
+start() {
+       if [ -e "/var/run/redsocks.pid" ]; then
+               echo "redsocks is already running"
+               exit 0
+       fi
+
+       /bin/echo -n "running redsocks ..."
+       
+       # startup the safety-wrapper for the daemon
+       /usr/sbin/redsocks -p /var/run/redsocks.pid
+       
+       /bin/echo " done"
+}
+
+stop() {
+       if [ ! -e "/var/run/redsocks.pid" ]; then
+               echo "redsocks is not running"
+               exit 0
+       fi
+
+       /bin/echo -n "stopping redsocks ..."
+       
+       # kill the process
+       /bin/kill $(cat /var/run/redsocks.pid)
+       rm /var/run/redsocks.pid
+       
+       echo " done"
+}
diff --git a/net/redsocks/patches/0001-Fix-bug-in-DNS-resolution-results-were-ignored-since.patch b/net/redsocks/patches/0001-Fix-bug-in-DNS-resolution-results-were-ignored-since.patch
new file mode 100644 (file)
index 0000000..595be19
--- /dev/null
@@ -0,0 +1,53 @@
+From 290f19972e9f7b74f818ae211cb535e32f1f314f Mon Sep 17 00:00:00 2001
+From: Leonid Evdokimov <leon@darkk.net.ru>
+Date: Tue, 10 Apr 2012 00:57:26 +0400
+Subject: [PATCH 01/12] Fix bug in DNS resolution - results were ignored (since
+ 8179a1ff).
+
+---
+ parser.c | 10 +++++-----
+ 1 file changed, 5 insertions(+), 5 deletions(-)
+
+diff --git a/parser.c b/parser.c
+index 85d3533..6198828 100644
+--- a/parser.c
++++ b/parser.c
+@@ -295,22 +295,22 @@ static int vp_in_addr(parser_context *context, void *addr, const char *token)
+               memcpy(addr, &ia, sizeof(ia));
+       }
+       else {
+-              struct addrinfo *addr, hints;
++              struct addrinfo *ainfo, hints;
+               int err;
+               memset(&hints, 0, sizeof(hints));
+               hints.ai_family = AF_INET; /* IPv4-only */
+               hints.ai_socktype = SOCK_STREAM; /* I want to have one address once and ONLY once, that's why I specify socktype and protocol */
+               hints.ai_protocol = IPPROTO_TCP;
+               hints.ai_flags = AI_ADDRCONFIG; /* I don't need IPv4 addrs without IPv4 connectivity */
+-              err = getaddrinfo(token, NULL, &hints, &addr);
++              err = getaddrinfo(token, NULL, &hints, &ainfo);
+               if (err == 0) {
+                       int count, taken;
+                       struct addrinfo *iter;
+                       struct sockaddr_in *resolved_addr;
+-                      for (iter = addr, count = 0; iter; iter = iter->ai_next, ++count)
++                      for (iter = ainfo, count = 0; iter; iter = iter->ai_next, ++count)
+                               ;
+                       taken = rand() % count;
+-                      for (iter = addr; taken > 0; iter = iter->ai_next, --taken)
++                      for (iter = ainfo; taken > 0; iter = iter->ai_next, --taken)
+                               ;
+                       resolved_addr = (struct sockaddr_in*)iter->ai_addr;
+                       assert(resolved_addr->sin_family == iter->ai_family && iter->ai_family == AF_INET);
+@@ -318,7 +318,7 @@ static int vp_in_addr(parser_context *context, void *addr, const char *token)
+                               log_error(LOG_WARNING, "%s resolves to %d addresses, using %s",
+                                         token, count, inet_ntoa(resolved_addr->sin_addr));
+                       memcpy(addr, &resolved_addr->sin_addr, sizeof(ia));
+-                      freeaddrinfo(addr);
++                      freeaddrinfo(ainfo);
+               }
+               else {
+                       if (err == EAI_SYSTEM)
+-- 
+1.9.1
+
diff --git a/net/redsocks/patches/0002-inet_ntop-red_inet_ntop.patch b/net/redsocks/patches/0002-inet_ntop-red_inet_ntop.patch
new file mode 100644 (file)
index 0000000..058556e
--- /dev/null
@@ -0,0 +1,161 @@
+From 6015b3a6f26e04dd5d78cd6c1320886fc9035612 Mon Sep 17 00:00:00 2001
+From: Leonid Evdokimov <leon@darkk.net.ru>
+Date: Tue, 10 Apr 2012 01:37:34 +0400
+Subject: [PATCH 02/12] inet_ntop -> red_inet_ntop
+
+---
+ redsocks.c | 13 ++++---------
+ redudp.c   | 19 +++++++++++--------
+ utils.c    | 37 +++++++++++++++++++++++++++++++++----
+ utils.h    |  7 +++++++
+ 4 files changed, 55 insertions(+), 21 deletions(-)
+
+diff --git a/redsocks.c b/redsocks.c
+index d085e10..ba5eab2 100644
+--- a/redsocks.c
++++ b/redsocks.c
+@@ -207,22 +207,17 @@ void redsocks_log_write_plain(
+       int saved_errno = errno;
+       struct evbuffer *fmt = evbuffer_new();
+       va_list ap;
+-      char clientaddr_str[INET6_ADDRSTRLEN], destaddr_str[INET6_ADDRSTRLEN];
++      char clientaddr_str[RED_INET_ADDRSTRLEN], destaddr_str[RED_INET_ADDRSTRLEN];
+       if (!fmt) {
+               log_errno(LOG_ERR, "evbuffer_new()");
+               // no return, as I have to call va_start/va_end
+       }
+-      if (!inet_ntop(clientaddr->sin_family, &clientaddr->sin_addr, clientaddr_str, sizeof(clientaddr_str)))
+-              strncpy(clientaddr_str, "???", sizeof(clientaddr_str));
+-      if (!inet_ntop(destaddr->sin_family, &destaddr->sin_addr, destaddr_str, sizeof(destaddr_str)))
+-              strncpy(destaddr_str, "???", sizeof(destaddr_str));
+-
+       if (fmt) {
+-              evbuffer_add_printf(fmt, "[%s:%i->%s:%i]: %s",
+-                              clientaddr_str, ntohs(clientaddr->sin_port),
+-                              destaddr_str, ntohs(destaddr->sin_port),
++              evbuffer_add_printf(fmt, "[%s->%s]: %s",
++                              red_inet_ntop(clientaddr, clientaddr_str, sizeof(clientaddr_str)),
++                              red_inet_ntop(destaddr, destaddr_str, sizeof(destaddr_str)),
+                               orig_fmt);
+       }
+diff --git a/redudp.c b/redudp.c
+index 0a97852..9516a50 100644
+--- a/redudp.c
++++ b/redudp.c
+@@ -436,10 +436,9 @@ static void redudp_pkt_from_socks(int fd, short what, void *_arg)
+               return;
+       if (memcmp(&udprelayaddr, &client->udprelayaddr, sizeof(udprelayaddr)) != 0) {
+-              char buf[INET6_ADDRSTRLEN];
+-              const char *addr = inet_ntop(udprelayaddr.sin_family, &udprelayaddr.sin_addr, buf, sizeof(buf));
+-              redudp_log_error(client, LOG_NOTICE, "Got packet from unexpected address %s:%u.",
+-                               addr ? addr : "?", ntohs(udprelayaddr.sin_port));
++              char buf[RED_INET_ADDRSTRLEN];
++              redudp_log_error(client, LOG_NOTICE, "Got packet from unexpected address %s.",
++                               red_inet_ntop(&udprelayaddr, buf, sizeof(buf)));
+               return;
+       }
+@@ -459,10 +458,14 @@ static void redudp_pkt_from_socks(int fd, short what, void *_arg)
+       if (pkt.header.ip.port != client->instance->config.destaddr.sin_port ||
+           pkt.header.ip.addr != client->instance->config.destaddr.sin_addr.s_addr)
+       {
+-              char buf[INET6_ADDRSTRLEN];
+-              const char *addr = inet_ntop(AF_INET, &pkt.header.ip.addr, buf, sizeof(buf));
+-              redudp_log_error(client, LOG_NOTICE, "Socks5 server relayed packet from unexpected address %s:%u.",
+-                               addr ? addr : "?", ntohs(pkt.header.ip.port));
++              char buf[RED_INET_ADDRSTRLEN];
++              struct sockaddr_in pktaddr = {
++                      .sin_family = AF_INET,
++                      .sin_addr   = { pkt.header.ip.addr },
++                      .sin_port   = pkt.header.ip.port,
++              };
++              redudp_log_error(client, LOG_NOTICE, "Socks5 server relayed packet from unexpected address %s.",
++                               red_inet_ntop(&pktaddr, buf, sizeof(buf)));
+               return;
+       }
+diff --git a/utils.c b/utils.c
+index c6ced51..6e1f3af 100644
+--- a/utils.c
++++ b/utils.c
+@@ -18,6 +18,7 @@
+ #include <errno.h>
+ #include <assert.h>
+ #include <fcntl.h>
++#include <string.h>
+ #include <sys/socket.h>
+ #include <netinet/in.h>
+ #include <arpa/inet.h>
+@@ -42,10 +43,9 @@ int red_recv_udp_pkt(int fd, char *buf, size_t buflen, struct sockaddr_in *inadd
+       }
+       if (pktlen >= buflen) {
+-              char buf[INET6_ADDRSTRLEN];
+-              const char *addr = inet_ntop(inaddr->sin_family, &inaddr->sin_addr, buf, sizeof(buf));
+-              log_error(LOG_WARNING, "wow! Truncated udp packet of size %zd from %s:%u! impossible! dropping it...",
+-                        pktlen, addr ? addr : "?", ntohs(inaddr->sin_port));
++              char buf[RED_INET_ADDRSTRLEN];
++              log_error(LOG_WARNING, "wow! Truncated udp packet of size %zd from %s! impossible! dropping it...",
++                        pktlen, red_inet_ntop(inaddr, buf, sizeof(buf)));
+               return -1;
+       }
+@@ -176,4 +176,33 @@ int red_is_socket_connected_ok(struct bufferevent *buffev)
+       }
+ }
++char *red_inet_ntop(const struct sockaddr_in* sa, char* buffer, size_t buffer_size)
++{
++      const char *retval = 0;
++      size_t len = 0;
++      uint16_t port;
++      const char placeholder[] = "???:???";
++
++      assert(buffer_size >= sizeof(placeholder));
++
++      memset(buffer, buffer_size, 0);
++      if (sa->sin_family == AF_INET) {
++              retval = inet_ntop(AF_INET, &sa->sin_addr, buffer, buffer_size);
++              port = ((struct sockaddr_in*)sa)->sin_port;
++      }
++      else if (sa->sin_family == AF_INET6) {
++              retval = inet_ntop(AF_INET6, &((const struct sockaddr_in6*)sa)->sin6_addr, buffer, buffer_size);
++              port = ((struct sockaddr_in6*)sa)->sin6_port;
++      }
++      if (retval) {
++              assert(retval == buffer);
++              len = strlen(retval);
++              snprintf(buffer + len, buffer_size - len, ":%d", ntohs(port));
++      }
++      else {
++              strcpy(buffer, placeholder);
++      }
++      return buffer;
++}
++
+ /* vim:set tabstop=4 softtabstop=4 shiftwidth=4: */
+diff --git a/utils.h b/utils.h
+index f691b77..d3af00f 100644
+--- a/utils.h
++++ b/utils.h
+@@ -57,6 +57,13 @@ int fcntl_nonblock(int fd);
+                               (what) & EVBUFFER_TIMEOUT ? "EVBUFFER_TIMEOUT" : "0", \
+                               (what) & ~(EVBUFFER_READ|EVBUFFER_WRITE|EVBUFFER_EOF|EVBUFFER_ERROR|EVBUFFER_TIMEOUT)
++#if INET6_ADDRSTRLEN < INET_ADDRSTRLEN
++#     error Impossible happens: INET6_ADDRSTRLEN < INET_ADDRSTRLEN
++#else
++#     define RED_INET_ADDRSTRLEN (INET6_ADDRSTRLEN + 1 + 5 + 1) // addr + : + port + \0
++#endif
++char *red_inet_ntop(const struct sockaddr_in* sa, char* buffer, size_t buffer_size);
++
+ /* vim:set tabstop=4 softtabstop=4 shiftwidth=4: */
+ /* vim:set foldmethod=marker foldlevel=32 foldmarker={,}: */
+ #endif /* UTILS_H_SAT_FEB__2_02_24_05_2008 */
+-- 
+1.9.1
+
diff --git a/net/redsocks/patches/0003-Initial-support-for-UDP-TPROXY-redirection.-No-more-.patch b/net/redsocks/patches/0003-Initial-support-for-UDP-TPROXY-redirection.-No-more-.patch
new file mode 100644 (file)
index 0000000..b89f4be
--- /dev/null
@@ -0,0 +1,449 @@
+From 709646d59d96cb73a7e70347f37de9823e4e5f14 Mon Sep 17 00:00:00 2001
+From: Leonid Evdokimov <leon@darkk.net.ru>
+Date: Fri, 13 Apr 2012 01:57:23 +0400
+Subject: [PATCH 03/12] Initial support for UDP + TPROXY redirection. No more
+ dest_ip in redudp.
+
+ * TPROXY requires Linux 2.6.29+ (see man 7 ip[1]).
+ * all redsocks code is running as root to bind to arbitrary port.
+ * Non-Linux and old-Linux builds are broken at the moment.
+
+[1] http://www.kernel.org/doc/man-pages/online/pages/man7/ip.7.html
+---
+ dnstc.c  |   2 +-
+ redudp.c | 197 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++-----
+ redudp.h |   2 +
+ utils.c  |  43 +++++++++++++-
+ utils.h  |   2 +-
+ 5 files changed, 227 insertions(+), 19 deletions(-)
+
+diff --git a/dnstc.c b/dnstc.c
+index 43881d8..5f9fedd 100644
+--- a/dnstc.c
++++ b/dnstc.c
+@@ -68,7 +68,7 @@ static void dnstc_pkt_from_client(int fd, short what, void *_arg)
+       ssize_t pktlen, outgoing;
+       assert(fd == EVENT_FD(&self->listener));
+-      pktlen = red_recv_udp_pkt(fd, buf.raw, sizeof(buf), &clientaddr);
++      pktlen = red_recv_udp_pkt(fd, buf.raw, sizeof(buf), &clientaddr, NULL);
+       if (pktlen == -1)
+               return;
+diff --git a/redudp.c b/redudp.c
+index 9516a50..262af3e 100644
+--- a/redudp.c
++++ b/redudp.c
+@@ -15,6 +15,7 @@
+  */
+ #include <stdlib.h>
++#include <search.h>
+ #include <string.h>
+ #include <sys/types.h>
+ #include <sys/uio.h>
+@@ -33,30 +34,157 @@
+ #include "redudp.h"
+ #define redudp_log_error(client, prio, msg...) \
+-      redsocks_log_write_plain(__FILE__, __LINE__, __func__, 0, &(client)->clientaddr, &(client)->instance->config.destaddr, prio, ## msg)
++      redsocks_log_write_plain(__FILE__, __LINE__, __func__, 0, &(client)->clientaddr, get_destaddr(client), prio, ## msg)
+ #define redudp_log_errno(client, prio, msg...) \
+-      redsocks_log_write_plain(__FILE__, __LINE__, __func__, 1, &(client)->clientaddr, &(client)->instance->config.destaddr, prio, ## msg)
++      redsocks_log_write_plain(__FILE__, __LINE__, __func__, 1, &(client)->clientaddr, get_destaddr(client), prio, ## msg)
+ static void redudp_pkt_from_socks(int fd, short what, void *_arg);
+ static void redudp_drop_client(redudp_client *client);
+ static void redudp_fini_instance(redudp_instance *instance);
+ static int redudp_fini();
++static int redudp_transparent(int fd);
+ typedef struct redudp_expected_assoc_reply_t {
+       socks5_reply h;
+       socks5_addr_ipv4 ip;
+ } PACKED redudp_expected_assoc_reply;
++struct bound_udp4_key {
++      struct in_addr sin_addr;
++      uint16_t       sin_port;
++};
++
++struct bound_udp4 {
++      struct bound_udp4_key key;
++      int ref;
++      int fd;
++};
++
+ /***********************************************************************
+  * Helpers
+  */
++// TODO: separate binding to privileged process (this operation requires uid-0)
++static void* root_bound_udp4 = NULL; // to avoid two binds to same IP:port
++
++static int bound_udp4_cmp(const void *a, const void *b)
++{
++      return memcmp(a, b, sizeof(struct bound_udp4_key));
++}
++
++static void bound_udp4_mkkey(struct bound_udp4_key *key, const struct sockaddr_in *addr)
++{
++      memset(key, 0, sizeof(*key));
++      key->sin_addr = addr->sin_addr;
++      key->sin_port = addr->sin_port;
++}
++
++static int bound_udp4_get(const struct sockaddr_in *addr)
++{
++      struct bound_udp4_key key;
++      struct bound_udp4 *node, **pnode;
++
++      bound_udp4_mkkey(&key, addr);
++      // I assume, that memory allocation for lookup is awful, so I use
++      // tfind/tsearch pair instead of tsearch/check-result.
++      pnode = tfind(&key, &root_bound_udp4, bound_udp4_cmp);
++      if (pnode) {
++              assert((*pnode)->ref > 0);
++              (*pnode)->ref++;
++              return (*pnode)->fd;
++      }
++
++      node = calloc(1, sizeof(*node));
++      if (!node) {
++              log_errno(LOG_ERR, "calloc");
++              goto fail;
++      }
++
++      node->key = key;
++      node->ref = 1;
++      node->fd = socket(AF_INET, SOCK_DGRAM, 0);
++      if (node->fd == -1) {
++              log_errno(LOG_ERR, "socket");
++              goto fail;
++      }
++
++      if (0 != redudp_transparent(node->fd))
++              goto fail;
++
++      if (0 != bind(node->fd, (struct sockaddr*)addr, sizeof(*addr))) {
++              log_errno(LOG_ERR, "bind");
++              goto fail;
++      }
++
++      pnode = tsearch(node, &root_bound_udp4, bound_udp4_cmp);
++      if (!pnode) {
++              log_errno(LOG_ERR, "tsearch(%p) == %p", node, pnode);
++              goto fail;
++      }
++      assert(node == *pnode);
++
++      return node->fd;
++
++fail:
++      if (node) {
++              if (node->fd != -1)
++                      redsocks_close(node->fd);
++              free(node);
++      }
++      return -1;
++}
++
++static void bound_udp4_put(const struct sockaddr_in *addr)
++{
++      struct bound_udp4_key key;
++      struct bound_udp4 **pnode, *node;
++      void *parent;
++
++      bound_udp4_mkkey(&key, addr);
++      pnode = tfind(&key, &root_bound_udp4, bound_udp4_cmp);
++      assert(pnode && (*pnode)->ref > 0);
++
++      node = *pnode;
++
++      node->ref--;
++      if (node->ref)
++              return;
++
++      parent = tdelete(node, &root_bound_udp4, bound_udp4_cmp);
++      assert(parent);
++
++      redsocks_close(node->fd); // expanding `pnode` to avoid use after free
++      free(node);
++}
++
++static int redudp_transparent(int fd)
++{
++      int on = 1;
++      int error = setsockopt(fd, SOL_IP, IP_TRANSPARENT, &on, sizeof(on));
++      if (error)
++              log_errno(LOG_ERR, "setsockopt(..., SOL_IP, IP_TRANSPARENT)");
++      return error;
++}
++
++static int do_tproxy(redudp_instance* instance)
++{
++      return instance->config.destaddr.sin_addr.s_addr == 0;
++}
++
++static struct sockaddr_in* get_destaddr(redudp_client *client)
++{
++      if (do_tproxy(client->instance))
++              return &client->destaddr;
++      else
++              return &client->instance->config.destaddr;
++}
++
+ static void redudp_fill_preamble(socks5_udp_preabmle *preamble, redudp_client *client)
+ {
+       preamble->reserved = 0;
+       preamble->frag_no = 0; /* fragmentation is not supported */
+       preamble->addrtype = socks5_addrtype_ipv4;
+-      preamble->ip.addr = client->instance->config.destaddr.sin_addr.s_addr;
+-      preamble->ip.port = client->instance->config.destaddr.sin_port;
++      preamble->ip.addr = get_destaddr(client)->sin_addr.s_addr;
++      preamble->ip.port = get_destaddr(client)->sin_port;
+ }
+ static struct evbuffer* socks5_mkmethods_plain_wrapper(void *p)
+@@ -104,6 +232,8 @@ static void redudp_drop_client(redudp_client *client)
+                       redudp_log_errno(client, LOG_ERR, "event_del");
+               redsocks_close(fd);
+       }
++      if (client->sender_fd != -1)
++              bound_udp4_put(&client->destaddr);
+       list_for_each_entry_safe(q, tmp, &client->queue, list) {
+               list_del(&q->list);
+               free(q);
+@@ -344,7 +474,8 @@ static void redudp_relay_connected(struct bufferevent *buffev, void *_arg)
+       redudp_client *client = _arg;
+       int do_password = socks5_is_valid_cred(client->instance->config.login, client->instance->config.password);
+       int error;
+-      redudp_log_error(client, LOG_DEBUG, "<trace>");
++      char relayaddr_str[RED_INET_ADDRSTRLEN];
++      redudp_log_error(client, LOG_DEBUG, "via %s", red_inet_ntop(&client->instance->config.relayaddr, relayaddr_str, sizeof(relayaddr_str)));
+       if (!red_is_socket_connected_ok(buffev)) {
+               redudp_log_errno(client, LOG_NOTICE, "red_is_socket_connected_ok");
+@@ -382,7 +513,7 @@ static void redudp_timeout(int fd, short what, void *_arg)
+       redudp_drop_client(client);
+ }
+-static void redudp_first_pkt_from_client(redudp_instance *self, struct sockaddr_in *clientaddr, char *buf, size_t pktlen)
++static void redudp_first_pkt_from_client(redudp_instance *self, struct sockaddr_in *clientaddr, struct sockaddr_in *destaddr, char *buf, size_t pktlen)
+ {
+       redudp_client *client = calloc(1, sizeof(*client));
+@@ -395,9 +526,13 @@ static void redudp_first_pkt_from_client(redudp_instance *self, struct sockaddr_
+       INIT_LIST_HEAD(&client->queue);
+       client->instance = self;
+       memcpy(&client->clientaddr, clientaddr, sizeof(*clientaddr));
++      if (destaddr)
++              memcpy(&client->destaddr, destaddr, sizeof(client->destaddr));
+       evtimer_set(&client->timeout, redudp_timeout, client);
+       // XXX: self->relay_ss->init(client);
++      client->sender_fd = -1; // it's postponed until socks-server replies to avoid trivial DoS
++
+       client->relay = red_connect_relay(&client->instance->config.relayaddr,
+                                         redudp_relay_connected, redudp_relay_error, client);
+       if (!client->relay)
+@@ -431,7 +566,7 @@ static void redudp_pkt_from_socks(int fd, short what, void *_arg)
+       assert(fd == EVENT_FD(&client->udprelay));
+-      pktlen = red_recv_udp_pkt(fd, pkt.buf, sizeof(pkt.buf), &udprelayaddr);
++      pktlen = red_recv_udp_pkt(fd, pkt.buf, sizeof(pkt.buf), &udprelayaddr, NULL);
+       if (pktlen == -1)
+               return;
+@@ -455,8 +590,8 @@ static void redudp_pkt_from_socks(int fd, short what, void *_arg)
+               return;
+       }
+-      if (pkt.header.ip.port != client->instance->config.destaddr.sin_port ||
+-          pkt.header.ip.addr != client->instance->config.destaddr.sin_addr.s_addr)
++      if (pkt.header.ip.port != get_destaddr(client)->sin_port ||
++          pkt.header.ip.addr != get_destaddr(client)->sin_addr.s_addr)
+       {
+               char buf[RED_INET_ADDRSTRLEN];
+               struct sockaddr_in pktaddr = {
+@@ -472,8 +607,18 @@ static void redudp_pkt_from_socks(int fd, short what, void *_arg)
+       redsocks_time(&client->last_relay_event);
+       redudp_bump_timeout(client);
++      if (do_tproxy(client->instance) && client->sender_fd == -1) {
++              client->sender_fd = bound_udp4_get(&client->destaddr);
++              if (client->sender_fd == -1) {
++                      redudp_log_error(client, LOG_WARNING, "bound_udp4_get failure");
++                      return;
++              }
++      }
++
+       fwdlen = pktlen - sizeof(pkt.header);
+-      outgoing = sendto(EVENT_FD(&client->instance->listener),
++      outgoing = sendto(do_tproxy(client->instance)
++                            ? client->sender_fd
++                            : EVENT_FD(&client->instance->listener),
+                         pkt.buf + sizeof(pkt.header), fwdlen, 0,
+                         (struct sockaddr*)&client->clientaddr, sizeof(client->clientaddr));
+       if (outgoing != fwdlen) {
+@@ -486,18 +631,21 @@ static void redudp_pkt_from_socks(int fd, short what, void *_arg)
+ static void redudp_pkt_from_client(int fd, short what, void *_arg)
+ {
+       redudp_instance *self = _arg;
+-      struct sockaddr_in clientaddr;
++      struct sockaddr_in clientaddr, destaddr, *pdestaddr;
+       char buf[0xFFFF]; // UDP packet can't be larger then that
+       ssize_t pktlen;
+       redudp_client *tmp, *client = NULL;
++      pdestaddr = do_tproxy(self) ? &destaddr : NULL;
++
+       assert(fd == EVENT_FD(&self->listener));
+-      pktlen = red_recv_udp_pkt(fd, buf, sizeof(buf), &clientaddr);
++      pktlen = red_recv_udp_pkt(fd, buf, sizeof(buf), &clientaddr, pdestaddr);
+       if (pktlen == -1)
+               return;
+       // TODO: this lookup may be SLOOOOOW.
+       list_for_each_entry(tmp, &self->clients, list) {
++              // TODO: check destaddr
+               if (0 == memcmp(&clientaddr, &tmp->clientaddr, sizeof(clientaddr))) {
+                       client = tmp;
+                       break;
+@@ -515,7 +663,7 @@ static void redudp_pkt_from_client(int fd, short what, void *_arg)
+               }
+       }
+       else {
+-              redudp_first_pkt_from_client(self, &clientaddr, buf, pktlen);
++              redudp_first_pkt_from_client(self, &clientaddr, pdestaddr, buf, pktlen);
+       }
+ }
+@@ -554,7 +702,6 @@ static int redudp_onenter(parser_section *section)
+       instance->config.relayaddr.sin_family = AF_INET;
+       instance->config.relayaddr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
+       instance->config.destaddr.sin_family = AF_INET;
+-      instance->config.destaddr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
+       instance->config.max_pktqueue = 5;
+       instance->config.udp_timeout = 30;
+       instance->config.udp_timeout_stream = 180;
+@@ -614,6 +761,28 @@ static int redudp_init_instance(redudp_instance *instance)
+               goto fail;
+       }
++      if (do_tproxy(instance)) {
++              int on = 1;
++              char buf[RED_INET_ADDRSTRLEN];
++              // iptables TPROXY target does not send packets to non-transparent sockets
++              if (0 != redudp_transparent(fd))
++                      goto fail;
++
++              error = setsockopt(fd, SOL_IP, IP_RECVORIGDSTADDR, &on, sizeof(on));
++              if (error) {
++                      log_errno(LOG_ERR, "setsockopt(listener, SOL_IP, IP_RECVORIGDSTADDR)");
++                      goto fail;
++              }
++
++              log_error(LOG_DEBUG, "redudp @ %s: TPROXY", red_inet_ntop(&instance->config.bindaddr, buf, sizeof(buf)));
++      }
++      else {
++              char buf1[RED_INET_ADDRSTRLEN], buf2[RED_INET_ADDRSTRLEN];
++              log_error(LOG_DEBUG, "redudp @ %s: destaddr=%s",
++                      red_inet_ntop(&instance->config.bindaddr, buf1, sizeof(buf1)),
++                      red_inet_ntop(&instance->config.destaddr, buf2, sizeof(buf2)));
++      }
++
+       error = bind(fd, (struct sockaddr*)&instance->config.bindaddr, sizeof(instance->config.bindaddr));
+       if (error) {
+               log_errno(LOG_ERR, "bind");
+diff --git a/redudp.h b/redudp.h
+index 308bd33..3f1d9d1 100644
+--- a/redudp.h
++++ b/redudp.h
+@@ -24,6 +24,8 @@ typedef struct redudp_client_t {
+       list_head           list;
+       redudp_instance    *instance;
+       struct sockaddr_in  clientaddr;
++      struct sockaddr_in  destaddr;
++      int                 sender_fd; // shared between several clients socket (bound to `destaddr`)
+       struct event        timeout;
+       struct bufferevent *relay;
+       struct event        udprelay;
+diff --git a/utils.c b/utils.c
+index 6e1f3af..afdeea8 100644
+--- a/utils.c
++++ b/utils.c
+@@ -26,17 +26,54 @@
+ #include "utils.h"
+ #include "redsocks.h" // for redsocks_close
+-int red_recv_udp_pkt(int fd, char *buf, size_t buflen, struct sockaddr_in *inaddr)
++int red_recv_udp_pkt(int fd, char *buf, size_t buflen, struct sockaddr_in *inaddr, struct sockaddr_in *toaddr)
+ {
+       socklen_t addrlen = sizeof(*inaddr);
+       ssize_t pktlen;
+-
+-      pktlen = recvfrom(fd, buf, buflen, 0, (struct sockaddr*)inaddr, &addrlen);
++      struct msghdr msg;
++      struct iovec io;
++      char control[1024];
++
++      memset(&msg, 0, sizeof(msg));
++      msg.msg_name = inaddr;
++      msg.msg_namelen = sizeof(*inaddr);
++      msg.msg_iov = &io;
++      msg.msg_iovlen = 1;
++      msg.msg_control = control;
++      msg.msg_controllen = sizeof(control);
++      io.iov_base = buf;
++      io.iov_len = buflen;
++
++      pktlen = recvmsg(fd, &msg, 0);
+       if (pktlen == -1) {
+               log_errno(LOG_WARNING, "recvfrom");
+               return -1;
+       }
++      if (toaddr) {
++              memset(toaddr, 0, sizeof(*toaddr));
++              for (struct cmsghdr* cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) {
++                      if (
++                              cmsg->cmsg_level == SOL_IP &&
++                              cmsg->cmsg_type == IP_ORIGDSTADDR &&
++                              cmsg->cmsg_len >= CMSG_LEN(sizeof(*toaddr))
++                      ) {
++                              struct sockaddr_in* cmsgaddr = (struct sockaddr_in*)CMSG_DATA(cmsg);
++                              char buf[RED_INET_ADDRSTRLEN];
++                              log_error(LOG_DEBUG, "IP_ORIGDSTADDR: %s", red_inet_ntop(cmsgaddr, buf, sizeof(buf)));
++                              memcpy(toaddr, cmsgaddr, sizeof(*toaddr));
++                      }
++                      else {
++                              log_error(LOG_WARNING, "unexepcted cmsg (level,type) = (%d,%d)",
++                                      cmsg->cmsg_level, cmsg->cmsg_type);
++                      }
++              }
++              if (toaddr->sin_family != AF_INET) {
++                      log_error(LOG_WARNING, "(SOL_IP, IP_ORIGDSTADDR) not found");
++                      return -1;
++              }
++      }
++
+       if (addrlen != sizeof(*inaddr)) {
+               log_error(LOG_WARNING, "unexpected address length %u instead of %zu", addrlen, sizeof(*inaddr));
+               return -1;
+diff --git a/utils.h b/utils.h
+index d3af00f..c2277e9 100644
+--- a/utils.h
++++ b/utils.h
+@@ -44,7 +44,7 @@ char *redsocks_evbuffer_readline(struct evbuffer *buf);
+ struct bufferevent* red_connect_relay(struct sockaddr_in *addr, evbuffercb writecb, everrorcb errorcb, void *cbarg);
+ int red_socket_geterrno(struct bufferevent *buffev);
+ int red_is_socket_connected_ok(struct bufferevent *buffev);
+-int red_recv_udp_pkt(int fd, char *buf, size_t buflen, struct sockaddr_in *inaddr);
++int red_recv_udp_pkt(int fd, char *buf, size_t buflen, struct sockaddr_in *fromaddr, struct sockaddr_in *toaddr);
+ int fcntl_nonblock(int fd);
+-- 
+1.9.1
+
diff --git a/net/redsocks/patches/0004-Fix-transposition-of-memset-parameters.patch b/net/redsocks/patches/0004-Fix-transposition-of-memset-parameters.patch
new file mode 100644 (file)
index 0000000..cb6fa1e
--- /dev/null
@@ -0,0 +1,25 @@
+From b60b492602448b59aea194afd4991910d3613e5c Mon Sep 17 00:00:00 2001
+From: Cody Schafer <jmesmon@gmail.com>
+Date: Tue, 24 Apr 2012 04:33:13 -0500
+Subject: [PATCH 04/12] Fix transposition of memset parameters.
+
+---
+ utils.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/utils.c b/utils.c
+index afdeea8..31c6894 100644
+--- a/utils.c
++++ b/utils.c
+@@ -222,7 +222,7 @@ char *red_inet_ntop(const struct sockaddr_in* sa, char* buffer, size_t buffer_si
+       assert(buffer_size >= sizeof(placeholder));
+-      memset(buffer, buffer_size, 0);
++      memset(buffer, 0, buffer_size);
+       if (sa->sin_family == AF_INET) {
+               retval = inet_ntop(AF_INET, &sa->sin_addr, buffer, buffer_size);
+               port = ((struct sockaddr_in*)sa)->sin_port;
+-- 
+1.9.1
+
diff --git a/net/redsocks/patches/0005-Fix-compilation-on-Ubuntu-10.04-LTS-and-hopefully-De.patch b/net/redsocks/patches/0005-Fix-compilation-on-Ubuntu-10.04-LTS-and-hopefully-De.patch
new file mode 100644 (file)
index 0000000..f0f09aa
--- /dev/null
@@ -0,0 +1,105 @@
+From 18e2b5ed1ffb3e7c5dfec8ff41b3027163f680ed Mon Sep 17 00:00:00 2001
+From: Leonid Evdokimov <leon@darkk.net.ru>
+Date: Wed, 12 Sep 2012 02:05:39 +0400
+Subject: [PATCH 09/12] Fix compilation on Ubuntu 10.04 LTS and (hopefully)
+ Debian squeeze[1]
+
+fixes #28, fixes #22, fixes #24
+[1] current "stable" release
+---
+ libc-compat.h     | 25 +++++++++++++++++++++++++
+ libevent-compat.h | 11 +++++++++++
+ redsocks.c        |  1 +
+ redudp.c          |  1 +
+ utils.c           |  1 +
+ 5 files changed, 39 insertions(+)
+ create mode 100644 libc-compat.h
+ create mode 100644 libevent-compat.h
+
+diff --git a/libc-compat.h b/libc-compat.h
+new file mode 100644
+index 0000000..adcf63b
+--- /dev/null
++++ b/libc-compat.h
+@@ -0,0 +1,25 @@
++#ifndef UUID_67C91670_FCCB_4855_BDF7_609F1EECB8B4
++#define UUID_67C91670_FCCB_4855_BDF7_609F1EECB8B4
++
++/* all these definitions, are included into bits/in.h from libc6-dev 2.15-0ubuntu10
++ * from Ubuntu 12.04 and is not included into libc6-dev 2.11.1-0ubuntu7.10 from
++ * Ubuntu 10.04.
++ * linux/in.h is not included directly because of lots of redefinitions,
++ * extracting single value from linux/in.h is not done because it looks like
++ * autotools reinvention */
++#ifndef IP_ORIGDSTADDR
++#   warning Using hardcoded value for IP_ORIGDSTADDR as libc headers do not define it.
++#   define IP_ORIGDSTADDR 20
++#endif
++
++#ifndef IP_RECVORIGDSTADDR
++#   warning Using hardcoded value for IP_RECVORIGDSTADDR as libc headers do not define it.
++#   define IP_RECVORIGDSTADDR IP_ORIGDSTADDR
++#endif
++
++#ifndef IP_TRANSPARENT
++#   warning Using hardcoded value for IP_TRANSPARENT as libc headers do not define it.
++#   define IP_TRANSPARENT 19
++#endif
++
++#endif // 67C91670_FCCB_4855_BDF7_609F1EECB8B4
+diff --git a/libevent-compat.h b/libevent-compat.h
+new file mode 100644
+index 0000000..a7f1ca1
+--- /dev/null
++++ b/libevent-compat.h
+@@ -0,0 +1,11 @@
++#ifndef UUID_FC148CFA_5ECC_488E_8A62_CD39406C9F1E
++#define UUID_FC148CFA_5ECC_488E_8A62_CD39406C9F1E
++
++/* evutil_socket_t is macros in libevent-2.0, not typedef, libevent-1.4 is
++ * still supported because of Ubuntu 10.04 LTS */
++#ifndef evutil_socket_t
++#   warning Using hardcoded value for evutil_socket_t as libevent headers do not define it.
++#   define evutil_socket_t int
++#endif
++
++#endif // FC148CFA_5ECC_488E_8A62_CD39406C9F1E
+diff --git a/redsocks.c b/redsocks.c
+index ba5eab2..878576f 100644
+--- a/redsocks.c
++++ b/redsocks.c
+@@ -33,6 +33,7 @@
+ #include "base.h"
+ #include "redsocks.h"
+ #include "utils.h"
++#include "libevent-compat.h"
+ #define REDSOCKS_RELAY_HALFBUFF  4096
+diff --git a/redudp.c b/redudp.c
+index 262af3e..05460dc 100644
+--- a/redudp.c
++++ b/redudp.c
+@@ -32,6 +32,7 @@
+ #include "main.h"
+ #include "redsocks.h"
+ #include "redudp.h"
++#include "libc-compat.h"
+ #define redudp_log_error(client, prio, msg...) \
+       redsocks_log_write_plain(__FILE__, __LINE__, __func__, 0, &(client)->clientaddr, get_destaddr(client), prio, ## msg)
+diff --git a/utils.c b/utils.c
+index 31c6894..7de3969 100644
+--- a/utils.c
++++ b/utils.c
+@@ -25,6 +25,7 @@
+ #include "log.h"
+ #include "utils.h"
+ #include "redsocks.h" // for redsocks_close
++#include "libc-compat.h"
+ int red_recv_udp_pkt(int fd, char *buf, size_t buflen, struct sockaddr_in *inaddr, struct sockaddr_in *toaddr)
+ {
+-- 
+1.9.1
+
diff --git a/net/redsocks/patches/0006-fix_default_config_location.patch b/net/redsocks/patches/0006-fix_default_config_location.patch
new file mode 100644 (file)
index 0000000..1994bef
--- /dev/null
@@ -0,0 +1,17 @@
+Description: change the default config file location
+ redsocks by default looks for ./redsocks.conf. Change this to
+ /etc/redsocks.conf for a more deterministic behaviour.
+Author: Apollon Oikonomopoulos <apoikos@gmail.com>
+Forwared: no
+Last-Update: 2013-04-23
+--- a/main.c
++++ b/main.c
+@@ -39,7 +39,7 @@
+       &dnstc_subsys,
+ };
+-static const char *confname = "redsocks.conf";
++static const char *confname = "/etc/redsocks.conf";
+ static const char *pidfile = NULL;
+ static void terminate(int sig, short what, void *_arg)