mirror of
https://github.com/proxytunnel/proxytunnel.git
synced 2026-01-23 10:36:13 +00:00
encrypting data to the proxy with SSL (untested by me) - Change version to 1.6.4 git-svn-id: https://proxytunnel.svn.sourceforge.net/svnroot/proxytunnel/trunk/proxytunnel@143 bc163920-b10d-0410-b2c5-a5491ca2ceef
441 lines
14 KiB
C
Executable file
441 lines
14 KiB
C
Executable file
/* Proxytunnel - (C) 2001-2006 Jos Visser / Mark Janssen */
|
|
/* Contact: josv@osp.nl / maniac@maniac.nl */
|
|
|
|
/*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
#include "config.h"
|
|
#include "proxytunnel.h"
|
|
|
|
#ifndef HAVE_GETOPT_LONG
|
|
extern char * optarg;
|
|
#else
|
|
#include <getopt.h>
|
|
#endif
|
|
|
|
#include "cmdline.h"
|
|
|
|
void
|
|
cmdline_parser_print_version (void)
|
|
{
|
|
printf ("%s %s\nCopyright 2001-2006 Proxytunnel Project\n%s\n", PACKAGE, VERSION, AUTHORS);
|
|
}
|
|
|
|
void
|
|
cmdline_parser_print_help (void)
|
|
{
|
|
cmdline_parser_print_version ();
|
|
printf("\n"
|
|
"Purpose:\n"
|
|
" Build generic tunnels trough HTTPS proxy's, supports HTTP authorization\n"
|
|
"\n"
|
|
"Usage: %s [OPTIONS]...\n"
|
|
" -h --help Print help and exit\n"
|
|
" -V --version Print version and exit\n"
|
|
#if 0
|
|
" -c --config=FILE Read config options from file (FIXME)\n"
|
|
#endif
|
|
" -i --inetd Run from inetd (default=off)\n"
|
|
" -a INT --standalone=INT Run as standalone daemon on specified port\n"
|
|
#if 0
|
|
" -f --nobackground Don't for to background in standalone mode (FIXME)\n"
|
|
#endif
|
|
#ifdef USE_SSL
|
|
" -e --encrypt encrypt the communication using SSL\n"
|
|
" -E --encrypt-proxy encrypt the communitation between the client and the proxy using SSL\n"
|
|
#endif
|
|
#ifdef SETPROCTITLE
|
|
" -x STRING --proctitle=STRING Set the process-title to STRING\n"
|
|
#endif
|
|
" -p STRING --proxy=STRING Proxy host:port combination to connect to\n"
|
|
" -d STRING --dest=STRING Destination host:port to built the tunnel to\n"
|
|
"\nParameters for proxy-authentication (not needed for plain proxies):\n"
|
|
" -u STRING --user=STRING Username to send to HTTPS proxy for auth\n"
|
|
" -s STRING --pass=STRING Password to send to HTTPS proxy for auth\n"
|
|
" -U STRING --uservar=STRING Env var with Username for HTTPS proxy auth\n"
|
|
" -S STRING --passvar=STRING Env var with Password for HTTPS proxy auth\n"
|
|
" -N --ntlm Use NTLM Based Authentication\n"
|
|
" -t STRING --domain=STRING NTLM Domain (default: autodetect)\n"
|
|
" -r STRING --remproxy=STRING Use a remote proxy to tunnel over (2 proxies)\n"
|
|
" -H STRING --header=STRING Add STRING to HTTP headers sent to proxy\n\n"
|
|
" If you don't provide -s or -S you will be prompted for a password.\n"
|
|
"\nMiscellaneous options:\n"
|
|
" -v --verbose Turn on verbosity (default=off)\n"
|
|
" -q --quiet Suppress messages (default=off)\n", PACKAGE);
|
|
|
|
printf( "\nExamples:\n"
|
|
"%s [ -h | -V ]\n"
|
|
"%s -i [ -u user ] -p proxy:port -d host:port [ -v | -q ]\n"
|
|
"%s -i [ -U envvar ] -p proxy:port -d host:port [ -v | -q ]\n"
|
|
"%s -a port -p proxy:port -d host:port [ -v | -q ]\n", PACKAGE, PACKAGE, PACKAGE, PACKAGE );
|
|
|
|
|
|
#ifndef HAVE_GETOPT_LONG
|
|
printf( "\n"
|
|
"Notice: This version is compiled without support for long options.\n"
|
|
"This means you can only use the short (1 letter) options on the commandline.\n" );
|
|
#endif
|
|
}
|
|
|
|
|
|
static char *
|
|
gengetopt_strdup (char * s)
|
|
{
|
|
char * n, * pn, * ps = s;
|
|
while (*ps) ps++;
|
|
n = (char *) malloc (1 + ps - s);
|
|
if (n != NULL)
|
|
{
|
|
for (ps=s,pn=n; *ps; ps++,pn++)
|
|
*pn = *ps;
|
|
*pn = 0;
|
|
}
|
|
return n;
|
|
}
|
|
|
|
int cmdline_parser( int argc, char * const *argv, struct gengetopt_args_info *args_info )
|
|
{
|
|
int c; /* Character of the parsed option. */
|
|
int r; /* Tmd retval */
|
|
int missing_required_options = 0;
|
|
char * tmp_env_var;
|
|
|
|
args_info->help_given = 0;
|
|
args_info->version_given = 0;
|
|
args_info->user_given = 0;
|
|
args_info->pass_given = 0;
|
|
args_info->proxy_given = 0;
|
|
args_info->proxyhost_given = 0;
|
|
args_info->proxyport_given = 0;
|
|
args_info->dest_given = 0;
|
|
args_info->remproxy_given = 0;
|
|
args_info->verbose_given = 0;
|
|
args_info->ntlm_given = 0;
|
|
args_info->inetd_given = 0;
|
|
args_info->quiet_given = 0;
|
|
args_info->header_given = 0;
|
|
args_info->domain_given = 0;
|
|
args_info->encrypt_given = 0;
|
|
args_info->encryptproxy_given = 0;
|
|
args_info->proctitle_given = 0;
|
|
|
|
/* No... we can't make this a function... -- Maniac */
|
|
#define clear_args() \
|
|
{ \
|
|
args_info->user_arg = NULL; \
|
|
args_info->pass_arg = NULL; \
|
|
args_info->domain_arg = NULL; \
|
|
args_info->proxy_arg = NULL; \
|
|
args_info->proxyhost_arg = NULL; \
|
|
args_info->dest_arg = NULL; \
|
|
args_info->remproxy_arg = NULL; \
|
|
args_info->header_arg[0] = '\0'; \
|
|
args_info->verbose_flag = 0; \
|
|
args_info->ntlm_flag = 0; \
|
|
args_info->inetd_flag = 0; \
|
|
args_info->quiet_flag = 0; \
|
|
args_info->standalone_arg = 0; \
|
|
args_info->encrypt_flag = 0; \
|
|
args_info->encryptproxy_flag = 0; \
|
|
args_info->proctitle_arg = NULL; \
|
|
}
|
|
|
|
clear_args();
|
|
|
|
optarg = 0;
|
|
|
|
#ifdef HAVE_GETOPT_LONG
|
|
optind = 1;
|
|
opterr = 1;
|
|
optopt = '?';
|
|
#endif
|
|
|
|
while (1)
|
|
{
|
|
#ifdef HAVE_GETOPT_LONG
|
|
int option_index = 0;
|
|
|
|
/* Struct option: Name, Has_arg, Flag, Value */
|
|
static struct option long_options[] = {
|
|
{ "help", 0, NULL, 'h' },
|
|
{ "version", 0, NULL, 'V' },
|
|
{ "user", 1, NULL, 'u' },
|
|
{ "pass", 1, NULL, 's' },
|
|
{ "domain", 1, NULL, 't' },
|
|
{ "uservar", 1, NULL, 'U' },
|
|
{ "passvar", 1, NULL, 'S' },
|
|
{ "proxy", 1, NULL, 'p' },
|
|
{ "proxyhost", 1, NULL, 'g' },
|
|
{ "proxyport", 1, NULL, 'G' },
|
|
{ "dest", 1, NULL, 'd' },
|
|
{ "remproxy", 1, NULL, 'r' },
|
|
{ "proctitle", 1, NULL, 'x' },
|
|
{ "header", 1, NULL, 'H' },
|
|
{ "verbose", 0, NULL, 'v' },
|
|
{ "ntlm", 0, NULL, 'N' },
|
|
{ "inetd", 0, NULL, 'i' },
|
|
{ "standalone", 1, NULL, 'a' },
|
|
{ "quiet", 0, NULL, 'q' },
|
|
{ "encrypt", 0, NULL, 'e' },
|
|
{ "encrypt-proxy", 0, NULL, 'E' },
|
|
{ NULL, 0, NULL, 0 }
|
|
};
|
|
|
|
c = getopt_long (argc, argv, "hVia:u:s:t:U:S:p:r:d:H:x:nvNeEq", long_options, &option_index);
|
|
#else
|
|
c = getopt( argc, argv, "hVia:u:s:t:U:S:p:r:d:H:x:nvNeEq" );
|
|
#endif
|
|
|
|
if (c == -1) break; /* Exit from `while (1)' loop. */
|
|
|
|
switch (c)
|
|
{
|
|
case 'h': /* Print help and exit. */
|
|
clear_args ();
|
|
cmdline_parser_print_help ();
|
|
exit (0);
|
|
|
|
#ifdef USE_SSL
|
|
case 'e': /* Turn on SSL encryption */
|
|
args_info->encrypt_flag = !(args_info->encrypt_flag);
|
|
if( args_info->verbose_flag )
|
|
message("SSL enabled\n");
|
|
break;
|
|
|
|
case 'E': /* Turn on client to proxy SSL encryption */
|
|
args_info->encryptproxy_flag = !(args_info->encryptproxy_flag);
|
|
if( args_info->verbose_flag )
|
|
message("SSL client to proxy enabled\n");
|
|
break;
|
|
#endif
|
|
|
|
case 'i': /* Run from inetd. */
|
|
if ( args_info->standalone_arg > 0 )
|
|
{
|
|
fprintf( stderr, "%s: '--inetd' ('-i') conflicts with '--standalone' ('-a')\n", PACKAGE );
|
|
exit( 1 );
|
|
}
|
|
args_info->inetd_flag = !(args_info->inetd_flag);
|
|
break;
|
|
|
|
case 'a': /* Run as standalone daemon */
|
|
if ( args_info->inetd_flag )
|
|
{
|
|
fprintf( stderr, "%s: `--standalone' (`-a') conflicts with `--inetd' (`-i')\n", PACKAGE );
|
|
exit (1);
|
|
}
|
|
if ( ( args_info->standalone_arg = atoi( optarg ) ) < 1 )
|
|
{
|
|
fprintf( stderr, "%s: Illegal port value for `--standalone' (`-a')\n", PACKAGE);
|
|
exit (1);
|
|
}
|
|
break;
|
|
|
|
case 'V': /* Print version and exit. */
|
|
clear_args ();
|
|
cmdline_parser_print_version ();
|
|
exit (0);
|
|
|
|
case 'x':
|
|
args_info->proctitle_given = 1;
|
|
message( "Proctitle override enabled\n" );
|
|
args_info->proctitle_arg = gengetopt_strdup (optarg);
|
|
break;
|
|
|
|
case 'u': /* Username to send to HTTPS proxy for authentication. */
|
|
if (args_info->user_given)
|
|
{
|
|
fprintf (stderr, "%s: `--user' (`-u') or `--uservar' (`-U') option given more than once\n", PACKAGE);
|
|
clear_args ();
|
|
exit (1);
|
|
}
|
|
args_info->user_given = 1;
|
|
args_info->user_arg = gengetopt_strdup (optarg);
|
|
break;
|
|
|
|
case 'U': /* Env Var with Username to send to HTTPS proxy for authentication. */
|
|
if (args_info->user_given)
|
|
{
|
|
fprintf (stderr, "%s: `--user' (`-u') or `--uservar' (`-U') option given more than once\n", PACKAGE);
|
|
clear_args ();
|
|
exit (1);
|
|
}
|
|
tmp_env_var = getenv(optarg) ;
|
|
if (!tmp_env_var) {
|
|
fprintf (stderr, "%s Invalid environment variable\n", optarg) ;
|
|
clear_args ();
|
|
exit (1);
|
|
}
|
|
args_info->user_given = 1;
|
|
args_info->user_arg = gengetopt_strdup (tmp_env_var);
|
|
break;
|
|
|
|
case 's': /* Password to send to HTTPS proxy for authentication. */
|
|
if (args_info->pass_given)
|
|
{
|
|
fprintf (stderr, "%s: `--pass' (`-s') or `--passvar' (`-S') option given more than once\n", PACKAGE);
|
|
clear_args ();
|
|
exit (1);
|
|
}
|
|
args_info->pass_given = 1;
|
|
args_info->pass_arg = gengetopt_strdup (optarg);
|
|
break;
|
|
|
|
case 't': /* Env Var with NTLM DOMAIN (when overriding). */
|
|
if (args_info->domain_given)
|
|
{
|
|
fprintf (stderr, "%s: `--domain' (`-t') option given more than once\n", PACKAGE);
|
|
clear_args ();
|
|
exit (1);
|
|
}
|
|
args_info->domain_given = 1;
|
|
args_info->domain_arg = gengetopt_strdup (optarg);
|
|
break;
|
|
|
|
case 'S': /* Env Var with Password to send to HTTPS proxy for authentication. */
|
|
if (args_info->pass_given)
|
|
{
|
|
fprintf (stderr, "%s: `--pass' (`-s') or `--passvar' (`-S') option given more than once\n", PACKAGE);
|
|
clear_args ();
|
|
exit (1);
|
|
}
|
|
tmp_env_var = getenv(optarg) ;
|
|
if (!tmp_env_var) {
|
|
fprintf (stderr, "%s Invalid environment variable\n", optarg) ;
|
|
clear_args ();
|
|
exit (1);
|
|
}
|
|
args_info->pass_given = 1;
|
|
args_info->pass_arg = gengetopt_strdup (tmp_env_var);
|
|
break;
|
|
|
|
case 'g': /* HTTPS Proxy host to connect to. */
|
|
fprintf (stderr, "%s: `-g option is obsolete, use -p\n", PACKAGE);
|
|
clear_args ();
|
|
exit (1);
|
|
break;
|
|
|
|
case 'G': /* HTTPS Proxy host portnumber to connect to. */
|
|
fprintf (stderr, "%s: `-g option is obsolete, use -p\n", PACKAGE);
|
|
clear_args ();
|
|
exit (1);
|
|
break;
|
|
|
|
case 'p': /* HTTPS Proxy host:port to connect to. */
|
|
if (args_info->proxy_given)
|
|
{
|
|
fprintf (stderr, "%s: `--proxy' (`-p') option given more than once\n", PACKAGE);
|
|
clear_args ();
|
|
exit (1);
|
|
}
|
|
args_info->proxy_given = 1;
|
|
args_info->proxy_arg = gengetopt_strdup (optarg);
|
|
break;
|
|
|
|
case 'r': /* Use a remote proxy */
|
|
if (args_info->remproxy_given)
|
|
{
|
|
fprintf (stderr, "%s: `--remproxy' (`-r') option given more than once\n", PACKAGE);
|
|
clear_args ();
|
|
exit (1);
|
|
}
|
|
args_info->remproxy_given = 1;
|
|
args_info->remproxy_arg = gengetopt_strdup (optarg);
|
|
break;
|
|
|
|
case 'd': /* Destination host to built the tunnel to. */
|
|
if (args_info->dest_given)
|
|
{
|
|
fprintf (stderr, "%s: `--dest' (`-d') option given more than once\n", PACKAGE);
|
|
clear_args ();
|
|
exit (1);
|
|
}
|
|
args_info->dest_given = 1;
|
|
args_info->dest_arg = gengetopt_strdup (optarg);
|
|
break;
|
|
|
|
case 'H': /* Extra headers to send to HTTPS proxy. */
|
|
args_info->header_given++;
|
|
strlcat( args_info->header_arg, optarg, MAX_HEADER_SIZE );
|
|
strlcat( args_info->header_arg, "\r\n", MAX_HEADER_SIZE );
|
|
break;
|
|
|
|
case 'v': /* Turn on verbosity. */
|
|
args_info->verbose_flag = !(args_info->verbose_flag);
|
|
break;
|
|
|
|
case 'N': /* Turn on NTLM. */
|
|
args_info->ntlm_flag = !(args_info->ntlm_flag);
|
|
break;
|
|
|
|
case 'q': /* Suppress messages -- Quiet mode */
|
|
args_info->quiet_flag = !(args_info->quiet_flag);
|
|
break;
|
|
|
|
case 0: /* Long option with no short option */
|
|
|
|
case '?': /* Invalid option. */
|
|
/* `getopt_long' already printed an error message. */
|
|
exit (1);
|
|
|
|
default: /* bug: option not considered. */
|
|
fprintf (stderr, "%s: option unknown: %c\n", PACKAGE, c);
|
|
abort ();
|
|
} /* switch */
|
|
} /* while */
|
|
|
|
if (! args_info->proxy_given && ! args_info->dest_given )
|
|
{
|
|
clear_args ();
|
|
cmdline_parser_print_help ();
|
|
exit (0);
|
|
}
|
|
|
|
if (args_info->proxy_given )
|
|
{
|
|
char * phost;
|
|
int pport;
|
|
|
|
phost = malloc( 50+1 );
|
|
|
|
//fprintf( stderr, "%s: proxyhost (pre parse) given, it is: '%s'\n", PACKAGE, args_info->proxy_arg );
|
|
|
|
r = sscanf( args_info->proxy_arg, "%50[^:]:%5u", phost, &pport );
|
|
if ( r == 2 )
|
|
{
|
|
args_info->proxyhost_arg = phost;
|
|
args_info->proxyport_arg = pport;
|
|
args_info->proxyhost_given = 1;
|
|
args_info->proxyport_given = 1;
|
|
}
|
|
else
|
|
{
|
|
message( "parse_cmdline: couln't find your proxy hostname/ip\n" );
|
|
missing_required_options++;
|
|
}
|
|
//message( "%s: proxyhost (post parse) is '%s':'%d'\n", PACKAGE, args_info->proxyhost_arg, args_info->proxyport_arg );
|
|
}
|
|
|
|
if ( missing_required_options )
|
|
exit (1);
|
|
|
|
|
|
return 0;
|
|
}
|