mirror of
https://github.com/proxytunnel/proxytunnel.git
synced 2026-01-23 02:34:59 +00:00
786 lines
25 KiB
C
786 lines
25 KiB
C
/* Proxytunnel - (C) 2001-2020 Jos Visser / Mark Janssen */
|
|
/* Contact: josv@osp.nl / maniac@maniac.nl */
|
|
|
|
/*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <ctype.h>
|
|
#include <errno.h>
|
|
#include <sys/types.h>
|
|
#include <sys/stat.h>
|
|
#include <unistd.h>
|
|
#include "config.h"
|
|
#include "proxytunnel.h"
|
|
|
|
#ifndef HAVE_GETOPT_LONG
|
|
extern char * optarg;
|
|
#else
|
|
#include <getopt.h>
|
|
#endif
|
|
|
|
#include "cmdline.h"
|
|
static char *getCredentialsFromFile( const char* filename, char **user, char **pass, char **rem_user, char **rem_pass);
|
|
|
|
void cmdline_parser_print_version (void) {
|
|
printf ("%s %s Copyright 2001-%s Proxytunnel Project\n", PACKAGE, VERSION, VERSION_YEAR);
|
|
}
|
|
|
|
void cmdline_parser_print_help (void) {
|
|
cmdline_parser_print_version ();
|
|
printf(
|
|
"Usage: %s [OPTIONS]...\n"
|
|
"Build generic tunnels through HTTPS proxies using HTTP authentication\n"
|
|
"\n"
|
|
"Standard options:\n"
|
|
// FIXME: " -c, --config=FILE Read config options from file\n"
|
|
" -i, --inetd Run from inetd (default: off)\n"
|
|
" -a, --standalone=STRING Run as standalone daemon on specified port or\n"
|
|
" address:port combination\n"
|
|
// FIXME: " -f, --nobackground Don't fork to background in standalone mode\n"
|
|
" -p, --proxy=STRING Local proxy host:port combination\n"
|
|
" -r, --remproxy=STRING Remote proxy host:port combination (using 2 proxies)\n"
|
|
" -d, --dest=STRING Destination host:port combination\n"
|
|
#ifdef USE_SSL
|
|
" -e, --encrypt SSL encrypt data between local proxy and destination\n"
|
|
" -E, --encrypt-proxy SSL encrypt data between client and local proxy\n"
|
|
" -X, --encrypt-remproxy SSL encrypt data between local and remote proxy\n"
|
|
#endif
|
|
"\n"
|
|
"Additional options for specific features:\n"
|
|
#ifdef USE_SSL
|
|
" -W, --wa-bug-29744 Workaround ASF Bugzilla 29744: if SSL is active\n"
|
|
" stop using it after CONNECT (might not work on all\n"
|
|
" setups)\n"
|
|
" -B, --buggy-encrypt-proxy Equivalent to -E -W, provided for backwards\n"
|
|
" compatibility\n"
|
|
/*" -L, --tlsenforce Enforce TLSv1 connection (legacy)\n"
|
|
" -T, --no-ssl3 Do not connect using SSLv3 (legacy)\n"*/
|
|
" -z, --no-check-certificate Don't verify server SSL certificate\n"
|
|
" -C, --cacert=STRING Path to trusted CA certificate or directory\n"
|
|
#endif
|
|
" -4, --ipv4 Enforce IPv4 connection to local proxy\n"
|
|
" -6, --ipv6 Enforce IPv6 connection to local proxy\n"
|
|
" -F, --passfile=STRING File with credentials for proxy authentication\n"
|
|
" -P, --proxyauth=STRING Proxy auth credentials user:pass combination\n"
|
|
" -R, --remproxyauth=STRING Remote proxy auth credentials user:pass combination\n"
|
|
#ifdef USE_SSL
|
|
" -c, --cert=FILENAME client SSL certificate (chain)\n"
|
|
" -k, --key=FILENAME client SSL key\n"
|
|
#endif
|
|
// " -u, --user=STRING Username for proxy authentication\n"
|
|
// " -s, --pass=STRING Password for proxy authentication\n"
|
|
// " -U, --uservar=STRING Environment variable that holds username\n"
|
|
// " -S, --passvar=STRING Environment variable that holds password\n"
|
|
" -N, --ntlm Use NTLM based authentication\n"
|
|
" -t, --domain=STRING NTLM domain (default: autodetect)\n"
|
|
" -H, --header=STRING Add additional HTTP headers to send to proxy\n"
|
|
#ifdef USE_SSL
|
|
" -o, --host=STRING Send custom Host Header/SNI\n"
|
|
#else
|
|
" -o, --host=STRING Send custom Host Header\n"
|
|
#endif
|
|
#ifdef SETPROCTITLE
|
|
" -x, --proctitle=STRING Use a different process title\n"
|
|
#endif
|
|
"\n"
|
|
"Miscellaneous options:\n"
|
|
" -v, --verbose Turn on verbosity\n"
|
|
" -q, --quiet Suppress messages\n"
|
|
" -h, --help Print help and exit\n"
|
|
" -V, --version Print version and exit\n", PACKAGE);
|
|
|
|
#ifndef HAVE_GETOPT_LONG
|
|
printf( "\n"
|
|
"Notice: This version is compiled without support for long options.\n"
|
|
"This means you can only use the short (1 letter) options on the commandline.\n" );
|
|
#endif
|
|
}
|
|
|
|
|
|
static char * gengetopt_strdup (char * s) {
|
|
char * n, * pn, * ps = s;
|
|
while (*ps) ps++;
|
|
n = (char *) malloc (1 + ps - s);
|
|
if (n != NULL) {
|
|
for (ps=s,pn=n; *ps; ps++,pn++)
|
|
*pn = *ps;
|
|
*pn = 0;
|
|
}
|
|
return n;
|
|
}
|
|
|
|
int cmdline_parser( int argc, char * const *argv, struct gengetopt_args_info *args_info ) {
|
|
/* Character of the parsed option. */
|
|
int c;
|
|
/* Tmd retval */
|
|
int r;
|
|
int missing_required_options = 0;
|
|
|
|
args_info->help_given = 0;
|
|
args_info->version_given = 0;
|
|
args_info->user_given = 0;
|
|
args_info->pass_given = 0;
|
|
args_info->remuser_given = 0;
|
|
args_info->rempass_given = 0;
|
|
args_info->proxy_given = 0;
|
|
args_info->proxyauth_given = 0;
|
|
args_info->proxyhost_given = 0;
|
|
args_info->proxyport_given = 0;
|
|
args_info->dest_given = 0;
|
|
args_info->remproxy_given = 0;
|
|
args_info->remproxyauth_given = 0;
|
|
args_info->verbose_given = 0;
|
|
args_info->quiet_given = 0;
|
|
args_info->ntlm_given = 0;
|
|
args_info->inetd_given = 0;
|
|
args_info->standalone_given = 0;
|
|
args_info->standalone_addr_given = 0;
|
|
args_info->standalone_iface_given = 0;
|
|
args_info->header_given = 0;
|
|
args_info->domain_given = 0;
|
|
args_info->encrypt_given = 0;
|
|
args_info->encryptproxy_given = 0;
|
|
args_info->encryptremproxy_given = 0;
|
|
args_info->clientcert_given = 0;
|
|
args_info->clientkey_given = 0;
|
|
args_info->wa_bug_29744_given = 0;
|
|
args_info->proctitle_given = 0;
|
|
/* args_info->enforcetls1_given = 0; */
|
|
args_info->host_given = 0;
|
|
args_info->cacert_given = 0;
|
|
|
|
/* No... we can't make this a function... -- Maniac */
|
|
#define clear_args() \
|
|
{ \
|
|
args_info->user_arg = NULL; \
|
|
args_info->pass_arg = NULL; \
|
|
args_info->remuser_arg = NULL; \
|
|
args_info->rempass_arg = NULL; \
|
|
args_info->domain_arg = NULL; \
|
|
args_info->proxy_arg = NULL; \
|
|
args_info->proxyauth_arg = NULL; \
|
|
args_info->proxyhost_arg = NULL; \
|
|
args_info->dest_arg = NULL; \
|
|
args_info->remproxy_arg = NULL; \
|
|
args_info->remproxyauth_arg = NULL; \
|
|
args_info->header_arg[0] = '\0'; \
|
|
args_info->verbose_flag = 0; \
|
|
args_info->quiet_flag = 0; \
|
|
args_info->ntlm_flag = 0; \
|
|
args_info->inetd_flag = 0; \
|
|
args_info->standalone_arg = NULL; \
|
|
args_info->standalone_addr = NULL; \
|
|
args_info->standalone_iface = NULL; \
|
|
args_info->standalone_port = 0; \
|
|
args_info->encrypt_flag = 0; \
|
|
args_info->encryptproxy_flag = 0; \
|
|
args_info->encryptremproxy_flag = 0; \
|
|
args_info->clientcert_arg = NULL; \
|
|
args_info->clientkey_arg = NULL; \
|
|
args_info->wa_bug_29744_flag = 0; \
|
|
/* args_info->no_ssl3_flag = 0; */\
|
|
args_info->proctitle_arg = NULL; \
|
|
/* args_info->enforcetls1_flag = 0; */\
|
|
args_info->host_arg = NULL; \
|
|
args_info->no_check_cert_flag = 0; \
|
|
args_info->cacert_arg = NULL; \
|
|
args_info->enforceipv4_flag = 0; \
|
|
args_info->enforceipv6_flag = 0; \
|
|
}
|
|
|
|
clear_args();
|
|
|
|
optarg = 0;
|
|
|
|
#ifdef HAVE_GETOPT_LONG
|
|
optind = 1;
|
|
opterr = 1;
|
|
optopt = '?';
|
|
#endif
|
|
|
|
while (1) {
|
|
#ifdef HAVE_GETOPT_LONG
|
|
int option_index = 0;
|
|
|
|
/* Struct option: Name, Has_arg, Flag, Value */
|
|
static struct option long_options[] = {
|
|
{ "help", 0, NULL, 'h' },
|
|
{ "version", 0, NULL, 'V' },
|
|
{ "domain", 1, NULL, 't' },
|
|
{ "passfile", 1, NULL, 'F' },
|
|
{ "proxy", 1, NULL, 'p' },
|
|
{ "proxyauth", 1, NULL, 'P' },
|
|
{ "dest", 1, NULL, 'd' },
|
|
{ "remproxy", 1, NULL, 'r' },
|
|
{ "remproxyauth", 1, NULL, 'R' },
|
|
{ "proctitle", 1, NULL, 'x' },
|
|
{ "host", 1, NULL, 'o' },
|
|
{ "tlsenforce", 0, NULL, 'L' },
|
|
{ "header", 1, NULL, 'H' },
|
|
{ "verbose", 0, NULL, 'v' },
|
|
{ "ntlm", 0, NULL, 'N' },
|
|
{ "inetd", 0, NULL, 'i' },
|
|
{ "standalone", 1, NULL, 'a' },
|
|
{ "quiet", 0, NULL, 'q' },
|
|
{ "encrypt", 0, NULL, 'e' },
|
|
{ "encrypt-proxy", 0, NULL, 'E' },
|
|
{ "encrypt-remproxy",0,NULL, 'X' },
|
|
{ "cert", 1, NULL, 'c' },
|
|
{ "key", 1, NULL, 'k' },
|
|
{ "wa-bug-29744", 0, NULL, 'W' },
|
|
{ "buggy-encrypt-proxy", 0, NULL, 'B' },
|
|
{ "no-ssl3", 0, NULL, 'T' },
|
|
{ "no-check-certificate",0,NULL,'z' },
|
|
{ "cacert", 1, NULL, 'C' },
|
|
{ "ipv4", 0, NULL, '4' },
|
|
{ "ipv6", 0, NULL, '6' },
|
|
{ NULL, 0, NULL, 0 }
|
|
};
|
|
|
|
c = getopt_long (argc, argv, "hVia:u:s:t:F:p:P:r:R:d:H:x:c:k:vNeEXWBqLo:TzC:46", long_options, &option_index);
|
|
#else
|
|
c = getopt( argc, argv, "hVia:u:s:t:F:p:P:r:R:d:H:x:c:k:vNeEXWBqLo:TzC:46" );
|
|
#endif
|
|
|
|
if (c == -1)
|
|
break; /* Exit from `while (1)' loop. */
|
|
|
|
switch (c) {
|
|
case 'h': /* Print help and exit. */
|
|
clear_args ();
|
|
cmdline_parser_print_help ();
|
|
exit(0);
|
|
|
|
#ifdef USE_SSL
|
|
case 'e': /* Turn on SSL encryption */
|
|
args_info->encrypt_flag = !(args_info->encrypt_flag);
|
|
if( args_info->verbose_flag )
|
|
message("SSL enabled\n");
|
|
break;
|
|
|
|
case 'E': /* Turn on client to proxy SSL encryption */
|
|
args_info->encryptproxy_flag = !(args_info->encryptproxy_flag);
|
|
if( args_info->verbose_flag )
|
|
message("SSL client to proxy enabled\n");
|
|
break;
|
|
|
|
case 'c': /* client SSL certificate (chain) */
|
|
if (args_info->clientcert_given) {
|
|
fprintf (stderr, "%s: '--cert' ('-c') option given more than once\n", PACKAGE);
|
|
clear_args ();
|
|
exit(1);
|
|
}
|
|
args_info->clientcert_given = 1;
|
|
args_info->clientcert_arg = gengetopt_strdup (optarg);
|
|
break;
|
|
|
|
case 'k': /* client SSL key */
|
|
if (args_info->clientkey_given) {
|
|
fprintf (stderr, "%s: '--key' ('-k') option given more than once\n", PACKAGE);
|
|
clear_args ();
|
|
exit(1);
|
|
}
|
|
args_info->clientkey_given = 1;
|
|
args_info->clientkey_arg = gengetopt_strdup (optarg);
|
|
break;
|
|
|
|
case 'W': /* if SSL is active stop it after CONNECT */
|
|
args_info->wa_bug_29744_flag = !(args_info->wa_bug_29744_flag);
|
|
if( args_info->verbose_flag )
|
|
message("If SSL is active stop it after CONNECT\n");
|
|
break;
|
|
|
|
case 'B': /* do -E -W */
|
|
args_info->wa_bug_29744_flag = !(args_info->wa_bug_29744_flag);
|
|
args_info->encryptproxy_flag = !(args_info->encryptproxy_flag);
|
|
if( args_info->verbose_flag )
|
|
message("SSL client to proxy enabled, only until CONNECT\n");
|
|
break;
|
|
#endif
|
|
|
|
case 'i': /* Run from inetd. */
|
|
if ( args_info->standalone_arg > 0 ) {
|
|
fprintf( stderr, "%s: '--inetd' ('-i') conflicts with '--standalone' ('-a')\n", PACKAGE );
|
|
clear_args();
|
|
exit( 1 );
|
|
}
|
|
args_info->inetd_flag = !(args_info->inetd_flag);
|
|
break;
|
|
|
|
case 'a': /* Run as standalone daemon */
|
|
if (args_info->standalone_given) {
|
|
fprintf (stderr, "%s: '--standalone' ('-a') option given more than once\n", PACKAGE);
|
|
clear_args ();
|
|
exit(1);
|
|
}
|
|
if ( args_info->inetd_flag ) {
|
|
fprintf( stderr, "%s: `--standalone' (`-a') conflicts with `--inetd' (`-i')\n", PACKAGE );
|
|
clear_args();
|
|
exit(1);
|
|
}
|
|
args_info->standalone_given = 1;
|
|
args_info->standalone_arg = gengetopt_strdup (optarg);
|
|
break;
|
|
|
|
case 'V': /* Print version and exit. */
|
|
clear_args ();
|
|
cmdline_parser_print_version ();
|
|
exit(0);
|
|
|
|
case 'x':
|
|
args_info->proctitle_given = 1;
|
|
message( "Proctitle override enabled\n" );
|
|
args_info->proctitle_arg = gengetopt_strdup (optarg);
|
|
break;
|
|
|
|
case 'L':
|
|
/* args_info->enforcetls1_given = 1;
|
|
message("Enforcing TLSv1\n");
|
|
args_info->enforcetls1_flag = 1; */
|
|
message ("Option -L/--tlsenforce is deprecated and without effect\n");
|
|
break;
|
|
|
|
case 'o':
|
|
args_info->host_given = 1;
|
|
message("Host-header/SNI override enabled\n");
|
|
args_info->host_arg = gengetopt_strdup (optarg);
|
|
break;
|
|
|
|
case 't': /* Env Var with NTLM DOMAIN (when overriding). */
|
|
if (args_info->domain_given) {
|
|
fprintf (stderr, "%s: `--domain' (`-t') option given more than once\n", PACKAGE);
|
|
clear_args ();
|
|
exit(1);
|
|
}
|
|
args_info->domain_given = 1;
|
|
args_info->domain_arg = gengetopt_strdup (optarg);
|
|
break;
|
|
|
|
case 'F': /* File containing Username & Password to send to
|
|
HTTPS proxy for authentication. */
|
|
if (args_info->user_given) {
|
|
fprintf (stderr, "%s: `--user' (`-u') or `--passfile' (`-F') option given more than once\n", PACKAGE);
|
|
clear_args ();
|
|
exit(1);
|
|
}
|
|
if (args_info->pass_given) {
|
|
fprintf (stderr, "%s: `--pass' (`-s') or `--passfile' (`-F') option given more than once\n", PACKAGE);
|
|
clear_args ();
|
|
exit(1);
|
|
}
|
|
char *result = getCredentialsFromFile(optarg, &(args_info->user_arg), &(args_info->pass_arg), &(args_info->remuser_arg), &(args_info->rempass_arg) );
|
|
if ( args_info->user_arg != NULL )
|
|
args_info->user_given = 1;
|
|
if ( args_info->pass_arg != NULL )
|
|
args_info->pass_given = 1;
|
|
if ( args_info->remuser_arg != NULL )
|
|
args_info->remuser_given = 1;
|
|
if ( args_info->rempass_arg != NULL )
|
|
args_info->rempass_given = 1;
|
|
|
|
if( result != NULL ) {
|
|
fprintf( stderr, "%s: Bad password file for `--passfile' (`-F')\n%s\n", PACKAGE, result);
|
|
clear_args();
|
|
exit(1);
|
|
}
|
|
break;
|
|
|
|
case 'p': /* HTTPS Proxy host:port to connect to. */
|
|
if (args_info->proxy_given) {
|
|
fprintf (stderr, "%s: `--proxy' (`-p') option given more than once\n", PACKAGE);
|
|
clear_args ();
|
|
exit(1);
|
|
}
|
|
args_info->proxy_given = 1;
|
|
args_info->proxy_arg = gengetopt_strdup (optarg);
|
|
break;
|
|
|
|
case 'P': /* HTTPS Proxy auth user:pass for local proxy */
|
|
if (args_info->proxyauth_given) {
|
|
fprintf (stderr, "%s: `--proxyauth' (`-P') option given more than once\n", PACKAGE);
|
|
clear_args ();
|
|
exit(1);
|
|
}
|
|
args_info->proxyauth_given = 1;
|
|
args_info->proxyauth_arg = gengetopt_strdup (optarg);
|
|
break;
|
|
|
|
case 'r': /* Use a remote proxy */
|
|
if (args_info->remproxy_given) {
|
|
fprintf (stderr, "%s: `--remproxy' (`-r') option given more than once\n", PACKAGE);
|
|
clear_args ();
|
|
exit(1);
|
|
}
|
|
args_info->remproxy_given = 1;
|
|
args_info->remproxy_arg = gengetopt_strdup (optarg);
|
|
break;
|
|
|
|
case 'R': /* HTTPS Proxy auth user:pass for remote proxy */
|
|
if (args_info->remproxyauth_given) {
|
|
fprintf (stderr, "%s: `--remproxyauth' (`-P') option given more than once\n", PACKAGE);
|
|
clear_args ();
|
|
exit(1);
|
|
}
|
|
args_info->remproxyauth_given = 1;
|
|
args_info->remproxyauth_arg = gengetopt_strdup (optarg);
|
|
break;
|
|
|
|
case 'X': /* Turn on local to remote proxy SSL encryption */
|
|
args_info->encryptremproxy_flag = !(args_info->encryptremproxy_flag);
|
|
if( args_info->verbose_flag )
|
|
message("SSL local to remote proxy enabled\n");
|
|
break;
|
|
|
|
case 'T': /* Turn off SSLv3 */
|
|
/* args_info->no_ssl3_flag = !(args_info->no_ssl3_flag);
|
|
if( args_info->verbose_flag )
|
|
message("SSLv3 disabled\n"); */
|
|
message ("Option -T/--no-ssl3 is deprecated and without effect\n");
|
|
break;
|
|
|
|
case 'd': /* Destination host to built the tunnel to. */
|
|
if (args_info->dest_given) {
|
|
fprintf (stderr, "%s: `--dest' (`-d') option given more than once\n", PACKAGE);
|
|
clear_args ();
|
|
exit(1);
|
|
}
|
|
args_info->dest_given = 1;
|
|
args_info->dest_arg = gengetopt_strdup (optarg);
|
|
break;
|
|
|
|
case 'H': /* Extra headers to send to HTTPS proxy. */
|
|
args_info->header_given++;
|
|
strzcat( args_info->header_arg, "%s\r\n", optarg);
|
|
break;
|
|
|
|
case 'v': /* Turn on verbosity. */
|
|
if (args_info->quiet_flag) { /* -q also on cmd line */
|
|
fprintf (stderr, "-v and -q are mutually exclusive\n");
|
|
clear_args();
|
|
exit(1);
|
|
}
|
|
args_info->verbose_flag = !(args_info->verbose_flag);
|
|
break;
|
|
|
|
case 'N': /* Turn on NTLM. */
|
|
args_info->ntlm_flag = !(args_info->ntlm_flag);
|
|
break;
|
|
|
|
case 'q': /* Suppress messages -- Quiet mode */
|
|
args_info->quiet_flag = !(args_info->quiet_flag);
|
|
break;
|
|
|
|
case 'z': /* Don't verify server SSL certificate */
|
|
args_info->no_check_cert_flag = 1;
|
|
if( args_info->verbose_flag )
|
|
message("Server SSL certificate verification disabled\n");
|
|
break;
|
|
|
|
case 'C': /* Trusted CA certificate (or directory) for server SSL certificate verification */
|
|
if (args_info->cacert_given) {
|
|
fprintf (stderr, "%s: `--cacert' (`-C') option given more than once\n", PACKAGE);
|
|
clear_args ();
|
|
exit(1);
|
|
}
|
|
args_info->cacert_given = 1;
|
|
args_info->cacert_arg = gengetopt_strdup (optarg);
|
|
break;
|
|
|
|
case '4': /* Enforce IPv4 */
|
|
if ( args_info->enforceipv6_flag ) {
|
|
fprintf( stderr, "%s: `--ipv4' (`-4') conflicts with `--ipv6' (`-6')\n", PACKAGE );
|
|
clear_args();
|
|
exit(1);
|
|
}
|
|
args_info->enforceipv4_flag = 1;
|
|
if( args_info->verbose_flag )
|
|
message("IPv4 enforced\n");
|
|
break;
|
|
|
|
case '6': /* Enforce IPv6 */
|
|
if ( args_info->enforceipv4_flag ) {
|
|
fprintf( stderr, "%s: `--ipv6' (`-6') conflicts with `--ipv4' (`-4')\n", PACKAGE );
|
|
clear_args();
|
|
exit(1);
|
|
}
|
|
args_info->enforceipv6_flag = 1;
|
|
if( args_info->verbose_flag )
|
|
message("IPv6 enforced\n");
|
|
break;
|
|
|
|
case 0: /* Long option with no short option */
|
|
|
|
case '?': /* Invalid option. */
|
|
/* `getopt_long' already printed an error message. */
|
|
clear_args();
|
|
exit(1);
|
|
|
|
default: /* bug: option not considered. */
|
|
fprintf (stderr, "%s: option unknown: %c\n", PACKAGE, c);
|
|
clear_args();
|
|
abort();
|
|
} /* switch */
|
|
} /* while */
|
|
|
|
/* For Windows quiet is the default output. -- Dag */
|
|
#ifdef CYGWIN
|
|
if (! args_info->verbose_flag ) {
|
|
args_info->quiet_flag = 1;
|
|
}
|
|
#endif
|
|
|
|
/* Get credentials from environment. -- Dag */
|
|
char *tmp = NULL;
|
|
if ( args_info->user_arg == NULL ) {
|
|
if ( (tmp = getenv("PROXYUSER")) != NULL) {
|
|
args_info->user_given = 1;
|
|
args_info->user_arg = gengetopt_strdup (tmp);
|
|
if( args_info->verbose_flag )
|
|
message( "Found user '%s' in env variable PROXYUSER.\n", args_info->user_arg);
|
|
}
|
|
}
|
|
if ( args_info->pass_arg == NULL ) {
|
|
if ( (tmp = getenv("PROXYPASS")) != NULL ) {
|
|
args_info->pass_given = 1;
|
|
args_info->pass_arg = gengetopt_strdup (tmp);
|
|
if( args_info->verbose_flag )
|
|
message( "Found password in env variable PROXYPASS.\n", args_info->pass_arg);
|
|
}
|
|
}
|
|
if ( args_info->remuser_arg == NULL ) {
|
|
if ( (tmp = getenv("REMPROXYUSER")) != NULL ) {
|
|
args_info->remuser_given = 1;
|
|
args_info->remuser_arg = gengetopt_strdup (tmp);
|
|
if( args_info->verbose_flag )
|
|
message( "Found remote user '%s' in env variable REMPROXYPASS.\n", args_info->remuser_arg);
|
|
}
|
|
}
|
|
if ( args_info->rempass_arg == NULL ) {
|
|
if ( (tmp = getenv("REMPROXYPASS")) != NULL ) {
|
|
args_info->rempass_given = 1;
|
|
args_info->rempass_arg = gengetopt_strdup (tmp);
|
|
if( args_info->verbose_flag )
|
|
message( "Found remote password in env variable REMPROXYPASS.\n" );
|
|
}
|
|
}
|
|
|
|
if ( args_info->proxy_arg == NULL ) {
|
|
if ( ((tmp = getenv("http_proxy")) != NULL) || ((tmp = getenv("HTTP_PROXY")) != NULL) ) {
|
|
//int r;
|
|
char * temp;
|
|
temp = malloc( 56+1 );
|
|
sscanf( tmp, "http://%56[^/]/", temp );
|
|
//r = sscanf( tmp, "http://%56[^/]/", temp );
|
|
// message( "r = '%d'\ntemp = '%s'\n", r, temp);
|
|
|
|
args_info->proxy_given = 1;
|
|
args_info->proxy_arg = gengetopt_strdup (temp);
|
|
if( args_info->verbose_flag )
|
|
message( "Proxy info found using env variable HTTP_PROXY (%s).\n", args_info->proxy_arg);
|
|
}
|
|
}
|
|
|
|
if (! args_info->proxy_given && ! args_info->dest_given ) {
|
|
clear_args ();
|
|
// cmdline_parser_print_help ();
|
|
message( "No proxy or destination given, exiting\nUse '--help' flag for usage info\n" );
|
|
exit(1);
|
|
}
|
|
|
|
if ( args_info->clientcert_given ^ args_info->clientkey_given ) {
|
|
clear_args ();
|
|
message( "Both of '--cert' ('-c') and '--key' ('-k') must be specified\n" );
|
|
exit(1);
|
|
}
|
|
|
|
/* Parse -p/--proxy information */
|
|
if (args_info->proxy_given ) {
|
|
char proxy_arg_fmt[32];
|
|
size_t proxy_arg_len;
|
|
char * phost;
|
|
int pport;
|
|
|
|
proxy_arg_len = strlen( args_info->proxy_arg );
|
|
if ( (phost = malloc( proxy_arg_len + 1 )) == NULL ) {
|
|
message( "Out of memory\n" );
|
|
exit(1);
|
|
}
|
|
snprintf( proxy_arg_fmt, sizeof(proxy_arg_fmt), "%%%zu[^:]:%%5u", proxy_arg_len - 1 );
|
|
r = sscanf( args_info->proxy_arg, proxy_arg_fmt, phost, &pport );
|
|
if ( r != 2 ) {
|
|
/* try bracket-enclosed IPv6 literal */
|
|
snprintf( proxy_arg_fmt, sizeof(proxy_arg_fmt), "[%%%zu[^]]]:%%5u", proxy_arg_len - 1 );
|
|
r = sscanf( args_info->proxy_arg, proxy_arg_fmt, phost, &pport );
|
|
}
|
|
if ( r == 2 ) {
|
|
args_info->proxyhost_arg = phost;
|
|
args_info->proxyport_arg = pport;
|
|
args_info->proxyhost_given = 1;
|
|
args_info->proxyport_given = 1;
|
|
} else {
|
|
message( "parse_cmdline: specified proxy (%s) does not fit the expected pattern hostname/ip:port\n", args_info->proxy_arg );
|
|
missing_required_options++;
|
|
}
|
|
}
|
|
|
|
/* Parse -a/--standalone information */
|
|
if ( args_info->standalone_given ) {
|
|
char standalone_arg_fmt[32];
|
|
size_t standalone_arg_len;
|
|
char *aaddr;
|
|
char *aiface;
|
|
int aport;
|
|
|
|
standalone_arg_len = strlen( args_info->standalone_arg );
|
|
if ( (aaddr = malloc( standalone_arg_len + 1 )) == NULL ) {
|
|
message( "Out of memory\n" );
|
|
exit(1);
|
|
}
|
|
if ( (aiface = malloc( standalone_arg_len + 1 )) == NULL ) {
|
|
message( "Out of memory\n" );
|
|
exit(1);
|
|
}
|
|
/* try IPv4 literal and port */
|
|
snprintf( standalone_arg_fmt, sizeof(standalone_arg_fmt), "%%%zu[0-9.]:%%5u", standalone_arg_len - 1 );
|
|
r = sscanf( args_info->standalone_arg, standalone_arg_fmt, aaddr, &aport );
|
|
if ( r != 2 ) {
|
|
/* try bracket-enclosed IPv6 literal and port */
|
|
snprintf( standalone_arg_fmt, sizeof(standalone_arg_fmt), "[%%%zu[0-9A-Fa-f:]]:%%5u", standalone_arg_len - 1 );
|
|
r = sscanf( args_info->standalone_arg, standalone_arg_fmt, aaddr, &aport );
|
|
}
|
|
if ( r != 2 ) {
|
|
/* try bracket-enclosed IPv6 literal, interface and port */
|
|
snprintf( standalone_arg_fmt, sizeof(standalone_arg_fmt), "[%%%zu[0-9A-Fa-f:]%%%%%%%zu[^]]]:%%5u", standalone_arg_len - 1, standalone_arg_len - 1 );
|
|
if ( sscanf( args_info->standalone_arg, standalone_arg_fmt, aaddr, aiface, &aport ) == 3 )
|
|
r = 3;
|
|
}
|
|
if ( r == 3 ) {
|
|
args_info->standalone_iface = aiface;
|
|
args_info->standalone_iface_given = 1;
|
|
r--;
|
|
}
|
|
if ( r == 2 ) {
|
|
args_info->standalone_addr = aaddr;
|
|
args_info->standalone_port = aport;
|
|
args_info->standalone_addr_given = 1;
|
|
/* try port only */
|
|
} else if ( sscanf( args_info->standalone_arg, "%5u", &aport ) ) {
|
|
args_info->standalone_port = aport;
|
|
} else {
|
|
message( "parse_cmdline: specified standalone argument (%s) does not fit one of the expected patterns: port, ipv4:port, [ipv6]:port, [ipv6%%interface]:port\n", args_info->standalone_arg );
|
|
missing_required_options++;
|
|
}
|
|
}
|
|
|
|
/* Parse -P/--proxyauth information */
|
|
if (args_info->proxyauth_given ) {
|
|
char *puser = NULL;
|
|
char *ppass = NULL;
|
|
|
|
puser = malloc( 80+1 );
|
|
ppass = malloc( 80+1 );
|
|
|
|
r = sscanf( args_info->proxyauth_arg, "%80[^:]:%80s", puser, ppass );
|
|
if ( r == 2 ) {
|
|
args_info->user_arg = puser;
|
|
args_info->pass_arg = ppass;
|
|
args_info->user_given = 1;
|
|
args_info->pass_given = 1;
|
|
} else if ( r == 1 ) {
|
|
args_info->user_arg = args_info->proxyauth_arg;
|
|
args_info->user_given = 1;
|
|
} else {
|
|
message( "parse_cmdline: could not find your proxy auth user/pass\n" );
|
|
missing_required_options++;
|
|
}
|
|
}
|
|
|
|
/* Parse -R/--remproxyauth information */
|
|
if (args_info->remproxyauth_given ) {
|
|
char *ruser = NULL;
|
|
char *rpass = NULL;
|
|
|
|
ruser = malloc( 80+1 );
|
|
rpass = malloc( 80+1 );
|
|
|
|
r = sscanf( args_info->remproxyauth_arg, "%80[^:]:%80s", ruser, rpass );
|
|
if ( r == 2 ) {
|
|
args_info->remuser_arg = ruser;
|
|
args_info->rempass_arg = rpass;
|
|
args_info->remuser_given = 1;
|
|
args_info->rempass_given = 1;
|
|
} else if ( r == 1 ) {
|
|
args_info->remuser_arg = args_info->remproxyauth_arg;
|
|
args_info->remuser_given = 1;
|
|
} else {
|
|
message( "parse_cmdline: could not find your proxy auth user/pass\n" );
|
|
missing_required_options++;
|
|
}
|
|
}
|
|
|
|
if ( missing_required_options )
|
|
exit(1);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static char *getCredentialsFromFile( const char* filename, char **user, char **pass, char **remuser, char **rempass ) {
|
|
/* Check file permissions, must have '0' for group and other */
|
|
struct stat statbuf;
|
|
if ( stat( filename, &statbuf ) == 0 ) {
|
|
if ( statbuf.st_mode & (S_IRWXG|S_IRWXO) ) {
|
|
return strdup( "Stricter permissions required for password file" );
|
|
}
|
|
} else {
|
|
return strdup( strerror(errno) );
|
|
}
|
|
|
|
FILE* pwfile = fopen( filename, "r" );
|
|
char line[80], buf[80];
|
|
|
|
*user = NULL;
|
|
*pass = NULL;
|
|
*remuser = NULL;
|
|
*rempass = NULL;
|
|
|
|
if( pwfile ) {
|
|
/* Read a line */
|
|
while (fgets( line, 80, pwfile ) != NULL ) {
|
|
if ( sscanf( line, "proxy_user = %s", buf ) == 1 ) {
|
|
*user = strdup( buf );
|
|
} else if ( sscanf( line, "proxy_passwd = %s", buf ) == 1 ) {
|
|
*pass = strdup( buf );
|
|
} else if ( sscanf( line, "remproxy_user = %s", buf ) == 1 ) {
|
|
*remuser = strdup( buf );
|
|
} else if ( sscanf( line, "remproxy_passwd = %s", buf ) == 1 ) {
|
|
*rempass = strdup( buf );
|
|
}
|
|
}
|
|
fclose( pwfile );
|
|
if ( *user == NULL && *pass == NULL && *remuser == NULL && *rempass == NULL) {
|
|
return strdup( "proxy_user & proxy_passwd not found in password file" );
|
|
} else {
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
return strdup( "Error opening password file" );
|
|
}
|
|
|
|
// vim:noexpandtab:ts=4
|