| ---[ Phrack Magazine Volume 8, Issue 52 January 26, 1998, article 16 of 20 |
|
|
|
|
| -------------------------[ Piercing Firewalls |
|
|
|
|
| --------[ bishnu@hotmail.com |
|
|
|
|
| Introduction: |
|
|
| Many ISPs manage a firewall to protect their users against the hostile |
| Internet. While the firewall might protect the users, it also serves to limit |
| their freedom. |
|
|
| Most firewalls don't allow a connection to be established if the |
| initiative is coming from the outside, as this automatically disables many |
| security vulnerabilities. Unfortunately, this also means that many other |
| things are not possible; for example, sending an X-display to a machine behind |
| the firewall, or something similar. |
|
|
| One solution is to ask the firewall administrator to configure the firewall |
| not to disable X connections (or the port you plan to use. This normally |
| means allowing connections on port 6000 to penetrate the firewall. But often |
| the admin does not want to, as he is either too busy, hasn't figured out how |
| to configure the firewall yet, or simply refuses to, as it violates the site |
| security policy. Maybe you don't even want him to know that you plan to send |
| some traffic backwards. |
|
|
| For this purpose I wrote two simple programs that transmit TCP connections |
| back thorough a tunnel, to your machine. |
|
|
|
|
| The tunnel: |
|
|
| The solution is two programs, one running at your machine, or some other |
| machine behind the firewall, and another running at some *NIX-box on the |
| Internet. The program behind the firewall (called tunnel) connects to a |
| program (called portal) on the machine on the Internet. This connection |
| probably won't be intercepted by the firewall (depending on the security |
| policy), as it is outgoing. Once the connection from the tunnel to the portal |
| is established, the portal opens a port for incoming TCP traffic, and we are |
| ready to rock. Whenever a machine connects to the portal it sends the request |
| back to the tunnel thorough the already established connection through the |
| firewall, the tunnel will then forward the connection to your machine. |
|
|
| The effect will be that you drag a port on your machine (or any machine |
| behind the firewall) onto the other side of the firewall, which means that |
| anyone can connect to it regardless of the site's security policy. |
|
|
| An example: |
|
|
| Goof: Your machine. |
| Foo : Some other machine behind the firewall or same as Goof, running 'tunnel'. |
| Bar : Some machine on the other side of the firewall running 'portal'. |
| Boof: Some machine wanting to connect to machine Goof, or same as Bar. |
|
|
| FIREWALL |
| tunnel ^ portal |
| ######### ^ ######### |
| # Foo #======================# Bar # |
| ######### ^ ######### |
| | ^ | |
| | ^ | |
| | ^ | |
| ######### ^ ######### |
| # Goof # ^ # Boof # |
| ######### ^ ######### |
| FIREWALL |
|
|
|
|
|
|
| You are sitting on machine Goof, and you run some program on machine Boof, |
| this program happens to be using X-windows, so you want to send the display |
| back to machine Goof. X-windows tries to establish a TCP connection through |
| the firewall, which is 'burned'. |
|
|
| So you start the tunnel on machine Foo, and set it to connect to machine |
| Bar at lets say port 7000 (where the portal is running), also you set the |
| tunnel to forward all TCP connections, coming back from the portal, to your |
| machine Goof on port 6000 (X-windows). You start the portal on machine Bar, |
| and you make it listen for the tunnel on port 7000. Once the tunnel has |
| connected, the portal listens on port 6001 for incoming X. Whenever some |
| X-application connects to the portal, the connection is passed to the tunnel, |
| which then forwards it to machine Goof on port 6000. |
|
|
| Finally on machine Boof you set your display to machine Bar:1 (in a tcsh |
| type 'setenv DISPLAY bar:1', in bash 'export DISPLAY=bar:1'), which tells the |
| application to use port 6001 (We can't use port 6000 if the machine is running |
| a X-server itself). You start your Xeyes, and they pop in your face. |
|
|
|
|
| Conclusion: |
|
|
| If you use this program to cross a firewall you surely violate the ISP's |
| security policy, as anybody can cross it as well, that is if they know, and |
| there is nothing like security by obscurity. So don't tell your mom. |
|
|
| An advantage of this approach is that you don't need to have root access on |
| either machine, which is makes the whole process a bit easier. |
|
|
| To compile the code, just do a `make`. It has been tested on |
| Solaris 2.5.x, 2.6 |
| IRIX 6.[2,3,4] |
| FreeBSD 2.1.5 |
| HPUX 10.x |
| Linux 2.0.x |
|
|
|
|
| ----[ THE CODE |
|
|
|
|
| <++> tunnel/Makefile |
| CC = gcc |
|
|
| OSFLAGS = |
| MYFLAGS = -Wall -O2 -g -pedantic |
| CFLAGS = $(MYFLAGS) $(PROFILE) $(OSFLAGS) |
|
|
| #If you compile on Solaris 2.x, uncomment the following line |
| #LOCAL_LIBRARIES = -lsocket |
|
|
| TUNNEL_OBJFILES = tunnel.o share.o |
| PORTAL_OBJFILES = portal.o share.o |
|
|
| all: tunnel portal |
|
|
| tunnel : $(TUNNEL_OBJFILES) share.h |
| $(CC) $(TUNNEL_OBJFILES) $(LOCAL_LIBRARIES) -o tunnel |
| tunnel.o : tunnel.c share.h |
| $(CC) -c $(CFLAGS) $(COMMFLAGS) tunnel.c |
| portal : $(PORTAL_OBJFILES) share.h |
| $(CC) $(PORTAL_OBJFILES) $(LOCAL_LIBRARIES) -o portal |
| portal.o : portal.c share.h |
| $(CC) -c $(CFLAGS) $(COMMFLAGS) portal.c |
| share.o : share.c share.h |
| $(CC) -c $(CFLAGS) $(COMMFLAGS) share.c |
| clean: |
| rm -f *.o tunnel portal core |
| <--> |
| <++> tunnel/tunnel.c |
| /* |
| -TUNNEL- |
|
|
| This is the tunnel part of my firewall piercer. This code is supposed |
| to be running on the inside of the firewall. The tunnel should then |
| connect to the portal running on the outside. |
|
|
| start it like: |
| >% tunnel localhost 23 protal.machine.com 3001 |
|
|
| if the portal is running at port 3001 at portal.machine.com, incoming |
| connections to the portal will get rerouted to this machines telnet |
| port. |
|
|
| */ |
|
|
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <unistd.h> |
| #include <netinet/in.h> |
| #include <sys/socket.h> |
| #include <sys/time.h> |
| #include <string.h> |
| #include <signal.h> |
| #include <errno.h> |
| #include "share.h" |
|
|
|
|
| extern char tunnel_buf[MAXLEN*2]; |
| char buf[MAXLEN*2]; |
| extern int tunnel_des; /* The socket destination of a tunnel packet*/ |
| extern int tunnel_src; /* The socket source of a tunel packet*/ |
| extern int tunnel_size; /* Size of tunnel packet*/ |
| extern struct connections connections; /*Linked list of connections*/ |
|
|
| char *remote_machine; /*remote machine name to tunnel to*/ |
| extern int tunnel_port; /*tunnel port*/ |
| extern int tunnel_sock; /*tunnel socket*/ |
| char *login_machine=""; /*machine to forward connections to*/ |
| int login_port; /*port to forward connections to*/ |
|
|
| int oldtime=0,ping_time=0; |
| struct connection *descriptors[DESC_MAX]; |
| extern struct connection *descriptors[DESC_MAX]; |
| extern int errno; |
| FILE *log=stdout; /*logfile = stdout by default*/ |
|
|
| void open_tunnel(){ |
| tunnel_sock=remote_connect(remote_machine,tunnel_port); |
| } |
|
|
|
|
| extern int optind; |
| extern char *optarg; |
|
|
| void usage(){ |
| printf("Usage: tunnel [-l logfile] <forward_machine> <forward_port>" \ |
| " <portal_machine> <portal_port>\n"); |
| printf("where:\n"); |
| printf("forward_machine is the machine to which the traffic is forwarded\n"); |
| printf("forward_port is the port to which the traffic is forwarded\n"); |
| printf("portal_machine is the machine we want to route the trafic from\n"); |
| printf("portal_port is the port we want to route the trafic from\n"); |
| printf("Coded by %s\n",AUTHOR); |
| } |
|
|
|
|
| /********************** Get the options ***********************/ |
|
|
| void get_options(int argc,char *argv[]){ |
| int c; |
| while((c=getopt(argc,argv, "l:")) !=-1) |
| switch(c){ |
| case 'l': |
| if(!(log=fopen(optarg,"w"))){ |
| log=stdout; |
| fprintf(log,"Unable to open logfile '%s':%s\n", |
| optarg,strerror(errno)); |
| } |
| break; |
| case '?': |
| default: |
| usage(); |
| exit(-1); |
| } |
| /* the two next options*/ |
| if(argc-optind!=4){ |
| printf("Wrong number of options!\n"); |
| usage(); |
| exit(-1); |
| } |
| login_machine=get_ip(argv[optind++]); |
| login_port=atoi(argv[optind++]); |
| remote_machine=get_ip(argv[optind++]); |
| tunnel_port=atoi(argv[optind++]); |
| if(login_port<1||login_port>65535||tunnel_port<1||tunnel_port>65535){ |
| printf("Ports below 1 and above 65535 don't give any sense\n"); |
| usage(); |
| exit(-1); |
| } |
| } |
|
|
| void alive(){ |
| /* To check wether the line is still alive, we Myping it every |
| ALIVE_TIME seconds. If we don't get a ping from the tunnel |
| every ALIVE_TIME*2 we disconnect the connection to the |
| portal, and wait for a new. If the portal has not died, all |
| the connections through the tunnel will continue as normal once |
| the connection has been established again. |
| The reason why I do this is because some firewalls tend to |
| disable connections if there hasn't been any traffic for some time, |
| or if the connection had been up too long time. |
| */ |
| |
| /*Transmit a Myping packet, we receive the |
| answer in check_tunnel_connection()*/ |
| if(time(NULL)-oldtime>=ALIVE_TIME){ |
| oldtime=time(NULL); |
| transmit_tunnel(buf,0,0,0); |
| } |
| if(time(NULL)-ping_time>ALIVE_TIME*2){ |
| printf("Connection to portal probably lost, hanging up.\n"); |
| shutdown(tunnel_sock,2); |
| close(tunnel_sock); |
| tunnel_sock=-1; |
| } |
| } |
|
|
| int reset_selector(fd_set *selector,fd_set *errsel,struct connection *con) |
| { |
| /* We tell the selector to look on the tunnel socket aswell |
| as our live connections.*/ |
| int maxsock,i; |
| FD_ZERO(selector); |
| FD_SET(tunnel_sock,selector); |
| FD_SET(tunnel_sock,errsel); |
| con=connections.head; |
| maxsock=tunnel_sock; |
| for(i=0;i<connections.num;i++,con=con->next){ |
| FD_SET(con->local_sock,selector); |
| FD_SET(con->local_sock,errsel); |
| maxsock=max(maxsock,con->local_sock); |
| } |
| return(maxsock); /*We return the maximum socket number*/ |
| } |
|
|
| void check_tunnel_connection(fd_set *selector,fd_set *errsel,struct connection *con){ |
| /*Here we check the tunnel for incoming data*/ |
| if(FD_ISSET(tunnel_sock,errsel)){ |
| fprintf(log,"Tunnel connection terminated!\n"); |
| shutdown(tunnel_sock,2); |
| close(tunnel_sock); |
| tunnel_sock=-1; |
| return; |
| } |
| if(FD_ISSET(tunnel_sock,selector)){ |
| if(receive_tunnel()!=-1){ |
| if(tunnel_src==0&&tunnel_des==0){ /*We have a Myping packet*/ |
| ping_time=time(NULL); /*reset the alive_timer*/ |
| } |
| else if(tunnel_src==0){/*We have a 'hangup' signal for a connection*/ |
| if((con=descriptors[tunnel_des])){ |
| fprintf(log,"Removing connection to %s %d\n",con->host,con->port); |
| removeconnection(con); |
| } |
| } |
| else if(tunnel_des==0){ /*We have a new connection*/ |
| int newsock; |
| if((newsock=remote_connect(login_machine,login_port))!=-1){ |
| connections.num++; |
| con=(struct connection *)malloc(sizeof(struct connection)); |
| con->host=(char *)malloc(MAX_HOSTNAME_SIZE); |
| strncpy(con->host,&tunnel_buf[4],MAX_HOSTNAME_SIZE); |
| con->port=ntohl((((int *)tunnel_buf)[0])); |
| con->local_sock=newsock; |
| con->remote_sock=tunnel_src; |
| con->time=time(NULL); |
| con->next=connections.head; |
| connections.head=con; |
| descriptors[newsock]=con; |
| fprintf(log,"Connected the incoming call from %s %d to %s %d\n",con->host,con->port,login_machine,login_port); |
| /*Acknowledge the new connection to the portal*/ |
| transmit_tunnel(buf,0,con->local_sock,con->remote_sock); |
| } |
| } |
| else if(descriptors[tunnel_des]){ |
| /*Send the data to the right descriptor*/ |
| writen(descriptors[tunnel_des]->local_sock,tunnel_buf,tunnel_size); |
| } |
| else{ |
| fprintf(log,"Connection to unallocated channel, hangup signal sent\n"); |
| /*Send a hangup signal to the portal, to disable the connection*/ |
| transmit_tunnel(buf,0,0,tunnel_src); |
| } |
| } |
| } |
| } |
|
|
| void main(int argc,char **argv) |
| { |
| get_options(argc,argv); |
| fprintf(log,"Opening tunnel to %s port %d\n",remote_machine,tunnel_port); |
| fprintf(log,"Tunnelconnections will be forwarded to host %s"\ |
| " port %d\n",login_machine,login_port); |
| connections.num=0; |
| connections.head=NULL; |
| signal(SIGINT,ctrlC); |
| while(1){ /*The tunnel runs infinitely*/ |
| struct connection *con=connections.head; |
| open_tunnel(); |
| ping_time=time(NULL); |
| while(tunnel_sock!=-1){ |
| fd_set selector,errsel; |
| struct timeval alive_time; |
| alive_time.tv_sec=ALIVE_TIME; |
| alive_time.tv_usec=0; |
| alive(); /*Check wether the tunnelconnection is alive*/ |
| /* We have to listen to the tunnel and all the current connections. |
| we do that with a select call*/ |
| if(select(reset_selector(&selector,&errsel,con)+1, |
| &selector,NULL,&errsel,&alive_time)){ |
| /*Check for each of the local connections*/ |
| check_local_connections(&selector,&errsel,con); |
| /*Check for the tunnel*/ |
| check_tunnel_connection(&selector,&errsel,con); |
| } |
| } |
| sleep(RETRY_TIME); /*We sleep a while*/ |
| /* fprintf(log,"Trying to connect to portal.\n"); */ |
| } |
| } |
| <--> |
| <++> tunnel/portal.c |
| /* |
| -PORTAL- |
|
|
| This is the portal part of my firewall piercer. This code is supposed |
| to be running on the outside of the firewall. The tunnel part should |
| then connect trough the firewall to this program. |
| start it like: |
| >% portal 3000 3001 |
| for tunnel connection on port 3001 and incoming calls on 3000. |
|
|
| when you connect to the portal at port 3000 your connection will be |
| forwarded to the tunnel. |
|
|
| */ |
|
|
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <unistd.h> |
| #include <netinet/in.h> |
| #include <sys/socket.h> |
| #include <sys/time.h> |
| #include <string.h> |
| #include <netdb.h> |
| #include <unistd.h> |
| #include <signal.h> |
| #include <errno.h> |
| #include "share.h" |
|
|
| /***************/ |
| /* Global data */ |
| /***************/ |
| extern char tunnel_buf[MAXLEN*2]; |
| extern int tunnel_des; |
| extern int tunnel_src; |
| extern int tunnel_size; |
| extern struct connections connections; |
| extern struct connection *descriptors[DESC_MAX]; |
| extern int errno; |
| extern int tunnel_port; /*tunnel port*/ |
| extern int tunnel_sock; /*tunnel new accepted socket*/ |
|
|
| char buf[MAXLEN*2]; |
| char *remote_machine; /*remote machine name*/ |
| int tunnel_basesock; /*tunnel base socket*/ |
| int local_sock; /* local port socket*/ |
| int local_port; /*local machine port*/ |
| FILE *log=stdout; /*logfile = stdout by default*/ |
| int ping_time=0; |
|
|
|
|
| /********************** Usage ***********************/ |
| void usage(){ |
|
|
| fprintf(stderr,"Usage: portal [-l logfile] <local_port> <tunnel_port>\n"); |
| fprintf(stderr,"where:\n"); |
| fprintf(stderr,"local_port is the port where we accept incoming" \ |
| " connections\n"); |
| fprintf(stderr,"remote_port is the port where we accept the tunnel" \ |
| " to connect\n"); |
| fprintf(stderr,"Coded by %s\n",AUTHOR); |
| } |
|
|
| /********************** Get the options ***********************/ |
|
|
| extern int optind; |
| extern char *optarg; |
|
|
| void get_options(int argc,char *argv[]){ |
| int c; |
| while((c=getopt(argc,argv, "l:")) !=-1) |
| switch(c){ |
| case 'l': |
| if(!(log=fopen(optarg,"w"))){ |
| log=stdout; |
| fprintf(log,"Unable to open logfile '%s':%s\n", |
| optarg,strerror(errno)); |
| } |
| break; |
| case '?': |
| default: |
| usage(); |
| exit(-1); |
| } |
| /* the two next options*/ |
| if(argc-optind!=2){ |
| printf("Wrong number of options!\n"); |
| usage(); |
| exit(-1); |
| } |
| local_port=atoi(argv[optind++]); |
| tunnel_port=atoi(argv[optind++]); |
| if(local_port<1||local_port>65535||tunnel_port<1||tunnel_port>65535){ |
| printf("Ports below 1 and above 65535 dont give any sense\n"); |
| usage(); |
| exit(-1); |
| } |
| } |
|
|
| /*********************************************************/ |
| /*************** Portal *****************/ |
| /*********************************************************/ |
|
|
| void open_local_port(){ |
| /*Open the local port for incoming connections*/ |
| struct sockaddr_in ser; |
| int opt=1; |
| local_sock=socket(AF_INET,SOCK_STREAM,0); |
| if(local_sock==-1){fprintf(log,"Error opening socket\n");exit(0);} |
| if(setsockopt(local_sock,SOL_SOCKET,SO_REUSEADDR, |
| (char *)&opt,sizeof(opt))<0) |
| {perror("setsockopt REUSEADDR");exit(1);} |
| ZERO((char *) &ser,sizeof(ser)); |
| ser.sin_family = AF_INET; |
| ser.sin_addr.s_addr = htonl(INADDR_ANY); |
| ser.sin_port = htons(local_port); |
| if(bind(local_sock,(struct sockaddr *)&ser,sizeof(ser)) ==-1 ){ |
| fprintf(log,"Error binding to local port %d : %s\n" |
| ,local_port,strerror(errno)); |
| exit(-1); |
| } |
| if(listen(local_sock,5)==-1){ |
| fprintf(log,"Error listening to local port %d : %s" |
| ,local_port,strerror(errno)); |
| exit(-1); |
| } |
| fprintf(log,"Opened local port %d on socket %d\n",local_port,local_sock); |
| } |
|
|
| void open_portal(){ |
| int opt=0; |
| struct sockaddr_in ser; |
| if((tunnel_basesock=socket(AF_INET,SOCK_STREAM,0))==-1) |
| {perror("socket");exit(-1);} |
| if(setsockopt(tunnel_basesock,SOL_SOCKET,SO_REUSEADDR, |
| (char *)&opt,sizeof(opt))<0) |
| {perror("setsockopt REUSEADDR");exit(-1);} |
| ZERO((char *) &ser,sizeof(ser)); |
| ser.sin_family = AF_INET; |
| ser.sin_addr.s_addr = htonl(INADDR_ANY); |
| ser.sin_port = htons(tunnel_port); |
| if(bind(tunnel_basesock,(struct sockaddr *)&ser,sizeof(ser)) ==-1 ){ |
| fprintf(log,"Error binding to tunnel port %d : %s\n" |
| ,tunnel_port,strerror(errno)); |
| exit(-1); |
| } |
| if(listen(tunnel_basesock,5)==-1){ |
| fprintf(log,"Error listening to tunnel port %d : %s" |
| ,tunnel_port,strerror(errno)); |
| exit(-1); |
| } |
| } |
|
|
| int accept_portal(){ |
| struct hostent *from; |
| struct sockaddr_in cli; |
| int newsock,clilen; |
| clilen=sizeof(cli); |
| if(!tunnel_basesock){return(-1);} |
| /*Accept incoming calls*/ |
| newsock=accept(tunnel_basesock,(struct sockaddr *)&cli,&clilen); |
| /*We want to know know our remote host better*/ |
| from=gethostbyaddr((char *)(&cli.sin_addr),sizeof(cli.sin_addr),PF_INET); |
| if(!from){ |
| close(newsock); |
| return(-1); |
| } |
| fprintf(log,"Tunnel connection from:%s %d\n",from->h_name,cli.sin_port); |
| return(newsock); |
| } |
|
|
| void close_portal(){ |
| shutdown(tunnel_sock,1); |
| close(tunnel_sock); |
| } |
|
|
| struct connection *receive_local(){ |
| struct sockaddr_in cli; |
| int newsock,clilen; |
| struct hostent *from; |
| struct connection *con; |
| clilen=sizeof(cli); |
| /*Accept incoming calls*/ |
| newsock=accept(local_sock,(struct sockaddr *)&cli,&clilen); |
| if(newsock==-1) |
| {fprintf(log,"Server Accept Error:%s\n",strerror(errno));exit(-1);} |
| /*We want to know know our remote host better*/ |
| from=gethostbyaddr((char *)(&cli.sin_addr),sizeof(cli.sin_addr), PF_INET); |
| fprintf(log,"New connection from:%s %d\n",from->h_name,cli.sin_port); |
| /*Add our new friend to our list of connections*/ |
| connections.num++; |
| con=(struct connection *)malloc(sizeof(struct connection)); |
| con->host=strdup(from->h_name); |
| con->port=cli.sin_port; |
| con->local_sock=newsock; |
| con->remote_sock=0; |
| con->time=time(NULL); |
| con->next=connections.head; |
| connections.head=con; |
| descriptors[newsock]=con; |
| return(con); |
| } |
|
|
| void alive(){ |
| /* If we don't get a ping from the tunnel |
| every ALIVE_TIME*2 we disconnect the connection to the |
| tunnel, and wait for a new. If the tunnel has not died, all |
| the connections from the tunnel will continue as normal once |
| the connection has been established again*/ |
| if(time(NULL)-ping_time>ALIVE_TIME*2){ |
| printf("Connection to tunnel probably lost, hanging up.\n"); |
| shutdown(tunnel_sock,2); |
| close(tunnel_sock); |
| tunnel_sock=-1; |
| } |
| } |
|
|
| int reset_selector(fd_set *selector,fd_set *errsel,struct connection *con){ |
| /* We tell the selector to look on the tunnel socket aswell |
| as our live connections, and the connection socket.*/ |
| int maxsock,i; |
| FD_ZERO(selector); |
| FD_SET(local_sock,selector); |
| FD_SET(tunnel_sock,selector); |
| FD_SET(local_sock,errsel); |
| FD_SET(tunnel_sock,errsel); |
| con=connections.head; |
| maxsock=max(local_sock,tunnel_sock); |
| for(i=0;i<connections.num;i++,con=con->next){ |
| FD_SET(con->local_sock,selector); |
| FD_SET(con->local_sock,errsel); |
| maxsock=max(maxsock,con->local_sock); |
| } |
| return(maxsock); |
| } |
|
|
| void check_tunnel_connection(fd_set *selector,fd_set *errsel,struct connection *con){ |
| /*Here we check the tunnel for incoming data*/ |
| if(FD_ISSET(tunnel_sock,errsel)){ |
| fprintf(log,"Tunnel connection terminated!\n"); |
| shutdown(tunnel_sock,2); |
| close(tunnel_sock); |
| tunnel_sock=-1; |
| return; |
| } |
| if(FD_ISSET(tunnel_sock,selector)){ |
| if(receive_tunnel()!=-1){ |
| if(tunnel_src==0&&tunnel_des==0){ /*We got a Myping*/ |
| ping_time=time(NULL); |
| /* Ping the tunnel back!*/ |
| transmit_tunnel(buf,0,0,0); /*Send a Myping back*/ |
| } |
| else if(tunnel_des){ |
| if(descriptors[tunnel_des]){ |
| con=descriptors[tunnel_des]; |
| if(tunnel_src!=0){ |
| con->remote_sock=tunnel_src; |
| writen(descriptors[tunnel_des]->local_sock,tunnel_buf,tunnel_size); |
| } |
| else{ |
| printf("Hangup signal received. Removing connection to %s %d\n",con->host,con->port); |
| removeconnection(con); |
| } |
| } |
| } |
| } |
| } |
| } |
|
|
| void check_connection_port(fd_set *selector,fd_set *errsel,struct connection *con){ |
| /*Here we check the connection port for new connections*/ |
| if(FD_ISSET(local_sock,selector)){ |
| con=receive_local(); |
| if(con){ |
| printf("Transmitting the new connection\n"); |
| *((int *)(&buf[4]))=htonl(con->port); |
| strncpy(&buf[8],con->host,MAX_HOSTNAME_SIZE); |
| *(&buf[8]+strlen(con->host))=0; |
| transmit_tunnel(buf,4+min(strlen(con->host)+1,MAX_HOSTNAME_SIZE),con->local_sock,0); |
| } |
| } |
| } |
|
|
| void main(int argc,char **argv){ |
| get_options(argc,argv); |
| init_descriptors(); |
| connections.num=0; |
| connections.head=NULL; |
| remote_machine=get_ip(argv[2]); |
| fprintf(log,"Tunneling incoming calls on port %d to port %d \n" |
| ,local_port,tunnel_port); |
| connections.num=0; |
| connections.head=NULL; |
| fprintf(log,"Opening portal\n"); |
| open_portal(); |
| signal(SIGINT,ctrlC); |
| fprintf(log,"Opening localport\n"); |
| open_local_port(); |
| while(1){ |
| fprintf(log,"Waiting for tunnel connection on port %d\n",tunnel_port); |
| while((tunnel_sock=accept_portal())==-1) sleep(4); |
| ping_time=time(NULL); |
| while(tunnel_sock!=-1){ |
| fd_set selector,errsel; |
| struct connection *con=NULL; |
| struct timeval alive_time; |
|
|
| alive_time.tv_sec=ALIVE_TIME; |
| alive_time.tv_usec=0; |
| alive(); |
|
|
| /* We have to listen to the tunnel, the local port, and alle the |
| current connections. */ |
| if(select(reset_selector(&selector,&errsel,con)+1, |
| &selector,NULL,&errsel,&alive_time)){ |
| check_tunnel_connection(&selector,&errsel,con); |
| check_connection_port(&selector,&errsel,con); |
| check_local_connections(&selector,&errsel,con); |
| } |
| } |
| sleep(2); |
| } |
| } |
| <--> |
| <++> tunnel/share.c |
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <unistd.h> |
| #include <netinet/in.h> |
| #include <arpa/inet.h> |
| #include <sys/socket.h> |
| #include <sys/time.h> |
| #include <sys/utsname.h> |
| #include <fcntl.h> |
| #include <string.h> |
| #include <signal.h> |
| #include <errno.h> |
| #include <netdb.h> |
|
|
| #include "share.h" |
|
|
| char tunnel_buf[MAXLEN*2]; /*Buffer to store the tunnel data in*/ |
| int tunnel_des; /*Destination socket */ |
| int tunnel_src; /*Source socket*/ |
| int tunnel_size; /*Size of the data currently in the buffer*/ |
| int tunnel_sock; /*The socket of the portal*/ |
| int tunnel_port; /*The port we wan't to run on*/ |
|
|
| extern FILE *log; /* Our log file*/ |
| extern int errno; |
| struct connection *descriptors[DESC_MAX]; |
| struct connections connections; /*A linked list of our connections*/ |
|
|
| /* |
| Packet header: |
| ####################################/ |
| # Dest # Source# Data size # / data comes here |
| ###################################\ |
| 1 byte 1 byte 2 bytes |
|
|
| If the sestination field is zero, we are initiating a new connection |
| If the source field we are dropping a connection |
| If both the destination and the source is zero, it is a Myping packet. |
| */ |
|
|
| void ctrlC(int sig) |
| { |
| fprintf(log,"Shutting down the hard way\n"); |
| shutdown(tunnel_sock,2); |
| close(tunnel_sock); |
| exit(-1); |
| } |
|
|
|
|
| char *get_ip(char *host){ |
| struct hostent *remote; |
| struct in_addr *in; |
| remote=gethostbyname(host); |
| if(remote==NULL){ |
| fprintf(log,"Hostinformation of remote machine '%s' not resolved,"\ |
| " reason:%s",host,strerror(errno)); |
| exit(-1); |
| } |
| in=(struct in_addr *)remote->h_addr_list[0]; |
| return(strdup(inet_ntoa(*in))); |
| } |
|
|
| int transmit_tunnel(char *data,int size,int source,int destination){ |
| int nleft=size+4,nwritten; |
| fd_set selector,errsel; |
| data[0]=(unsigned char)destination; /*Destination into header*/ |
| data[1]=(unsigned char)source; /*Source into header*/ |
| *((u_short *)&data[2])=htons(size); /*Size into header*/ |
| while(nleft>0){ |
| FD_ZERO(&errsel); |
| FD_ZERO(&selector); |
| FD_SET(tunnel_sock,&errsel); |
| FD_SET(tunnel_sock,&selector); |
| select(tunnel_sock+1,NULL,&selector,&errsel,NULL); |
| if(FD_ISSET(tunnel_sock,&errsel)){ |
| printf("Big bug\n"); |
| } |
| nwritten=write(tunnel_sock,data,nleft); |
| if(nwritten==-1){ |
| fprintf(log,"Error writing to tunnel:%s\n",strerror(errno)); |
| tunnel_sock=-1; |
| return(nwritten); |
| } |
| else if(nwritten==0){ |
| fprintf(log,"Error: Wrote zero bytes in transmit_tunnel\n"); |
| return(nwritten); |
| } |
| nleft-=nwritten; |
| data+=nwritten; |
| } |
| return(size - nleft); |
| } |
|
|
| int receive_tunnel(){ |
| static int received=0; |
| int n,left,got=0,quit=0,sofar=0; |
| received++; |
| while(sofar<4){ |
| quit=0; |
| while(!quit){ |
| n=read(tunnel_sock,&tunnel_buf[sofar],4-sofar); |
| if(n>0){quit=1;sofar+=n;} |
| if(n<1){ |
| fprintf(log,"Connection terminated!\n"); |
| shutdown(tunnel_sock,2); |
| close(tunnel_sock); |
| tunnel_sock=-1; |
| return(-1); |
| } |
| } |
| } |
| tunnel_des=tunnel_buf[0]; /*Fetch the destination*/ |
| tunnel_src=tunnel_buf[1]; /*Fetch the source*/ |
| tunnel_size=ntohs(*((u_short *)&tunnel_buf[2])); /*Fetch the size*/ |
| left=tunnel_size; |
| while(left!=0){ |
| n=read(tunnel_sock,&tunnel_buf[got],left); |
| if(n<0){ |
| fprintf(log,"Connection terminated in receive_tunnel!\n"); |
| shutdown(tunnel_sock,2); |
| close(tunnel_sock); |
| tunnel_sock=-1; |
| return(-1); |
| } |
| got+=n; |
| left-=n; |
| } |
| return(n); |
| } |
| void check_local_connections(fd_set *selector,fd_set *errsel,struct connection *con){ |
| /*Here we check each of the local connections for incoming date*/ |
| char buf[MAXLEN*2]; |
| int i,n; |
| con=connections.head; |
| for(i=0;i<connections.num&&con;i++,con=con->next){ |
| if(FD_ISSET(con->local_sock,errsel)){ |
| fprintf(log,"LLocal connection terminated\n"); |
| fprintf(log,"Removing connection to %s %d\n",con->host,con->port); |
| if(con->remote_sock) transmit_tunnel(buf,0,0,con->remote_sock); |
| removeconnection(con); |
| break; |
| } |
| if(FD_ISSET(con->local_sock,selector)&&con->remote_sock){ |
| n=read(con->local_sock,&buf[4],MAXLEN); |
| if(n<1){ |
| fprintf(log,"Local connection terminated\n"); |
| fprintf(log,"Removing connection to %s %d\n",con->host,con->port); |
| transmit_tunnel(buf,0,0,con->remote_sock); |
| removeconnection(con); |
| break; |
| } |
| /*forward the data to the tunnel*/ |
| transmit_tunnel(buf,n,con->local_sock,con->remote_sock); |
| } |
| } |
| } |
|
|
| void ZERO(char * buf,int size){int i=0;while(i<size)buf[i++]=0;} |
|
|
| int writen(int fd, char *ptr, int nbytes) |
| { |
| int nleft=nbytes,nwritten; |
| while(nleft>0){ |
| nwritten=write(fd,ptr,nleft); |
| if(nwritten<=0) return(nwritten); |
| nleft-=nwritten; |
| ptr+=nwritten; |
| } |
| return(nbytes - nleft); |
| } |
|
|
| int remote_connect(char *machine,int port) |
| { |
| int sock; |
| struct sockaddr_in ser; |
| ZERO((char *) &ser,sizeof(ser)); |
| ser.sin_family = AF_INET; |
| ser.sin_addr.s_addr = inet_addr(machine); |
| ser.sin_port = htons(port); |
| sock=socket(AF_INET,SOCK_STREAM,0); |
| if(sock==-1){perror("Error opening socket\n");return(-1);} |
| if(connect(sock,(struct sockaddr *) &ser,sizeof(ser))==-1){ |
| fprintf(log,"Can't connect to server:%s\n",strerror(errno)); |
| return(-1); |
| } |
| return(sock); |
| } |
|
|
| void disconnect(struct connection *con,int sock1,int sock2){ |
| fprintf(log,"Closing link to: %s %d\n",con->host,con->port); |
| shutdown(sock1,2); |
| shutdown(sock2,2); |
| close(sock1); |
| close(sock2); |
| close(con->local_sock); |
| } |
|
|
| void init_descriptors(){ |
| int i; |
| for(i=0;i<DESC_MAX;i++){ |
| descriptors[i]=NULL; |
| } |
| } |
|
|
| void removeconnection(struct connection *con){ |
| struct connection *c2,*c=connections.head; |
| if(c==con){ |
| connections.head=c->next; |
| descriptors[c->local_sock]=NULL; |
| free(c->host); |
| shutdown(c->local_sock,2); |
| close(c->local_sock); |
| free(c); |
| connections.num--; |
| return; |
| } |
| c2=c; |
| c=c->next; |
| while(c){ |
| if(c==con){ |
| /* connections.head=c2; */ |
| c2->next=c->next; |
| descriptors[c->local_sock]=NULL; |
| free(c->host); |
| shutdown(c->local_sock,2); |
| close(c->local_sock); |
| free(c); |
| connections.num--; |
| return; |
| } |
| c2=c; |
| c=c->next; |
| } |
| } |
| <--> |
| <++> tunnel/share.h |
| /*********************/ |
| /* Structs & Defines */ |
| /*********************/ |
| #define MAX_HOSTNAME_SIZE 128 |
| #define MAXLEN 32768 /*Maximum length of our data*/ |
| #define ALIVE_TIME 60 /*Time to wait before sending a Myping*/ |
| #define DESC_MAX 128 /*Maximum number of descriptors used*/ |
| #define RETRY_TIME 60 /* Time to wait before we reconnect to portal*/ |
| #define max(a,b) ((a>b)?a:b) |
| #define min(a,b) ((a<b)?a:b) |
| #define AUTHOR "bishnu@hotmail.com" |
|
|
| struct connections{ |
| int num; |
| struct connection *head; |
| }; |
|
|
| struct connection{ |
| struct connection *next; |
| int port; |
| int local_sock; |
| int remote_sock; |
| time_t time; |
| char *host; |
| }; |
|
|
|
|
| char *get_ip(char *host); |
|
|
| void random_delay(int n); |
| int transmit_tunnel(char *data,int size,int source,int destination); |
| int receive_tunnel(); |
| void hostname(char *name); |
| void ZERO(char * buf,int size); |
| int writen(int fd, char *ptr, int nbytes); |
| void ctrlC(int sig); |
| void sleep_usec(int n); |
| void nonblock(int s); |
| int remote_connect(char *machine,int port); |
| void disconnect(struct connection *con,int sock1,int sock2); |
| void init_descriptors(); |
| int max_descriptor(); |
| void removeconnection(struct connection *con); |
| void check_local_connections(fd_set *selector,fd_set *errsel,struct connection *con); |
| <--> |
|
|
|
|
| ----[ EOF |
|
|
|
|