// Copyright 2018 The Chromium Authors. All rights reserved. // Copyright 2018 klzgrad . All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include #include #include #include #include "base/at_exit.h" #include "base/command_line.h" #include "base/files/file_path.h" #include "base/json/json_writer.h" #include "base/logging.h" #include "base/macros.h" #include "base/message_loop/message_loop.h" #include "base/run_loop.h" #include "base/strings/string_number_conversions.h" #include "base/strings/stringprintf.h" #include "base/strings/utf_string_conversions.h" #include "base/sys_info.h" #include "base/task/task_scheduler/task_scheduler.h" #include "base/values.h" #include "build/build_config.h" #include "components/version_info/version_info.h" #include "net/base/auth.h" #include "net/dns/host_resolver.h" #include "net/dns/mapped_host_resolver.h" #include "net/http/http_auth.h" #include "net/http/http_auth_cache.h" #include "net/http/http_network_session.h" #include "net/http/http_transaction_factory.h" #include "net/log/file_net_log_observer.h" #include "net/log/net_log.h" #include "net/log/net_log_capture_mode.h" #include "net/log/net_log_entry.h" #include "net/log/net_log_source.h" #include "net/log/net_log_util.h" #include "net/proxy_resolution/proxy_config.h" #include "net/proxy_resolution/proxy_config_service_fixed.h" #include "net/proxy_resolution/proxy_config_with_annotation.h" #include "net/proxy_resolution/proxy_resolution_service.h" #include "net/socket/client_socket_pool_manager.h" #include "net/socket/ssl_client_socket.h" #include "net/socket/tcp_server_socket.h" #include "net/ssl/ssl_key_logger_impl.h" #include "net/tools/naive/naive_proxy.h" #include "net/traffic_annotation/network_traffic_annotation.h" #include "net/url_request/url_request_context.h" #include "net/url_request/url_request_context_builder.h" #include "url/gurl.h" #include "url/scheme_host_port.h" #if defined(OS_MACOSX) #include "base/mac/scoped_nsautorelease_pool.h" #endif namespace { constexpr int kListenBackLog = 512; constexpr int kDefaultMaxSocketsPerPool = 256; constexpr int kDefaultMaxSocketsPerGroup = 255; constexpr int kExpectedMaxUsers = 8; constexpr char kDefaultHostName[] = "example"; constexpr net::NetworkTrafficAnnotationTag kTrafficAnnotation = net::DefineNetworkTrafficAnnotation("naive", ""); struct Params { std::string listen_addr; int listen_port; net::NaiveProxy::Protocol protocol; bool use_proxy; std::string proxy_url; std::string proxy_user; std::string proxy_pass; std::string host_resolver_rules; logging::LoggingSettings log_settings; base::FilePath net_log_path; base::FilePath ssl_key_path; }; std::unique_ptr GetConstants( const base::CommandLine::StringType& command_line_string) { auto constants_dict = net::GetNetConstants(); DCHECK(constants_dict); // Add a dictionary with the version of the client and its command line // arguments. auto dict = std::make_unique(); // We have everything we need to send the right values. std::string os_type = base::StringPrintf( "%s: %s (%s)", base::SysInfo::OperatingSystemName().c_str(), base::SysInfo::OperatingSystemVersion().c_str(), base::SysInfo::OperatingSystemArchitecture().c_str()); dict->SetString("os_type", os_type); dict->SetString("command_line", command_line_string); constants_dict->Set("clientInfo", std::move(dict)); return std::move(constants_dict); } // Builds a URLRequestContext assuming there's only a single loop. std::unique_ptr BuildURLRequestContext( const Params& params, net::NetLog* net_log) { net::URLRequestContextBuilder builder; builder.DisableHttpCache(); builder.set_net_log(net_log); net::ProxyConfig proxy_config; if (params.use_proxy) { proxy_config.proxy_rules().ParseFromString(params.proxy_url); } auto proxy_service = net::ProxyResolutionService::CreateWithoutProxyResolver( std::make_unique( net::ProxyConfigWithAnnotation(proxy_config, kTrafficAnnotation)), net_log); proxy_service->ForceReloadProxyConfig(); builder.set_proxy_resolution_service(std::move(proxy_service)); if (!params.host_resolver_rules.empty()) { auto remapped_resolver = std::make_unique( net::HostResolver::CreateDefaultResolver(net_log)); remapped_resolver->SetRulesFromString(params.host_resolver_rules); builder.set_host_resolver(std::move(remapped_resolver)); } auto context = builder.Build(); if (params.use_proxy) { net::HttpNetworkSession* session = context->http_transaction_factory()->GetSession(); net::HttpAuthCache* auth_cache = session->http_auth_cache(); GURL auth_origin(params.proxy_url); net::AuthCredentials credentials(base::ASCIIToUTF16(params.proxy_user), base::ASCIIToUTF16(params.proxy_pass)); auth_cache->Add(auth_origin, /*realm=*/std::string(), net::HttpAuth::AUTH_SCHEME_BASIC, /*challenge=*/"Basic", credentials, /*path=*/"/"); } return context; } bool ParseCommandLineFlags(Params* params) { const base::CommandLine& line = *base::CommandLine::ForCurrentProcess(); if (line.HasSwitch("h") || line.HasSwitch("help")) { LOG(INFO) << "Usage: naive [options]\n" "\n" "Options:\n" "-h, --help Show this message\n" "--version Print version\n" "--addr=
Address to listen on (0.0.0.0)\n" "--port= Port to listen on (1080)\n" "--proto=[socks|http] Protocol to accept (socks)\n" "--proxy=https://:@[:]\n" " Proxy specification.\n" "--log Log to stderr, otherwise no log\n" "--log-net-log= Save NetLog\n" "--ssl-key-log-file= Save SSL keys for Wireshark\n"; exit(EXIT_SUCCESS); return false; } if (line.HasSwitch("version")) { LOG(INFO) << "Version: " << version_info::GetVersionNumber(); exit(EXIT_SUCCESS); return false; } params->listen_addr = "0.0.0.0"; if (line.HasSwitch("addr")) { params->listen_addr = line.GetSwitchValueASCII("addr"); } if (params->listen_addr.empty()) { LOG(ERROR) << "Invalid --addr"; return false; } params->listen_port = 1080; if (line.HasSwitch("port")) { if (!base::StringToInt(line.GetSwitchValueASCII("port"), ¶ms->listen_port)) { LOG(ERROR) << "Invalid --port"; return false; } if (params->listen_port <= 0 || params->listen_port > std::numeric_limits::max()) { LOG(ERROR) << "Invalid --port"; return false; } } params->protocol = net::NaiveProxy::kSocks5; if (line.HasSwitch("proto")) { const auto& proto = line.GetSwitchValueASCII("proto"); if (proto == "socks") { params->protocol = net::NaiveProxy::kSocks5; } else if (proto == "http") { params->protocol = net::NaiveProxy::kHttp; } else { LOG(ERROR) << "Invalid --proto"; return false; } } params->use_proxy = false; GURL url(line.GetSwitchValueASCII("proxy")); if (line.HasSwitch("proxy")) { params->use_proxy = true; if (!url.is_valid()) { LOG(ERROR) << "Invalid proxy URL"; return false; } if (url.scheme() != "https") { LOG(ERROR) << "Must be HTTPS proxy"; return false; } if (url.username().empty() || url.password().empty()) { LOG(ERROR) << "Missing user or pass"; return false; } params->proxy_url = url::SchemeHostPort(url).Serialize(); params->proxy_user = url.username(); params->proxy_pass = url.password(); } if (line.HasSwitch("host-resolver-rules")) { params->host_resolver_rules = line.GetSwitchValueASCII("host-resolver-rules"); } else { // SNI should only contain DNS hostnames not IP addresses per RFC 6066. if (url.HostIsIPAddress()) { GURL::Replacements replacements; replacements.SetHostStr(kDefaultHostName); params->proxy_url = url::SchemeHostPort(url.ReplaceComponents(replacements)).Serialize(); LOG(INFO) << "Using '" << kDefaultHostName << "' as the hostname for " << url.host(); params->host_resolver_rules = std::string("MAP ") + kDefaultHostName + " " + url.host(); } } if (line.HasSwitch("log")) { params->log_settings.logging_dest = logging::LOG_TO_SYSTEM_DEBUG_LOG; } else { params->log_settings.logging_dest = logging::LOG_NONE; } if (line.HasSwitch("log-net-log")) { params->net_log_path = line.GetSwitchValuePath("log-net-log"); } if (line.HasSwitch("ssl-key-log-file")) { params->ssl_key_path = line.GetSwitchValuePath("ssl-key-log-file"); } return true; } // NetLog::ThreadSafeObserver implementation that simply prints events // to the logs. class PrintingLogObserver : public net::NetLog::ThreadSafeObserver { public: PrintingLogObserver() = default; ~PrintingLogObserver() override { // This is guaranteed to be safe as this program is single threaded. net_log()->RemoveObserver(this); } // NetLog::ThreadSafeObserver implementation: void OnAddEntry(const net::NetLogEntry& entry) override { switch (entry.type()) { case net::NetLogEventType::SOCKET_POOL_STALLED_MAX_SOCKETS: case net::NetLogEventType::SOCKET_POOL_STALLED_MAX_SOCKETS_PER_GROUP: case net::NetLogEventType:: HTTP2_SESSION_STREAM_STALLED_BY_SESSION_SEND_WINDOW: case net::NetLogEventType:: HTTP2_SESSION_STREAM_STALLED_BY_STREAM_SEND_WINDOW: case net::NetLogEventType::HTTP2_SESSION_STALLED_MAX_STREAMS: case net::NetLogEventType::HTTP2_STREAM_FLOW_CONTROL_UNSTALLED: break; default: return; } const char* const source_type = net::NetLog::SourceTypeToString(entry.source().type); const char* const event_type = net::NetLog::EventTypeToString(entry.type()); const char* const event_phase = net::NetLog::EventPhaseToString(entry.phase()); auto params = entry.ParametersToValue(); std::string params_str; if (params.get()) { base::JSONWriter::Write(*params, ¶ms_str); params_str.insert(0, ": "); } LOG(INFO) << source_type << "(" << entry.source().id << "): " << event_type << ": " << event_phase << params_str; } private: DISALLOW_COPY_AND_ASSIGN(PrintingLogObserver); }; } // namespace int main(int argc, char* argv[]) { base::TaskScheduler::CreateAndStartWithDefaultParams("naive"); base::AtExitManager exit_manager; base::MessageLoopForIO main_loop; #if defined(OS_MACOSX) base::mac::ScopedNSAutoreleasePool pool; #endif base::CommandLine::Init(argc, argv); Params params; if (!ParseCommandLineFlags(¶ms)) { return EXIT_FAILURE; } net::ClientSocketPoolManager::set_max_sockets_per_pool( net::HttpNetworkSession::NORMAL_SOCKET_POOL, kDefaultMaxSocketsPerPool * kExpectedMaxUsers); net::ClientSocketPoolManager::set_max_sockets_per_proxy_server( net::HttpNetworkSession::NORMAL_SOCKET_POOL, kDefaultMaxSocketsPerPool * kExpectedMaxUsers); net::ClientSocketPoolManager::set_max_sockets_per_group( net::HttpNetworkSession::NORMAL_SOCKET_POOL, kDefaultMaxSocketsPerGroup * kExpectedMaxUsers); CHECK(logging::InitLogging(params.log_settings)); if (!params.ssl_key_path.empty()) { net::SSLClientSocket::SetSSLKeyLogger( std::make_unique(params.ssl_key_path)); } // The declaration order for net_log and printing_log_observer is // important. The destructor of PrintingLogObserver removes itself // from net_log, so net_log must be available for entire lifetime of // printing_log_observer. net::NetLog net_log; std::unique_ptr observer; if (!params.net_log_path.empty()) { const auto& cmdline = base::CommandLine::ForCurrentProcess()->GetCommandLineString(); observer = net::FileNetLogObserver::CreateUnbounded(params.net_log_path, GetConstants(cmdline)); observer->StartObserving(&net_log, net::NetLogCaptureMode::Default()); } PrintingLogObserver printing_log_observer; net_log.AddObserver(&printing_log_observer, net::NetLogCaptureMode::Default()); auto context = BuildURLRequestContext(params, &net_log); auto listen_socket = std::make_unique(&net_log, net::NetLogSource()); int result = listen_socket->ListenWithAddressAndPort( params.listen_addr, params.listen_port, kListenBackLog); if (result != net::OK) { LOG(ERROR) << "Failed to listen: " << result; return EXIT_FAILURE; } net::NaiveProxy naive_proxy( std::move(listen_socket), params.protocol, params.use_proxy, context->http_transaction_factory()->GetSession(), kTrafficAnnotation); base::RunLoop().Run(); return EXIT_SUCCESS; }