You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
363 lines
13 KiB
363 lines
13 KiB
9 years ago
|
import config
|
||
|
import console
|
||
|
import datetime
|
||
|
import gzip
|
||
|
import mangle
|
||
|
import http
|
||
|
import os
|
||
|
import random
|
||
|
import re
|
||
|
import schema.update
|
||
|
import shutil
|
||
|
import string
|
||
|
import StringIO
|
||
|
import sys
|
||
|
import urlparse
|
||
|
import zlib
|
||
|
from OpenSSL import SSL
|
||
|
from twisted.enterprise import adbapi
|
||
|
from twisted.internet import reactor, ssl
|
||
|
from twisted.internet.protocol import ClientFactory
|
||
|
from twisted.protocols.basic import LineReceiver
|
||
|
from twisted.internet import defer
|
||
|
|
||
|
from OpenSSL import crypto
|
||
|
|
||
|
next_connection_id = 1
|
||
|
|
||
|
cached_certs = {}
|
||
|
|
||
|
def get_next_connection_id():
|
||
|
global next_connection_id
|
||
|
ret_id = next_connection_id
|
||
|
next_connection_id += 1
|
||
|
return ret_id
|
||
|
|
||
|
def log(message, id=None, symbol='*', verbosity_level=1):
|
||
|
|
||
|
if config.DEBUG_TO_FILE and not os.path.exists(config.DEBUG_DIR):
|
||
|
os.makedirs(config.DEBUG_DIR)
|
||
|
if id:
|
||
|
debug_str = '[%s](%d) %s' % (symbol, id, message)
|
||
|
if config.DEBUG_TO_FILE:
|
||
|
with open(config.DEBUG_DIR+'/connection_%d.log' % id, 'a') as f:
|
||
|
f.write(debug_str+'\n')
|
||
|
else:
|
||
|
debug_str = '[%s] %s' % (symbol, message)
|
||
|
if config.DEBUG_TO_FILE:
|
||
|
with open(config.DEBUG_DIR+'/debug.log', 'a') as f:
|
||
|
f.write(debug_str+'\n')
|
||
|
if config.DEBUG_VERBOSITY >= verbosity_level:
|
||
|
print debug_str
|
||
|
|
||
|
def log_request(request, id=None, symbol='*', verbosity_level=3):
|
||
|
r_split = request.split('\r\n')
|
||
|
for l in r_split:
|
||
|
log(l, id, symbol, verbosity_level)
|
||
|
|
||
|
class ClientTLSContext(ssl.ClientContextFactory):
|
||
|
isClient = 1
|
||
|
def getContext(self):
|
||
|
return SSL.Context(SSL.TLSv1_METHOD)
|
||
|
|
||
|
|
||
|
class ProxyClient(LineReceiver):
|
||
|
|
||
|
def __init__(self, request):
|
||
|
self.factory = None
|
||
|
self._response_sent = False
|
||
|
self._sent = False
|
||
|
self.request = request
|
||
|
|
||
|
self._response_obj = http.Response()
|
||
|
|
||
|
def log(self, message, symbol='*', verbosity_level=1):
|
||
|
log(message, id=self.factory.connection_id, symbol=symbol, verbosity_level=verbosity_level)
|
||
|
|
||
|
def lineReceived(self, *args, **kwargs):
|
||
|
line = args[0]
|
||
|
if line is None:
|
||
|
line = ''
|
||
|
self._response_obj.add_line(line)
|
||
|
self.log(line, symbol='r<', verbosity_level=3)
|
||
|
if self._response_obj.headers_complete:
|
||
|
if self._response_obj.complete:
|
||
|
self.handle_response_end()
|
||
|
return
|
||
|
self.log("Headers end, length given, waiting for data", verbosity_level=3)
|
||
|
self.setRawMode()
|
||
|
|
||
|
def rawDataReceived(self, *args, **kwargs):
|
||
|
data = args[0]
|
||
|
if not self._response_obj.complete:
|
||
|
if data:
|
||
|
s = console.printable_data(data)
|
||
|
dlines = s.split('\n')
|
||
|
for l in dlines:
|
||
|
self.log(l, symbol='<rd', verbosity_level=3)
|
||
|
self._response_obj.add_data(data)
|
||
|
|
||
|
if self._response_obj.complete:
|
||
|
self.handle_response_end()
|
||
|
|
||
|
def connectionMade(self):
|
||
|
self._connection_made()
|
||
|
|
||
|
@defer.inlineCallbacks
|
||
|
def _connection_made(self):
|
||
|
self.log('Connection established, sending request...', verbosity_level=3)
|
||
|
# Make sure to add errback
|
||
|
lines = self.request.full_request.splitlines()
|
||
|
for l in lines:
|
||
|
self.log(l, symbol='>r', verbosity_level=3)
|
||
|
mangled_request = yield mangle.mangle_request(self.request,
|
||
|
self.factory.connection_id)
|
||
|
yield mangled_request.deep_save()
|
||
|
if not self._sent:
|
||
|
self.transport.write(mangled_request.full_request)
|
||
|
self._sent = True
|
||
|
|
||
|
def handle_response_end(self, *args, **kwargs):
|
||
|
self.log("Remote response finished, returning data to original stream")
|
||
|
self.transport.loseConnection()
|
||
|
assert self._response_obj.full_response
|
||
|
self.factory.return_response(self._response_obj)
|
||
|
|
||
|
|
||
|
class ProxyClientFactory(ClientFactory):
|
||
|
|
||
|
def __init__(self, request):
|
||
|
self.request = request
|
||
|
#self.proxy_server = None
|
||
|
self.connection_id = -1
|
||
|
self.data_defer = defer.Deferred()
|
||
|
self.start_time = datetime.datetime.now()
|
||
|
self.end_time = None
|
||
|
|
||
|
def log(self, message, symbol='*', verbosity_level=1):
|
||
|
log(message, id=self.connection_id, symbol=symbol, verbosity_level=verbosity_level)
|
||
|
|
||
|
def buildProtocol(self, addr):
|
||
|
p = ProxyClient(self.request)
|
||
|
p.factory = self
|
||
|
return p
|
||
|
|
||
|
def clientConnectionFailed(self, connector, reason):
|
||
|
self.log("Connection failed with remote server: %s" % reason.getErrorMessage())
|
||
|
|
||
|
def clientConnectionLost(self, connector, reason):
|
||
|
self.log("Connection lost with remote server: %s" % reason.getErrorMessage())
|
||
|
|
||
|
@defer.inlineCallbacks
|
||
|
def return_response(self, response):
|
||
|
self.end_time = datetime.datetime.now()
|
||
|
log_request(console.printable_data(response.full_response), id=self.connection_id, symbol='<m', verbosity_level=3)
|
||
|
mangled_reqrsp_pair = yield mangle.mangle_response(response, self.connection_id)
|
||
|
log_request(console.printable_data(mangled_reqrsp_pair.response.full_response),
|
||
|
id=self.connection_id, symbol='<', verbosity_level=3)
|
||
|
mangled_reqrsp_pair.time_start = self.start_time
|
||
|
mangled_reqrsp_pair.time_end = self.end_time
|
||
|
yield mangled_reqrsp_pair.deep_save()
|
||
|
self.data_defer.callback(mangled_reqrsp_pair)
|
||
|
|
||
|
|
||
|
class ProxyServer(LineReceiver):
|
||
|
|
||
|
def log(self, message, symbol='*', verbosity_level=1):
|
||
|
log(message, id=self.connection_id, symbol=symbol, verbosity_level=verbosity_level)
|
||
|
|
||
|
def __init__(self, *args, **kwargs):
|
||
|
global next_connection_id
|
||
|
self.connection_id = get_next_connection_id()
|
||
|
|
||
|
self._request_obj = http.Request()
|
||
|
self._connect_response = False
|
||
|
self._forward = True
|
||
|
self._port = None
|
||
|
self._host = None
|
||
|
|
||
|
def lineReceived(self, *args, **kwargs):
|
||
|
line = args[0]
|
||
|
self.log(line, symbol='>', verbosity_level=3)
|
||
|
self._request_obj.add_line(line)
|
||
|
|
||
|
if self._request_obj.verb.upper() == 'CONNECT':
|
||
|
self._connect_response = True
|
||
|
self._forward = False
|
||
|
# For if we only get the port in the connect request
|
||
|
if self._request_obj.port is not None:
|
||
|
self._port = self._request_obj.port
|
||
|
if self._request_obj.host is not None:
|
||
|
self._host = self._request_obj.host
|
||
|
|
||
|
if self._request_obj.headers_complete:
|
||
|
self.setRawMode()
|
||
|
|
||
|
if self._request_obj.complete:
|
||
|
self.setLineMode()
|
||
|
self.full_request_received()
|
||
|
|
||
|
def rawDataReceived(self, *args, **kwargs):
|
||
|
data = args[0]
|
||
|
self._request_obj.add_data(data)
|
||
|
self.log(data, symbol='d>', verbosity_level=3)
|
||
|
|
||
|
if self._request_obj.complete:
|
||
|
self.full_request_received()
|
||
|
|
||
|
def full_request_received(self, *args, **kwargs):
|
||
|
global cached_certs
|
||
|
|
||
|
self.log('End of request', verbosity_level=3)
|
||
|
|
||
|
if self._connect_response:
|
||
|
self.log('Responding to browser CONNECT request', verbosity_level=3)
|
||
|
okay_str = 'HTTP/1.1 200 Connection established\r\n\r\n'
|
||
|
self.transport.write(okay_str)
|
||
|
|
||
|
# Generate a cert for the hostname
|
||
|
if not self._request_obj.host in cached_certs:
|
||
|
log("Generating cert for '%s'" % self._request_obj.host,
|
||
|
verbosity_level=3)
|
||
|
(pkey, cert) = generate_cert(self._request_obj.host,
|
||
|
config.CERT_DIR)
|
||
|
cached_certs[self._request_obj.host] = (pkey, cert)
|
||
|
else:
|
||
|
log("Using cached cert for %s" % self._request_obj.host, verbosity_level=3)
|
||
|
(pkey, cert) = cached_certs[self._request_obj.host]
|
||
|
ctx = ServerTLSContext(
|
||
|
private_key=pkey,
|
||
|
certificate=cert,
|
||
|
)
|
||
|
self.transport.startTLS(ctx, self.factory)
|
||
|
|
||
|
if self._forward:
|
||
|
self.log("Forwarding to %s on %d" % (self._request_obj.host, self._request_obj.port))
|
||
|
factory = ProxyClientFactory(self._request_obj)
|
||
|
factory.proxy_server = self
|
||
|
factory.connection_id = self.connection_id
|
||
|
factory.data_defer.addCallback(self.send_response_back)
|
||
|
if self._request_obj.is_ssl:
|
||
|
self.log("Accessing over SSL...", verbosity_level=3)
|
||
|
reactor.connectSSL(self._request_obj.host, self._request_obj.port, factory, ClientTLSContext())
|
||
|
else:
|
||
|
self.log("Accessing over TCP...", verbosity_level=3)
|
||
|
reactor.connectTCP(self._request_obj.host, self._request_obj.port, factory)
|
||
|
|
||
|
# Reset per-request variables
|
||
|
self.log("Resetting per-request data", verbosity_level=3)
|
||
|
self._connect_response = False
|
||
|
self._forward = True
|
||
|
self._request_obj = http.Request()
|
||
|
if self._port is not None:
|
||
|
self._request_obj.port = self._port
|
||
|
if self._host is not None:
|
||
|
self._request_obj.host = self._host
|
||
|
self.setLineMode()
|
||
|
|
||
|
def send_response_back(self, request):
|
||
|
self.transport.write(request.response.full_response)
|
||
|
self.transport.loseConnection()
|
||
|
|
||
|
def connectionLost(self, reason):
|
||
|
self.log('Connection lost with browser: %s' % reason.getErrorMessage())
|
||
|
|
||
|
|
||
|
class ServerTLSContext(ssl.ContextFactory):
|
||
|
def __init__(self, private_key, certificate):
|
||
|
self.private_key = private_key
|
||
|
self.certificate = certificate
|
||
|
self.sslmethod = SSL.TLSv1_METHOD
|
||
|
self.cacheContext()
|
||
|
|
||
|
def cacheContext(self):
|
||
|
ctx = SSL.Context(self.sslmethod)
|
||
|
ctx.use_certificate(self.certificate)
|
||
|
ctx.use_privatekey(self.private_key)
|
||
|
self._context = ctx
|
||
|
|
||
|
def __getstate__(self):
|
||
|
d = self.__dict__.copy()
|
||
|
del d['_context']
|
||
|
return d
|
||
|
|
||
|
def __setstate__(self, state):
|
||
|
self.__dict__ = state
|
||
|
self.cacheContext()
|
||
|
|
||
|
def getContext(self):
|
||
|
"""Create an SSL context.
|
||
|
"""
|
||
|
return self._context
|
||
|
|
||
|
|
||
|
def generate_cert_serial():
|
||
|
# Generates a random serial to be used for the cert
|
||
|
return random.getrandbits(8*20)
|
||
|
|
||
|
|
||
|
def generate_cert(hostname, cert_dir):
|
||
|
with open(cert_dir+'/'+config.SSL_CA_FILE, 'rt') as f:
|
||
|
ca_raw = f.read()
|
||
|
with open(cert_dir+'/'+config.SSL_PKEY_FILE, 'rt') as f:
|
||
|
ca_key_raw = f.read()
|
||
|
ca_cert = crypto.load_certificate(crypto.FILETYPE_PEM, ca_raw)
|
||
|
ca_key = crypto.load_privatekey(crypto.FILETYPE_PEM, ca_key_raw)
|
||
|
|
||
|
key = crypto.PKey()
|
||
|
key.generate_key(crypto.TYPE_RSA, 2048)
|
||
|
|
||
|
cert = crypto.X509()
|
||
|
cert.get_subject().CN = hostname
|
||
|
cert.set_serial_number(generate_cert_serial())
|
||
|
cert.gmtime_adj_notBefore(0)
|
||
|
cert.gmtime_adj_notAfter(10*365*24*60*60)
|
||
|
cert.set_issuer(ca_cert.get_subject())
|
||
|
cert.set_pubkey(key)
|
||
|
cert.sign(ca_key, "sha256")
|
||
|
|
||
|
return (key, cert)
|
||
|
|
||
|
|
||
|
def generate_ca_certs(cert_dir):
|
||
|
# Make directory if necessary
|
||
|
if not os.path.exists(cert_dir):
|
||
|
os.makedirs(cert_dir)
|
||
|
|
||
|
# Private key
|
||
|
print "Generating private key... ",
|
||
|
key = crypto.PKey()
|
||
|
key.generate_key(crypto.TYPE_RSA, 2048)
|
||
|
with os.fdopen(os.open(cert_dir+'/'+config.SSL_PKEY_FILE, os.O_WRONLY | os.O_CREAT, 0o0600), 'w') as f:
|
||
|
f.write(crypto.dump_privatekey(crypto.FILETYPE_PEM, key))
|
||
|
print "Done!"
|
||
|
|
||
|
# Hostname doesn't matter since it's a client cert
|
||
|
print "Generating client cert... ",
|
||
|
cert = crypto.X509()
|
||
|
cert.get_subject().C = 'US' # Country name
|
||
|
cert.get_subject().ST = 'Michigan' # State or province name
|
||
|
cert.get_subject().L = 'Ann Arbor' # Locality name
|
||
|
cert.get_subject().O = 'Pappy Proxy' # Organization name
|
||
|
#cert.get_subject().OU = '' # Organizational unit name
|
||
|
cert.get_subject().CN = 'Pappy Proxy' # Common name
|
||
|
|
||
|
cert.set_serial_number(generate_cert_serial())
|
||
|
cert.gmtime_adj_notBefore(0)
|
||
|
cert.gmtime_adj_notAfter(10*365*24*60*60)
|
||
|
cert.set_issuer(cert.get_subject())
|
||
|
cert.add_extensions([
|
||
|
crypto.X509Extension("basicConstraints", True,
|
||
|
"CA:TRUE, pathlen:0"),
|
||
|
crypto.X509Extension("keyUsage", True,
|
||
|
"keyCertSign, cRLSign"),
|
||
|
crypto.X509Extension("subjectKeyIdentifier", False, "hash",
|
||
|
subject=cert),
|
||
|
])
|
||
|
cert.set_pubkey(key)
|
||
|
cert.sign(key, 'sha256')
|
||
|
with os.fdopen(os.open(cert_dir+'/'+config.SSL_CA_FILE, os.O_WRONLY | os.O_CREAT, 0o0600), 'w') as f:
|
||
|
f.write(crypto.dump_certificate(crypto.FILETYPE_PEM, cert))
|
||
|
print "Done!"
|
||
|
|