mirror of
https://github.com/Ylianst/MeshCentralRouter
synced 2026-01-20 00:33:13 +00:00
Manual proxy improvements.
This commit is contained in:
@@ -97,6 +97,31 @@ namespace MeshCentralRouter
|
||||
try { return Registry.GetValue(@"HKEY_CURRENT_USER\SOFTWARE\OpenSource\MeshRouter", name, "").ToString(); } catch (Exception) { return ""; }
|
||||
}
|
||||
|
||||
public static string GetProxyForUrlUsingPac(string DestinationUrl, string PacUri)
|
||||
{
|
||||
IntPtr WinHttpSession = Win32Api.WinHttpOpen("User", Win32Api.WINHTTP_ACCESS_TYPE_DEFAULT_PROXY, IntPtr.Zero, IntPtr.Zero, 0);
|
||||
|
||||
Win32Api.WINHTTP_AUTOPROXY_OPTIONS ProxyOptions = new Win32Api.WINHTTP_AUTOPROXY_OPTIONS();
|
||||
Win32Api.WINHTTP_PROXY_INFO ProxyInfo = new Win32Api.WINHTTP_PROXY_INFO();
|
||||
|
||||
ProxyOptions.dwFlags = Win32Api.WINHTTP_AUTOPROXY_CONFIG_URL;
|
||||
ProxyOptions.dwAutoDetectFlags = (Win32Api.WINHTTP_AUTO_DETECT_TYPE_DHCP | Win32Api.WINHTTP_AUTO_DETECT_TYPE_DNS_A);
|
||||
ProxyOptions.lpszAutoConfigUrl = PacUri;
|
||||
|
||||
// Get Proxy
|
||||
bool IsSuccess = Win32Api.WinHttpGetProxyForUrl(WinHttpSession, DestinationUrl, ref ProxyOptions, ref ProxyInfo);
|
||||
Win32Api.WinHttpCloseHandle(WinHttpSession);
|
||||
|
||||
if (IsSuccess)
|
||||
{
|
||||
return ProxyInfo.lpszProxy;
|
||||
}
|
||||
else
|
||||
{
|
||||
Console.WriteLine("Error: {0}", Win32Api.GetLastError());
|
||||
return null;
|
||||
}
|
||||
}
|
||||
|
||||
// Parse the URL query parameters and returns a collection
|
||||
public static NameValueCollection GetQueryStringParameters()
|
||||
@@ -734,424 +759,8 @@ namespace MeshCentralRouter
|
||||
|
||||
public string Base64Encode(string plainText)
|
||||
{
|
||||
private MeshCentralServer parent = null;
|
||||
private TcpClient wsclient = null;
|
||||
private SslStream wsstream = null;
|
||||
private NetworkStream wsrawstream = null;
|
||||
private int state = 0;
|
||||
private Uri url = null;
|
||||
private byte[] readBuffer = new Byte[500];
|
||||
private int readBufferLen = 0;
|
||||
private int accopcodes = 0;
|
||||
private bool accmask = false;
|
||||
private int acclen = 0;
|
||||
private bool proxyInUse = false;
|
||||
private Uri proxyUri = null;
|
||||
private string user = null;
|
||||
private string pass = null;
|
||||
private string token = null;
|
||||
public bool xdebug = false;
|
||||
public bool xtlsdump = false;
|
||||
public bool xignoreCert = false;
|
||||
|
||||
public void Dispose() {
|
||||
try { wsstream.Close(); } catch (Exception) { }
|
||||
try { wsstream.Dispose(); } catch (Exception) { }
|
||||
wsstream = null;
|
||||
wsclient = null;
|
||||
state = -1;
|
||||
parent.changeState(0);
|
||||
parent.wshash = null;
|
||||
}
|
||||
|
||||
public void Debug(string msg) { if (xdebug) { try { File.AppendAllText("debug.log", "Debug-" + msg + "\r\n"); } catch (Exception) { } } }
|
||||
public void TlsDump(string direction, byte[] data, int offset, int len) { if (xtlsdump) { try { File.AppendAllText("debug.log", direction + ": " + BitConverter.ToString(data, offset, len).Replace("-", string.Empty) + "\r\n"); } catch (Exception) { } } }
|
||||
|
||||
public bool Start(MeshCentralServer parent, Uri url, string user, string pass, string token, string fingerprint)
|
||||
{
|
||||
if (state != 0) return false;
|
||||
parent.changeState(1);
|
||||
state = 1;
|
||||
this.parent = parent;
|
||||
this.url = url;
|
||||
this.user = user;
|
||||
this.pass = pass;
|
||||
this.token = token;
|
||||
this.proxyUri = null;
|
||||
|
||||
this.proxyUri = Win32Api.GetProxy(url);
|
||||
|
||||
if (proxyUri != null)
|
||||
{
|
||||
// Proxy in use
|
||||
proxyInUse = true;
|
||||
wsclient = new TcpClient();
|
||||
// This may log proxy password to debug log
|
||||
Debug("Connecting with proxy in use: " + proxyUri.ToString());
|
||||
wsclient.BeginConnect(proxyUri.Host, proxyUri.Port, new AsyncCallback(OnConnectSink), this);
|
||||
}
|
||||
else
|
||||
{
|
||||
// No proxy in use
|
||||
proxyInUse = false;
|
||||
wsclient = new TcpClient();
|
||||
Debug("Connecting without proxy");
|
||||
wsclient.BeginConnect(url.Host, url.Port, new AsyncCallback(OnConnectSink), this);
|
||||
}
|
||||
return true;
|
||||
}
|
||||
|
||||
private void OnConnectSink(IAsyncResult ar)
|
||||
{
|
||||
if (wsclient == null) return;
|
||||
|
||||
// Accept the connection
|
||||
try
|
||||
{
|
||||
wsclient.EndConnect(ar);
|
||||
} catch (Exception ex) {
|
||||
Debug("Websocket TCP failed to connect: " + ex.ToString());
|
||||
Dispose();
|
||||
return;
|
||||
}
|
||||
|
||||
if (proxyInUse == true)
|
||||
{
|
||||
// Send proxy connection request
|
||||
wsrawstream = wsclient.GetStream();
|
||||
string userCreds = proxyUri.UserInfo;
|
||||
string basicAuth = "";
|
||||
if (userCreds.Length > 0)
|
||||
{
|
||||
// Base64 encode for basic authentication
|
||||
userCreds = System.Convert.ToBase64String(Encoding.GetEncoding("ISO-8859-1").GetBytes(userCreds));
|
||||
basicAuth = "\r\nProxy-Authorization: Basic " + userCreds;
|
||||
}
|
||||
|
||||
byte[] proxyRequestBuf = UTF8Encoding.UTF8.GetBytes("CONNECT " + url.Host + ":" + url.Port + " HTTP/1.1\r\nHost: " + url.Host + ":" + url.Port + basicAuth + "\r\n\r\n");
|
||||
TlsDump("OutRaw", proxyRequestBuf, 0, proxyRequestBuf.Length);
|
||||
try { wsrawstream.Write(proxyRequestBuf, 0, proxyRequestBuf.Length); } catch (Exception ex) { Debug(ex.ToString()); }
|
||||
wsrawstream.BeginRead(readBuffer, readBufferLen, readBuffer.Length - readBufferLen, new AsyncCallback(OnProxyResponseSink), this);
|
||||
}
|
||||
else
|
||||
{
|
||||
// Start TLS connection
|
||||
Debug("Websocket TCP connected, doing TLS...");
|
||||
wsstream = new SslStream(wsclient.GetStream(), false, VerifyServerCertificate, null);
|
||||
wsstream.BeginAuthenticateAsClient(url.Host, null, System.Security.Authentication.SslProtocols.Tls12, false, new AsyncCallback(OnTlsSetupSink), this);
|
||||
}
|
||||
}
|
||||
|
||||
private void OnProxyResponseSink(IAsyncResult ar)
|
||||
{
|
||||
if (wsrawstream == null) return;
|
||||
|
||||
int len = 0;
|
||||
try { len = wsrawstream.EndRead(ar); } catch (Exception) { }
|
||||
if (len == 0)
|
||||
{
|
||||
// Disconnect
|
||||
Debug("Websocket proxy disconnected, length = 0.");
|
||||
Dispose();
|
||||
return;
|
||||
}
|
||||
|
||||
TlsDump("InRaw", readBuffer, 0, readBufferLen);
|
||||
|
||||
readBufferLen += len;
|
||||
string proxyResponse = UTF8Encoding.UTF8.GetString(readBuffer, 0, readBufferLen);
|
||||
if (proxyResponse.IndexOf("\r\n\r\n") >= 0)
|
||||
{
|
||||
// We get a full proxy response, we should get something like "HTTP/1.1 200 Connection established\r\n\r\n"
|
||||
if (proxyResponse.StartsWith("HTTP/1.1 200 "))
|
||||
{
|
||||
// All good, start TLS setup.
|
||||
readBufferLen = 0;
|
||||
Debug("Websocket TCP connected, doing TLS...");
|
||||
wsstream = new SslStream(wsrawstream, false, VerifyServerCertificate, null);
|
||||
wsstream.BeginAuthenticateAsClient(url.Host, null, System.Security.Authentication.SslProtocols.Tls12, false, new AsyncCallback(OnTlsSetupSink), this);
|
||||
}
|
||||
else
|
||||
{
|
||||
// Invalid response
|
||||
Debug("Proxy connection failed: " + proxyResponse);
|
||||
Dispose();
|
||||
}
|
||||
} else {
|
||||
if (readBufferLen == readBuffer.Length)
|
||||
{
|
||||
// Buffer overflow
|
||||
Debug("Proxy connection failed");
|
||||
Dispose();
|
||||
}
|
||||
else
|
||||
{
|
||||
// Read more proxy data
|
||||
wsrawstream.BeginRead(readBuffer, readBufferLen, readBuffer.Length - readBufferLen, new AsyncCallback(OnProxyResponseSink), this);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
public string Base64Encode(string plainText)
|
||||
{
|
||||
var plainTextBytes = System.Text.Encoding.UTF8.GetBytes(plainText);
|
||||
return System.Convert.ToBase64String(plainTextBytes);
|
||||
}
|
||||
|
||||
public string Base64Decode(string base64EncodedData)
|
||||
{
|
||||
var base64EncodedBytes = System.Convert.FromBase64String(base64EncodedData);
|
||||
return System.Text.Encoding.UTF8.GetString(base64EncodedBytes);
|
||||
}
|
||||
|
||||
private void OnTlsSetupSink(IAsyncResult ar)
|
||||
{
|
||||
if (wsstream == null) return;
|
||||
|
||||
// Accept the connection
|
||||
try
|
||||
{
|
||||
wsstream.EndAuthenticateAsClient(ar);
|
||||
}
|
||||
catch (Exception ex)
|
||||
{
|
||||
// Disconnect
|
||||
if (ex.InnerException != null) {
|
||||
MessageBox.Show(ex.Message + ", Inner: " + ex.InnerException.ToString(), "MeshCentral Router");
|
||||
} else {
|
||||
MessageBox.Show(ex.Message, "MeshCentral Router");
|
||||
}
|
||||
Debug("Websocket TLS failed: " + ex.ToString());
|
||||
Dispose();
|
||||
return;
|
||||
}
|
||||
|
||||
// Fetch remote certificate
|
||||
parent.wshash = wsstream.RemoteCertificate.GetCertHashString();
|
||||
|
||||
// Setup extra headers if needed
|
||||
string extraHeaders = "";
|
||||
if (user != null && pass != null && token != null) { extraHeaders = "x-meshauth: " + Base64Encode(user) + "," + Base64Encode(pass) + "," + Base64Encode(token) + "\r\n"; }
|
||||
else if (user != null && pass != null) { extraHeaders = "x-meshauth: " + Base64Encode(user) + "," + Base64Encode(pass) + "\r\n"; }
|
||||
|
||||
// Send the HTTP headers
|
||||
Debug("Websocket TLS setup, sending HTTP header...");
|
||||
string header = "GET " + url.PathAndQuery + " HTTP/1.1\r\nHost: " + url.Host + "\r\nUpgrade: websocket\r\nConnection: Upgrade\r\nSec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==\r\nSec-WebSocket-Version: 13\r\n" + extraHeaders + "\r\n";
|
||||
try { wsstream.Write(UTF8Encoding.UTF8.GetBytes(header)); } catch (Exception ex) { Debug(ex.ToString()); }
|
||||
|
||||
// Start receiving data
|
||||
wsstream.BeginRead(readBuffer, readBufferLen, readBuffer.Length - readBufferLen, new AsyncCallback(OnTlsDataSink), this);
|
||||
}
|
||||
|
||||
private void OnTlsDataSink(IAsyncResult ar)
|
||||
{
|
||||
if (wsstream == null) return;
|
||||
|
||||
int len = 0;
|
||||
try { len = wsstream.EndRead(ar); } catch (Exception) { }
|
||||
if (len == 0)
|
||||
{
|
||||
// Disconnect
|
||||
Debug("Websocket disconnected, length = 0.");
|
||||
Dispose();
|
||||
return;
|
||||
}
|
||||
//parent.Debug("#" + counter + ": Websocket got new data: " + len);
|
||||
readBufferLen += len;
|
||||
TlsDump("In", readBuffer, 0, len);
|
||||
|
||||
// Consume all of the data
|
||||
int consumed = 0;
|
||||
int ptr = 0;
|
||||
do
|
||||
{
|
||||
consumed = ProcessBuffer(readBuffer, ptr, readBufferLen - ptr);
|
||||
if (consumed < 0) { Dispose(); return; } // Error, close the connection
|
||||
ptr += consumed;
|
||||
} while ((consumed > 0) && ((readBufferLen - consumed) > 0));
|
||||
|
||||
// Move the data forward
|
||||
if ((ptr > 0) && (readBufferLen - ptr) > 0) {
|
||||
//Console.Write("MOVE FORWARD\r\n");
|
||||
Array.Copy(readBuffer, ptr, readBuffer, 0, (readBufferLen - ptr));
|
||||
}
|
||||
readBufferLen = (readBufferLen - ptr);
|
||||
|
||||
// If the buffer is too small, double the size here.
|
||||
if (readBuffer.Length - readBufferLen == 0)
|
||||
{
|
||||
Debug("Increasing the read buffer size from " + readBuffer.Length + " to " + (readBuffer.Length * 2) + ".");
|
||||
byte[] readBuffer2 = new byte[readBuffer.Length * 2];
|
||||
Array.Copy(readBuffer, 0, readBuffer2, 0, readBuffer.Length);
|
||||
readBuffer = readBuffer2;
|
||||
}
|
||||
|
||||
// Receive more data
|
||||
try { wsstream.BeginRead(readBuffer, readBufferLen, readBuffer.Length - readBufferLen, new AsyncCallback(OnTlsDataSink), this); } catch (Exception) { }
|
||||
}
|
||||
|
||||
private int ProcessBuffer(byte[] buffer, int offset, int len)
|
||||
{
|
||||
string ss = UTF8Encoding.UTF8.GetString(buffer, offset, len);
|
||||
|
||||
if (state == 1)
|
||||
{
|
||||
// Look for the end of the http header
|
||||
string header = UTF8Encoding.UTF8.GetString(buffer, offset, len);
|
||||
int i = header.IndexOf("\r\n\r\n");
|
||||
if (i == -1) return 0;
|
||||
Dictionary<string, string> parsedHeader = ParseHttpHeader(header.Substring(0, i));
|
||||
if ((parsedHeader == null) || (parsedHeader["_Path"] != "101")) { Debug("Websocket bad header."); return -1; } // Bad header, close the connection
|
||||
Debug("Websocket got setup upgrade header.");
|
||||
state = 2;
|
||||
return len; // TODO: Technically we need to return the header length before UTF8 convert.
|
||||
} else if (state == 2) {
|
||||
// Parse a websocket fragment header
|
||||
if (len < 2) return 0;
|
||||
int headsize = 2;
|
||||
accopcodes = buffer[offset];
|
||||
accmask = ((buffer[offset + 1] & 0x80) != 0);
|
||||
acclen = (buffer[offset + 1] & 0x7F);
|
||||
|
||||
if ((accopcodes & 0x0F) == 8)
|
||||
{
|
||||
// Close the websocket
|
||||
Debug("Websocket got closed fragment.");
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (acclen == 126)
|
||||
{
|
||||
if (len < 4) return 0;
|
||||
headsize = 4;
|
||||
acclen = (buffer[offset + 2] << 8) + (buffer[offset + 3]);
|
||||
}
|
||||
else if (acclen == 127)
|
||||
{
|
||||
if (len < 10) return 0;
|
||||
headsize = 10;
|
||||
acclen = (buffer[offset + 6] << 24) + (buffer[offset + 7] << 16) + (buffer[offset + 8] << 8) + (buffer[offset + 9]);
|
||||
Debug("Websocket receive large fragment: " + acclen);
|
||||
}
|
||||
if (accmask == true)
|
||||
{
|
||||
// TODO: Do unmasking here.
|
||||
headsize += 4;
|
||||
}
|
||||
//parent.Debug("#" + counter + ": Websocket frag header - FIN: " + ((accopcodes & 0x80) != 0) + ", OP: " + (accopcodes & 0x0F) + ", LEN: " + acclen + ", MASK: " + accmask);
|
||||
state = 3;
|
||||
return headsize;
|
||||
}
|
||||
else if (state == 3)
|
||||
{
|
||||
// Parse a websocket fragment data
|
||||
if (len < acclen) return 0;
|
||||
//Console.Write("WSREAD: " + acclen + "\r\n");
|
||||
ProcessWsBuffer(buffer, offset, acclen, accopcodes);
|
||||
state = 2;
|
||||
return acclen;
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
private void ProcessWsBuffer(byte[] data, int offset, int len, int op)
|
||||
{
|
||||
Debug("Websocket got data.");
|
||||
//try { parent.processServerData(UTF8Encoding.UTF8.GetString(data, offset, len)); } catch (Exception ex) { }
|
||||
parent.processServerData(UTF8Encoding.UTF8.GetString(data, offset, len));
|
||||
}
|
||||
|
||||
private Dictionary<string, string> ParseHttpHeader(string header)
|
||||
{
|
||||
string[] lines = header.Replace("\r\n", "\r").Split('\r');
|
||||
if (lines.Length < 2) { return null; }
|
||||
string[] directive = lines[0].Split(' ');
|
||||
Dictionary<string, string> values = new Dictionary<string, string>();
|
||||
values["_Action"] = directive[0];
|
||||
values["_Path"] = directive[1];
|
||||
values["_Protocol"] = directive[2];
|
||||
for (int i = 1; i < lines.Length; i++)
|
||||
{
|
||||
var j = lines[i].IndexOf(":");
|
||||
values[lines[i].Substring(0, j).ToLower()] = lines[i].Substring(j + 1).Trim();
|
||||
}
|
||||
return values;
|
||||
}
|
||||
|
||||
// Return a modified base64 SHA384 hash string of the certificate public key
|
||||
public static string GetMeshKeyHash(X509Certificate cert)
|
||||
{
|
||||
return ByteArrayToHexString(new SHA384Managed().ComputeHash(cert.GetPublicKey()));
|
||||
}
|
||||
|
||||
// Return a modified base64 SHA384 hash string of the certificate
|
||||
public static string GetMeshCertHash(X509Certificate cert)
|
||||
{
|
||||
return ByteArrayToHexString(new SHA384Managed().ComputeHash(cert.GetRawCertData()));
|
||||
}
|
||||
|
||||
public static string ByteArrayToHexString(byte[] Bytes)
|
||||
{
|
||||
StringBuilder Result = new StringBuilder(Bytes.Length * 2);
|
||||
string HexAlphabet = "0123456789ABCDEF";
|
||||
foreach (byte B in Bytes) { Result.Append(HexAlphabet[(int)(B >> 4)]); Result.Append(HexAlphabet[(int)(B & 0xF)]); }
|
||||
return Result.ToString();
|
||||
}
|
||||
|
||||
private bool VerifyServerCertificate(object sender, X509Certificate certificate, X509Chain chain, SslPolicyErrors sslPolicyErrors)
|
||||
{
|
||||
parent.certHash = GetMeshKeyHash(certificate);
|
||||
Debug("Verify cert: " + parent.certHash);
|
||||
if (xignoreCert) return true;
|
||||
if (chain.Build(new X509Certificate2(certificate)) == true) return true;
|
||||
|
||||
// Check that the remote certificate is the expected one
|
||||
if ((parent.okCertHash != null) && (parent.okCertHash == certificate.GetCertHashString())) return true;
|
||||
|
||||
// Check that the remote certificate is the expected one
|
||||
if ((parent.okCertHash2 != null) && ((parent.okCertHash2 == GetMeshKeyHash(certificate)) || (parent.okCertHash2 == GetMeshCertHash(certificate)))) { return true; }
|
||||
|
||||
parent.certHash = null;
|
||||
parent.disconnectMsg = "cert";
|
||||
parent.disconnectCert = new X509Certificate2(certificate);
|
||||
return false;
|
||||
}
|
||||
|
||||
public void WriteStringWebSocket(string data)
|
||||
{
|
||||
// Convert the string into a buffer with 4 byte of header space.
|
||||
int len = UTF8Encoding.UTF8.GetByteCount(data);
|
||||
byte[] buf = new byte[4 + len];
|
||||
UTF8Encoding.UTF8.GetBytes(data, 0, data.Length, buf, 4);
|
||||
len = buf.Length - 4;
|
||||
|
||||
// Check that everything is ok
|
||||
if ((state < 2) || (len < 1) || (len > 65535)) { Dispose(); return; }
|
||||
|
||||
//Console.Write("Length: " + len + "\r\n");
|
||||
//System.Threading.Thread.Sleep(0);
|
||||
|
||||
if (len < 126)
|
||||
{
|
||||
// Small fragment
|
||||
buf[2] = 130; // Fragment op code (129 = text, 130 = binary)
|
||||
buf[3] = (byte)(len & 0x7F);
|
||||
//try { wsstream.BeginWrite(buf, 2, len + 2, new AsyncCallback(WriteWebSocketAsyncDone), args); } catch (Exception) { Dispose(); return; }
|
||||
TlsDump("Out", buf, 2, len + 2);
|
||||
try { wsstream.Write(buf, 2, len + 2); } catch (Exception ex) { Debug(ex.ToString()); }
|
||||
}
|
||||
else
|
||||
{
|
||||
// Large fragment
|
||||
buf[0] = 130; // Fragment op code (129 = text, 130 = binary)
|
||||
buf[1] = 126;
|
||||
buf[2] = (byte)((len >> 8) & 0xFF);
|
||||
buf[3] = (byte)(len & 0xFF);
|
||||
//try { wsstream.BeginWrite(buf, 0, len + 4, new AsyncCallback(WriteWebSocketAsyncDone), args); } catch (Exception) { Dispose(); return; }
|
||||
TlsDump("Out", buf, 0, len + 4);
|
||||
try { wsstream.Write(buf, 0, len + 4); } catch (Exception ex) { Debug(ex.ToString()); }
|
||||
}
|
||||
}
|
||||
var plainTextBytes = System.Text.Encoding.UTF8.GetBytes(plainText);
|
||||
return System.Convert.ToBase64String(plainTextBytes);
|
||||
}
|
||||
|
||||
public string Base64Decode(string base64EncodedData)
|
||||
|
||||
Reference in New Issue
Block a user