tor-resolve.c 4.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202
  1. /* Copyright 2004 Nick Mathewson */
  2. /* See LICENSE for licensing information */
  3. /* $Id$ */
  4. #include "orconfig.h"
  5. #include "../common/util.h"
  6. #include "../common/log.h"
  7. #include <stdio.h>
  8. #include <stdlib.h>
  9. #include <stdarg.h>
  10. #include <string.h>
  11. #include <assert.h>
  12. #ifdef HAVE_NETINET_IN_H
  13. #include <netinet/in.h>
  14. #endif
  15. #ifdef HAVE_ARPA_INET_H
  16. #include <arpa/inet.h>
  17. #endif
  18. #ifdef HAVE_SYS_SOCKET_H
  19. #include <sys/socket.h>
  20. #endif
  21. #ifdef HAVE_SYS_TYPES_H
  22. #include <sys/types.h> /* Must be included before sys/stat.h for Ultrix */
  23. #endif
  24. #ifdef HAVE_ERRNO_H
  25. #include <errno.h>
  26. #endif
  27. #ifdef MS_WINDOWS
  28. #if (_MSC_VER <= 1300)
  29. #include <winsock.h>
  30. #else
  31. #include <winsock2.h>
  32. #include <ws2tcpip.h>
  33. #endif
  34. #endif
  35. #define RESPONSE_LEN 8
  36. #define log_sock_error(act, _s) \
  37. do { log_fn(LOG_ERR, "Error while %s: %s", act, \
  38. tor_socket_strerror(tor_socket_errno(_s))); } while(0)
  39. int build_socks4a_resolve_request(char **out,
  40. const char *username,
  41. const char *hostname)
  42. {
  43. size_t len;
  44. tor_assert(out);
  45. tor_assert(username);
  46. tor_assert(hostname);
  47. len = 8 + strlen(username) + 1 + strlen(hostname) + 1;
  48. *out = tor_malloc(len);
  49. (*out)[0] = 4; /* SOCKS version 4 */
  50. (*out)[1] = 0xF0; /* Command: resolve. */
  51. set_uint16((*out)+2, htons(0)); /* port: 0. */
  52. set_uint32((*out)+4, htonl(0x00000001u)); /* addr: 0.0.0.1 */
  53. strcpy((*out)+8, username);
  54. strcpy((*out)+8+strlen(username)+1, hostname);
  55. return len;
  56. }
  57. int parse_socks4a_resolve_response(const char *response, size_t len,
  58. uint32_t *addr_out)
  59. {
  60. uint8_t status;
  61. tor_assert(response);
  62. tor_assert(addr_out);
  63. if (len < RESPONSE_LEN)
  64. return -1;
  65. if (((uint8_t)response[0])!=0) /* version: 0 */
  66. return -1;
  67. status = (uint8_t)response[1];
  68. if (get_uint16(response+2)!=0) /* port: 0 */
  69. return -1;
  70. if (status != 90)
  71. return -1;
  72. *addr_out = ntohl(get_uint32(response+4));
  73. return 0;
  74. }
  75. int do_resolve(const char *hostname, uint32_t sockshost, uint16_t socksport,
  76. uint32_t *result_addr)
  77. {
  78. int s;
  79. struct sockaddr_in socksaddr;
  80. char *req, *cp;
  81. int r, len;
  82. char response_buf[RESPONSE_LEN];
  83. tor_assert(hostname);
  84. tor_assert(result_addr);
  85. s = socket(PF_INET,SOCK_STREAM,IPPROTO_TCP);
  86. if (s<0) {
  87. log_sock_error("creating_socket", -1);
  88. return -1;
  89. }
  90. memset(&socksaddr, 0, sizeof(socksaddr));
  91. socksaddr.sin_family = AF_INET;
  92. socksaddr.sin_port = htons(socksport);
  93. socksaddr.sin_addr.s_addr = htonl(sockshost);
  94. if (connect(s, (struct sockaddr*)&socksaddr, sizeof(socksaddr))) {
  95. log_sock_error("connecting to SOCKS host", s);
  96. return -1;
  97. }
  98. if ((len = build_socks4a_resolve_request(&req, "", hostname))<0) {
  99. log_fn(LOG_ERR, "Error generating SOCKS request");
  100. return -1;
  101. }
  102. cp = req;
  103. while (len) {
  104. r = send(s, cp, len, 0);
  105. if (r<0) {
  106. log_sock_error("sending SOCKS request", s);
  107. tor_free(req);
  108. return -1;
  109. }
  110. len -= r;
  111. cp += r;
  112. }
  113. tor_free(req);
  114. len = 0;
  115. while (len < RESPONSE_LEN) {
  116. r = recv(s, response_buf+len, RESPONSE_LEN-len, 0);
  117. if (r<0) {
  118. log_sock_error("reading SOCKS response", s);
  119. return -1;
  120. }
  121. len += r;
  122. }
  123. if (parse_socks4a_resolve_response(response_buf, RESPONSE_LEN,result_addr)<0){
  124. log_fn(LOG_ERR, "Error parsing SOCKS response");
  125. return -1;
  126. }
  127. return 0;
  128. }
  129. void usage(void)
  130. {
  131. puts("Syntax: tor-resolve [-v] hostname [sockshost:socksport]");
  132. exit(1);
  133. }
  134. int
  135. main(int argc, char **argv)
  136. {
  137. uint32_t sockshost;
  138. uint16_t socksport;
  139. char **arg;
  140. int n_args;
  141. struct in_addr a;
  142. uint32_t result;
  143. arg = &argv[1];
  144. n_args = argc-1;
  145. if (argc < 2)
  146. usage();
  147. if (!strcmp("-v", arg[0])) {
  148. add_stream_log(LOG_DEBUG, LOG_ERR, "<stderr>", stderr);
  149. ++arg; --n_args;
  150. } else {
  151. add_stream_log(LOG_WARN, LOG_ERR, "<stderr>", stderr);
  152. }
  153. if (n_args == 1) {
  154. log_fn(LOG_DEBUG, "defaulting to localhost:9050");
  155. sockshost = 0x7f000001u; /* localhost */
  156. socksport = 9050; /* 9050 */
  157. } else if (n_args == 2) {
  158. if (parse_addr_port(arg[1], NULL, &sockshost, &socksport)<0) {
  159. fprintf(stderr, "Couldn't parse/resolve address %s", arg[1]);
  160. return 1;
  161. }
  162. if (socksport == 0) {
  163. log_fn(LOG_DEBUG, "defaulting to port 9050");
  164. socksport = 9050;
  165. }
  166. } else {
  167. usage();
  168. }
  169. if (do_resolve(arg[0], sockshost, socksport, &result))
  170. return 1;
  171. a.s_addr = htonl(result);
  172. printf("%s\n", inet_ntoa(a));
  173. return 0;
  174. }