forked from shaba/openuds
added new tunnel server client
This commit is contained in:
parent
2fd1dc5fc9
commit
7ae9df21a5
224
client-py3/full/src/uds/tunnel.py
Normal file
224
client-py3/full/src/uds/tunnel.py
Normal file
@ -0,0 +1,224 @@
|
|||||||
|
# -*- coding: utf-8 -*-
|
||||||
|
#
|
||||||
|
# Copyright (c) 2020 Virtual Cable S.L.U.
|
||||||
|
# All rights reserved.
|
||||||
|
#
|
||||||
|
# Redistribution and use in source and binary forms, with or without modification,
|
||||||
|
# are permitted provided that the following conditions are met:
|
||||||
|
#
|
||||||
|
# * Redistributions of source code must retain the above copyright notice,
|
||||||
|
# this list of conditions and the following disclaimer.
|
||||||
|
# * Redistributions in binary form must reproduce the above copyright notice,
|
||||||
|
# this list of conditions and the following disclaimer in the documentation
|
||||||
|
# and/or other materials provided with the distribution.
|
||||||
|
# * Neither the name of Virtual Cable S.L. nor the names of its contributors
|
||||||
|
# may be used to endorse or promote products derived from this software
|
||||||
|
# without specific prior written permission.
|
||||||
|
#
|
||||||
|
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
||||||
|
# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
||||||
|
# DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
|
||||||
|
# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||||
|
# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
|
||||||
|
# SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
|
||||||
|
# CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
|
||||||
|
# OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
||||||
|
# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
'''
|
||||||
|
@author: Adolfo Gómez, dkmaster at dkmon dot com
|
||||||
|
'''
|
||||||
|
import socket
|
||||||
|
import socketserver
|
||||||
|
import ssl
|
||||||
|
import threading
|
||||||
|
import time
|
||||||
|
import threading
|
||||||
|
import select
|
||||||
|
import typing
|
||||||
|
import logging
|
||||||
|
|
||||||
|
HANDSHAKE_V1 = b'\x5AMGB\xA5\x01\x00'
|
||||||
|
BUFFER_SIZE = 1024 * 16 # Max buffer length
|
||||||
|
DEBUG = True
|
||||||
|
LISTEN_ADDRESS = '0.0.0.0' if DEBUG else '127.0.0.1'
|
||||||
|
|
||||||
|
# ForwarServer states
|
||||||
|
TUNNEL_LISTENING, TUNNEL_OPENING, TUNNEL_PROCESSING, TUNNEL_ERROR = 0, 1, 2, 3
|
||||||
|
|
||||||
|
logger = logging.getLogger(__name__)
|
||||||
|
|
||||||
|
class ForwardServer(socketserver.ThreadingTCPServer):
|
||||||
|
daemon_threads = True
|
||||||
|
allow_reuse_address = True
|
||||||
|
|
||||||
|
remote: typing.Tuple[str, int]
|
||||||
|
ticket: str
|
||||||
|
stop_flag: threading.Event
|
||||||
|
timeout: int
|
||||||
|
timer: typing.Optional[threading.Timer]
|
||||||
|
check_certificate: bool
|
||||||
|
current_connections: int
|
||||||
|
status: int
|
||||||
|
|
||||||
|
def __init__(
|
||||||
|
self,
|
||||||
|
remote: typing.Tuple[str, int],
|
||||||
|
ticket: str,
|
||||||
|
timeout: int = 0,
|
||||||
|
local_port: int = 0,
|
||||||
|
check_certificate: bool = True,
|
||||||
|
) -> None:
|
||||||
|
super().__init__(
|
||||||
|
server_address=(LISTEN_ADDRESS, local_port), RequestHandlerClass=Handler
|
||||||
|
)
|
||||||
|
self.remote = remote
|
||||||
|
self.ticket = ticket
|
||||||
|
self.timeout = int(time.time()) + timeout if timeout else 0
|
||||||
|
self.check_certificate = check_certificate
|
||||||
|
self.stop_flag = threading.Event() # False initial
|
||||||
|
self.current_connections = 0
|
||||||
|
|
||||||
|
self.status = TUNNEL_LISTENING
|
||||||
|
|
||||||
|
if timeout:
|
||||||
|
self.timer = threading.Timer(timeout, ForwardServer.__checkStarted, args=(self,))
|
||||||
|
self.timer.start()
|
||||||
|
else:
|
||||||
|
self.timer = None
|
||||||
|
|
||||||
|
def stop(self) -> None:
|
||||||
|
if not self.stop_flag.is_set():
|
||||||
|
logger.debug('Stopping servers')
|
||||||
|
self.stop_flag.set()
|
||||||
|
if self.timer:
|
||||||
|
self.timer.cancel()
|
||||||
|
self.timer = None
|
||||||
|
self.shutdown()
|
||||||
|
|
||||||
|
@property
|
||||||
|
def stoppable(self) -> bool:
|
||||||
|
return self.timeout != 0 and int(time.time()) > self.timeout
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def __checkStarted(fs: 'ForwardServer') -> None:
|
||||||
|
fs.timer = None
|
||||||
|
if fs.current_connections <= 0:
|
||||||
|
fs.stop()
|
||||||
|
|
||||||
|
|
||||||
|
class Handler(socketserver.BaseRequestHandler):
|
||||||
|
# Override Base type
|
||||||
|
server: ForwardServer
|
||||||
|
|
||||||
|
# server: ForwardServer
|
||||||
|
def handle(self) -> None:
|
||||||
|
self.server.current_connections += 1
|
||||||
|
self.server.status = TUNNEL_OPENING
|
||||||
|
|
||||||
|
# If server processing is over time
|
||||||
|
if self.server.stoppable:
|
||||||
|
logger.info('Rejected timedout connection try')
|
||||||
|
self.request.close() # End connection without processing it
|
||||||
|
return
|
||||||
|
|
||||||
|
# Open remote connection
|
||||||
|
try:
|
||||||
|
with socket.socket(socket.AF_INET, socket.SOCK_STREAM) as rsocket:
|
||||||
|
logger.info('CONNECT to %s', self.server.remote)
|
||||||
|
logger.debug('Ticket %s', self.server.remote, self.server.ticket)
|
||||||
|
|
||||||
|
rsocket.connect(self.server.remote)
|
||||||
|
|
||||||
|
context = ssl.create_default_context()
|
||||||
|
|
||||||
|
# If ignore remote certificate
|
||||||
|
if self.server.check_certificate is False:
|
||||||
|
context.check_hostname = False
|
||||||
|
context.verify_mode = ssl.CERT_NONE
|
||||||
|
logger.warning('Certificate checking is disabled!')
|
||||||
|
|
||||||
|
with context.wrap_socket(
|
||||||
|
rsocket, server_hostname=self.server.remote[0]
|
||||||
|
) as ssl_socket:
|
||||||
|
# Send handhshake + command + ticket
|
||||||
|
ssl_socket.sendall(
|
||||||
|
HANDSHAKE_V1 + b'OPEN' + self.server.ticket.encode()
|
||||||
|
)
|
||||||
|
# Check response is OK
|
||||||
|
data = ssl_socket.recv(2)
|
||||||
|
if data != b'OK':
|
||||||
|
data += ssl_socket.recv(128)
|
||||||
|
raise Exception(f'Error received: {data.decode()}') # Notify error
|
||||||
|
|
||||||
|
# All is fine, now we can tunnel data
|
||||||
|
self.process(remote=ssl_socket)
|
||||||
|
except Exception as e:
|
||||||
|
logger.error(f'Error connecting to {self.server.remote!s}: {e!s}')
|
||||||
|
self.server.status = TUNNEL_ERROR
|
||||||
|
self.server.stop()
|
||||||
|
finally:
|
||||||
|
self.server.current_connections -= 1
|
||||||
|
|
||||||
|
if self.server.current_connections <= 0 and self.server.stoppable:
|
||||||
|
self.server.stop()
|
||||||
|
|
||||||
|
# Processes data forwarding
|
||||||
|
def process(self, remote: ssl.SSLSocket):
|
||||||
|
self.server.status = TUNNEL_PROCESSING
|
||||||
|
logger.debug('Processing tunnel with ticket %s', self.server.ticket)
|
||||||
|
# Process data until stop requested or connection closed
|
||||||
|
try:
|
||||||
|
while not self.server.stop_flag.is_set():
|
||||||
|
r, _w, _x = select.select([self.request, remote], [], [], 1.0)
|
||||||
|
if self.request in r:
|
||||||
|
data = self.request.recv(BUFFER_SIZE)
|
||||||
|
if not data:
|
||||||
|
break
|
||||||
|
remote.sendall(data)
|
||||||
|
if remote in r:
|
||||||
|
data = remote.recv(BUFFER_SIZE)
|
||||||
|
if not data:
|
||||||
|
break
|
||||||
|
self.request.sendall(data)
|
||||||
|
logger.debug('Finished tunnel with ticekt %s', self.server.ticket)
|
||||||
|
except Exception as e:
|
||||||
|
pass
|
||||||
|
|
||||||
|
def _run(server: ForwardServer) -> None:
|
||||||
|
logger.debug('Starting forwarder: %s -> %s, timeout: %d', server.server_address, server.remote, server.timeout)
|
||||||
|
server.serve_forever()
|
||||||
|
logger.debug('Stoped forwarded %s -> %s', server.server_address, server.remote)
|
||||||
|
|
||||||
|
def forward(
|
||||||
|
remote: typing.Tuple[str, int],
|
||||||
|
ticket: str,
|
||||||
|
timeout: int = 0,
|
||||||
|
local_port: int = 0,
|
||||||
|
check_certificate=True,
|
||||||
|
) -> ForwardServer:
|
||||||
|
fs = ForwardServer(
|
||||||
|
remote=remote,
|
||||||
|
ticket=ticket,
|
||||||
|
timeout=timeout,
|
||||||
|
local_port=local_port,
|
||||||
|
check_certificate=check_certificate,
|
||||||
|
)
|
||||||
|
# Starts a new thread
|
||||||
|
threading.Thread(target=_run, args=(fs,)).start()
|
||||||
|
|
||||||
|
return fs
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
import sys
|
||||||
|
log = logging.getLogger()
|
||||||
|
log.setLevel(logging.DEBUG)
|
||||||
|
handler = logging.StreamHandler(sys.stdout)
|
||||||
|
handler.setLevel(logging.DEBUG)
|
||||||
|
formatter = logging.Formatter(
|
||||||
|
'%(levelname)s - %(message)s'
|
||||||
|
) # Basic log format, nice for syslog
|
||||||
|
handler.setFormatter(formatter)
|
||||||
|
log.addHandler(handler)
|
||||||
|
|
||||||
|
fs = forward(('172.27.0.1', 7777), '1'*64, local_port=49999, timeout=10, check_certificate=False)
|
Loading…
Reference in New Issue
Block a user