2012-06-03 17:56:56 +00:00
|
|
|
import logging
|
2013-01-23 10:18:27 +00:00
|
|
|
import threading
|
|
|
|
import socket
|
2012-06-03 17:56:56 +00:00
|
|
|
|
|
|
|
from hashlib import sha1
|
|
|
|
from uuid import uuid4
|
|
|
|
|
2013-01-23 10:18:27 +00:00
|
|
|
from sleekxmpp.thirdparty.socks import socksocket, PROXY_TYPE_SOCKS5
|
2012-06-07 17:02:09 +00:00
|
|
|
|
2013-01-23 10:18:27 +00:00
|
|
|
from sleekxmpp.stanza import Iq
|
|
|
|
from sleekxmpp.exceptions import XMPPError
|
|
|
|
from sleekxmpp.xmlstream import register_stanza_plugin
|
2012-06-03 17:56:56 +00:00
|
|
|
from sleekxmpp.xmlstream.handler import Callback
|
|
|
|
from sleekxmpp.xmlstream.matcher import StanzaPath
|
2013-01-23 10:18:27 +00:00
|
|
|
from sleekxmpp.plugins.base import base_plugin
|
|
|
|
|
|
|
|
from sleekxmpp.plugins.xep_0065 import stanza, Socks5
|
|
|
|
|
2012-06-03 17:56:56 +00:00
|
|
|
|
|
|
|
log = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
|
2012-06-10 21:15:58 +00:00
|
|
|
class XEP_0065(base_plugin):
|
2012-06-03 17:56:56 +00:00
|
|
|
|
2012-06-07 17:08:20 +00:00
|
|
|
name = 'xep_0065'
|
2013-01-23 10:18:27 +00:00
|
|
|
description = "Socks5 Bytestreams"
|
|
|
|
dependencies = set(['xep_0030'])
|
2013-02-19 09:00:04 +00:00
|
|
|
default_config = {
|
|
|
|
'auto_accept': False
|
|
|
|
}
|
2012-06-04 17:39:48 +00:00
|
|
|
|
2012-06-03 17:56:56 +00:00
|
|
|
def plugin_init(self):
|
2013-01-23 10:18:27 +00:00
|
|
|
register_stanza_plugin(Iq, Socks5)
|
2012-06-03 17:56:56 +00:00
|
|
|
|
2013-01-23 10:18:27 +00:00
|
|
|
self._proxies = {}
|
|
|
|
self._sessions = {}
|
|
|
|
self._sessions_lock = threading.Lock()
|
2012-06-03 17:56:56 +00:00
|
|
|
|
2013-02-19 09:00:04 +00:00
|
|
|
self._preauthed_sids_lock = threading.Lock()
|
|
|
|
self._preauthed_sids = {}
|
|
|
|
|
2013-01-23 10:18:27 +00:00
|
|
|
self.xmpp.register_handler(
|
2012-06-07 17:04:24 +00:00
|
|
|
Callback('Socks5 Bytestreams',
|
2012-06-07 17:14:37 +00:00
|
|
|
StanzaPath('iq@type=set/socks/streamhost'),
|
2012-06-03 17:56:56 +00:00
|
|
|
self._handle_streamhost))
|
|
|
|
|
2013-02-19 09:00:04 +00:00
|
|
|
self.api.register(self._authorized, 'authorized', default=True)
|
|
|
|
self.api.register(self._authorized_sid, 'authorized_sid', default=True)
|
|
|
|
self.api.register(self._preauthorize_sid, 'preauthorize_sid', default=True)
|
|
|
|
|
2013-01-23 10:18:27 +00:00
|
|
|
def session_bind(self, jid):
|
|
|
|
self.xmpp['xep_0030'].add_feature(Socks5.namespace)
|
2012-06-03 17:56:56 +00:00
|
|
|
|
2013-01-23 10:18:27 +00:00
|
|
|
def plugin_end(self):
|
|
|
|
self.xmpp.remove_handler('Socks5 Bytestreams')
|
|
|
|
self.xmpp.remove_handler('Socks5 Streamhost Used')
|
|
|
|
self.xmpp['xep_0030'].del_feature(feature=Socks5.namespace)
|
2012-06-07 17:36:25 +00:00
|
|
|
|
2013-01-23 10:18:27 +00:00
|
|
|
def get_socket(self, sid):
|
|
|
|
"""Returns the socket associated to the SID."""
|
|
|
|
return self._sessions.get(sid, None)
|
2012-06-07 17:36:25 +00:00
|
|
|
|
2013-02-19 09:00:04 +00:00
|
|
|
def handshake(self, to, ifrom=None, sid=None, timeout=None):
|
2012-06-03 17:56:56 +00:00
|
|
|
""" Starts the handshake to establish the socks5 bytestreams
|
|
|
|
connection.
|
|
|
|
"""
|
2013-01-23 10:18:27 +00:00
|
|
|
if not self._proxies:
|
|
|
|
self._proxies = self.discover_proxies()
|
2012-06-03 17:56:56 +00:00
|
|
|
|
2013-02-19 09:00:04 +00:00
|
|
|
if sid is None:
|
|
|
|
sid = uuid4().hex
|
2012-06-03 17:56:56 +00:00
|
|
|
|
2013-01-23 10:18:27 +00:00
|
|
|
used = self.request_stream(to, sid=sid, ifrom=ifrom, timeout=timeout)
|
|
|
|
proxy = used['socks']['streamhost_used']['jid']
|
2012-06-03 17:56:56 +00:00
|
|
|
|
2013-01-23 10:18:27 +00:00
|
|
|
if proxy not in self._proxies:
|
|
|
|
log.warning('Received unknown SOCKS5 proxy: %s', proxy)
|
|
|
|
return
|
|
|
|
|
|
|
|
with self._sessions_lock:
|
|
|
|
self._sessions[sid] = self._connect_proxy(
|
|
|
|
sid,
|
|
|
|
self.xmpp.boundjid,
|
|
|
|
to,
|
|
|
|
self._proxies[proxy][0],
|
2013-02-19 09:00:04 +00:00
|
|
|
self._proxies[proxy][1],
|
|
|
|
peer=to)
|
2013-01-23 10:18:27 +00:00
|
|
|
|
|
|
|
# Request that the proxy activate the session with the target.
|
|
|
|
self.activate(proxy, sid, to, timeout=timeout)
|
2014-01-26 15:48:31 +00:00
|
|
|
socket = self.get_socket(sid)
|
|
|
|
self.xmpp.event('stream:%s:%s' % (sid, to), socket)
|
|
|
|
return socket
|
2012-06-03 17:56:56 +00:00
|
|
|
|
2013-01-23 10:18:27 +00:00
|
|
|
def request_stream(self, to, sid=None, ifrom=None, block=True, timeout=None, callback=None):
|
|
|
|
if sid is None:
|
|
|
|
sid = uuid4().hex
|
|
|
|
|
|
|
|
# Requester initiates S5B negotiation with Target by sending
|
2012-06-03 17:56:56 +00:00
|
|
|
# IQ-set that includes the JabberID and network address of
|
|
|
|
# StreamHost as well as the StreamID (SID) of the proposed
|
|
|
|
# bytestream.
|
2013-01-23 10:18:27 +00:00
|
|
|
iq = self.xmpp.Iq()
|
|
|
|
iq['to'] = to
|
|
|
|
iq['from'] = ifrom
|
|
|
|
iq['type'] = 'set'
|
2012-06-07 17:14:37 +00:00
|
|
|
iq['socks']['sid'] = sid
|
2013-01-23 10:18:27 +00:00
|
|
|
for proxy, (host, port) in self._proxies.items():
|
|
|
|
iq['socks'].add_streamhost(proxy, host, port)
|
|
|
|
return iq.send(block=block, timeout=timeout, callback=callback)
|
2012-06-03 17:56:56 +00:00
|
|
|
|
2013-01-23 10:18:27 +00:00
|
|
|
def discover_proxies(self, jid=None, ifrom=None, timeout=None):
|
|
|
|
"""Auto-discover the JIDs of SOCKS5 proxies on an XMPP server."""
|
|
|
|
if jid is None:
|
|
|
|
if self.xmpp.is_component:
|
|
|
|
jid = self.xmpp.server
|
|
|
|
else:
|
|
|
|
jid = self.xmpp.boundjid.server
|
2012-06-03 17:56:56 +00:00
|
|
|
|
2013-01-23 10:18:27 +00:00
|
|
|
discovered = set()
|
2012-06-03 17:56:56 +00:00
|
|
|
|
2013-01-23 10:18:27 +00:00
|
|
|
disco_items = self.xmpp['xep_0030'].get_items(jid, timeout=timeout)
|
2012-06-03 17:56:56 +00:00
|
|
|
|
|
|
|
for item in disco_items['disco_items']['items']:
|
2013-01-23 10:18:27 +00:00
|
|
|
try:
|
|
|
|
disco_info = self.xmpp['xep_0030'].get_info(item[0], timeout=timeout)
|
|
|
|
except XMPPError:
|
|
|
|
continue
|
|
|
|
else:
|
|
|
|
# Verify that the identity is a bytestream proxy.
|
|
|
|
identities = disco_info['disco_info']['identities']
|
|
|
|
for identity in identities:
|
|
|
|
if identity[0] == 'proxy' and identity[1] == 'bytestreams':
|
|
|
|
discovered.add(disco_info['from'])
|
|
|
|
|
|
|
|
for jid in discovered:
|
|
|
|
try:
|
|
|
|
addr = self.get_network_address(jid, ifrom=ifrom, timeout=timeout)
|
|
|
|
self._proxies[jid] = (addr['socks']['streamhost']['host'],
|
|
|
|
addr['socks']['streamhost']['port'])
|
|
|
|
except XMPPError:
|
|
|
|
continue
|
|
|
|
|
|
|
|
return self._proxies
|
|
|
|
|
|
|
|
def get_network_address(self, proxy, ifrom=None, block=True, timeout=None, callback=None):
|
|
|
|
"""Get the network information of a proxy."""
|
|
|
|
iq = self.xmpp.Iq(sto=proxy, stype='get', sfrom=ifrom)
|
|
|
|
iq.enable('socks')
|
|
|
|
return iq.send(block=block, timeout=timeout, callback=callback)
|
2012-06-03 17:56:56 +00:00
|
|
|
|
|
|
|
def _handle_streamhost(self, iq):
|
2013-01-23 10:18:27 +00:00
|
|
|
"""Handle incoming SOCKS5 session request."""
|
2012-06-07 17:14:37 +00:00
|
|
|
sid = iq['socks']['sid']
|
2013-01-23 10:18:27 +00:00
|
|
|
if not sid:
|
2013-02-19 09:00:04 +00:00
|
|
|
raise XMPPError(etype='modify', condition='bad-request')
|
|
|
|
|
|
|
|
if not self._accept_stream(iq):
|
2013-01-23 10:18:27 +00:00
|
|
|
raise XMPPError(etype='modify', condition='not-acceptable')
|
|
|
|
|
|
|
|
streamhosts = iq['socks']['streamhosts']
|
|
|
|
conn = None
|
|
|
|
used_streamhost = None
|
|
|
|
|
2013-02-19 09:00:04 +00:00
|
|
|
sender = iq['from']
|
2013-01-23 10:18:27 +00:00
|
|
|
for streamhost in streamhosts:
|
|
|
|
try:
|
|
|
|
conn = self._connect_proxy(sid,
|
2013-02-19 09:00:04 +00:00
|
|
|
sender,
|
2013-01-23 10:18:27 +00:00
|
|
|
self.xmpp.boundjid,
|
|
|
|
streamhost['host'],
|
2013-02-19 09:00:04 +00:00
|
|
|
streamhost['port'],
|
|
|
|
peer=sender)
|
2013-01-23 10:18:27 +00:00
|
|
|
used_streamhost = streamhost['jid']
|
|
|
|
break
|
|
|
|
except socket.error:
|
|
|
|
continue
|
|
|
|
else:
|
|
|
|
raise XMPPError(etype='cancel', condition='item-not-found')
|
|
|
|
|
|
|
|
iq.reply()
|
|
|
|
with self._sessions_lock:
|
|
|
|
self._sessions[sid] = conn
|
|
|
|
iq['socks']['sid'] = sid
|
|
|
|
iq['socks']['streamhost_used']['jid'] = used_streamhost
|
|
|
|
iq.send()
|
2013-02-19 09:00:04 +00:00
|
|
|
self.xmpp.event('socks5_stream', conn)
|
|
|
|
self.xmpp.event('stream:%s:%s' % (sid, conn.peer_jid), conn)
|
2012-06-03 17:56:56 +00:00
|
|
|
|
2013-01-23 10:18:27 +00:00
|
|
|
def activate(self, proxy, sid, target, ifrom=None, block=True, timeout=None, callback=None):
|
|
|
|
"""Activate the socks5 session that has been negotiated."""
|
|
|
|
iq = self.xmpp.Iq(sto=proxy, stype='set', sfrom=ifrom)
|
|
|
|
iq['socks']['sid'] = sid
|
|
|
|
iq['socks']['activate'] = target
|
|
|
|
iq.send(block=block, timeout=timeout, callback=callback)
|
2012-06-03 17:56:56 +00:00
|
|
|
|
2012-06-05 06:33:47 +00:00
|
|
|
def deactivate(self, sid):
|
2013-01-23 10:18:27 +00:00
|
|
|
"""Closes the proxy socket associated with this SID."""
|
|
|
|
sock = self._sessions.get(sid)
|
|
|
|
if sock:
|
|
|
|
try:
|
2014-01-26 15:53:53 +00:00
|
|
|
# sock.close() will also delete sid from self._sessions (see _connect_proxy)
|
2013-01-23 10:18:27 +00:00
|
|
|
sock.close()
|
|
|
|
except socket.error:
|
|
|
|
pass
|
2014-01-26 15:53:53 +00:00
|
|
|
# Though this should not be neccessary remove the closed session anyway
|
2013-01-23 10:18:27 +00:00
|
|
|
with self._sessions_lock:
|
2014-01-26 15:53:53 +00:00
|
|
|
if sid in self._sessions:
|
2014-06-15 23:40:58 +00:00
|
|
|
log.warn(('SOCKS5 session with sid = "%s" was not ' +
|
2014-01-26 15:53:53 +00:00
|
|
|
'removed from _sessions by sock.close()') % sid)
|
|
|
|
del self._sessions[sid]
|
2012-06-05 06:33:47 +00:00
|
|
|
|
|
|
|
def close(self):
|
2013-01-23 10:18:27 +00:00
|
|
|
"""Closes all proxy sockets."""
|
|
|
|
for sid, sock in self._sessions.items():
|
|
|
|
sock.close()
|
|
|
|
with self._sessions_lock:
|
|
|
|
self._sessions = {}
|
2012-06-04 06:27:41 +00:00
|
|
|
|
2013-02-19 09:00:04 +00:00
|
|
|
def _connect_proxy(self, sid, requester, target, proxy, proxy_port, peer=None):
|
2012-11-04 10:38:57 +00:00
|
|
|
""" Establishes a connection between the client and the server-side
|
|
|
|
Socks5 proxy.
|
2012-06-03 17:56:56 +00:00
|
|
|
|
|
|
|
sid : The StreamID. <str>
|
|
|
|
requester : The JID of the requester. <str>
|
|
|
|
target : The JID of the target. <str>
|
|
|
|
proxy_host : The hostname or the IP of the proxy. <str>
|
|
|
|
proxy_port : The port of the proxy. <str> or <int>
|
2013-02-19 09:00:04 +00:00
|
|
|
peer : The JID for the other side of the stream, regardless
|
|
|
|
of target or requester status.
|
2012-06-03 17:56:56 +00:00
|
|
|
"""
|
|
|
|
# Because the xep_0065 plugin uses the proxy_port as string,
|
|
|
|
# the Proxy class accepts the proxy_port argument as a string
|
|
|
|
# or an integer. Here, we force to use the port as an integer.
|
|
|
|
proxy_port = int(proxy_port)
|
|
|
|
|
2012-11-04 10:38:57 +00:00
|
|
|
sock = socksocket()
|
|
|
|
sock.setproxy(PROXY_TYPE_SOCKS5, proxy, port=proxy_port)
|
2012-06-03 17:56:56 +00:00
|
|
|
|
|
|
|
# The hostname MUST be SHA1(SID + Requester JID + Target JID)
|
|
|
|
# where the output is hexadecimal-encoded (not binary).
|
|
|
|
digest = sha1()
|
2014-06-15 23:40:58 +00:00
|
|
|
digest.update(sid.encode('utf-8'))
|
|
|
|
digest.update(str(requester).encode('utf-8'))
|
|
|
|
digest.update(str(target).encode('utf-8'))
|
2012-06-03 17:56:56 +00:00
|
|
|
|
2013-01-23 10:18:27 +00:00
|
|
|
dest = digest.hexdigest()
|
2012-06-03 17:56:56 +00:00
|
|
|
|
|
|
|
# The port MUST be 0.
|
2012-11-04 10:38:57 +00:00
|
|
|
sock.connect((dest, 0))
|
2012-06-04 17:39:48 +00:00
|
|
|
log.info('Socket connected.')
|
2012-11-01 09:58:54 +00:00
|
|
|
|
2013-01-23 10:18:27 +00:00
|
|
|
_close = sock.close
|
|
|
|
def close(*args, **kwargs):
|
|
|
|
with self._sessions_lock:
|
|
|
|
if sid in self._sessions:
|
|
|
|
del self._sessions[sid]
|
|
|
|
_close()
|
2014-01-26 15:53:53 +00:00
|
|
|
log.info('Socket closed.')
|
2013-01-23 10:18:27 +00:00
|
|
|
sock.close = close
|
|
|
|
|
2013-02-19 09:00:04 +00:00
|
|
|
sock.peer_jid = peer
|
|
|
|
sock.self_jid = target if requester == peer else requester
|
2012-06-03 17:56:56 +00:00
|
|
|
|
2013-02-19 09:00:04 +00:00
|
|
|
self.xmpp.event('socks_connected', sid)
|
2012-11-04 10:38:57 +00:00
|
|
|
return sock
|
2013-02-19 09:00:04 +00:00
|
|
|
|
|
|
|
def _accept_stream(self, iq):
|
|
|
|
receiver = iq['to']
|
|
|
|
sender = iq['from']
|
|
|
|
sid = iq['socks']['sid']
|
|
|
|
|
|
|
|
if self.api['authorized_sid'](receiver, sid, sender, iq):
|
|
|
|
return True
|
|
|
|
return self.api['authorized'](receiver, sid, sender, iq)
|
|
|
|
|
|
|
|
def _authorized(self, jid, sid, ifrom, iq):
|
|
|
|
return self.auto_accept
|
|
|
|
|
|
|
|
def _authorized_sid(self, jid, sid, ifrom, iq):
|
|
|
|
with self._preauthed_sids_lock:
|
|
|
|
log.debug('>>> authed sids: %s', self._preauthed_sids)
|
|
|
|
log.debug('>>> lookup: %s %s %s', jid, sid, ifrom)
|
|
|
|
if (jid, sid, ifrom) in self._preauthed_sids:
|
|
|
|
del self._preauthed_sids[(jid, sid, ifrom)]
|
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
|
|
|
def _preauthorize_sid(self, jid, sid, ifrom, data):
|
|
|
|
log.debug('>>>> %s %s %s %s', jid, sid, ifrom, data)
|
|
|
|
with self._preauthed_sids_lock:
|
|
|
|
self._preauthed_sids[(jid, sid, ifrom)] = True
|