10 str2addr(char *s, uchar *a)
15 if((s = strchr(s, '!')) == nil)
17 if((p = strchr(++s, '!')) == nil)
19 if(strchr(++p, '!') != nil)
21 if(parseip(ip, s) == -1)
49 addr2str(char *proto, uchar *a){
58 if((a[0] | a[1] | a[2]) == 0 && a[3]){
60 a += strlen((char*)a)+1;
61 snprint(s, sizeof(s), "%s!%s!%d", proto, (char*)a, port);
81 snprint(s, sizeof(s), "%s!%.*s!%d", proto, n, (char*)a, port);
85 snprint(s, sizeof(s), "%s!%I!%d", proto, ip, port);
90 udprelay(int fd, char *dir)
96 char addr[128], ldir[40];
100 snprint(addr, sizeof(addr), "%s/udp!*!0", outside);
101 if((cfd = announce(addr, ldir)) < 0)
103 if(write(cfd, "headers", 7) != 7)
105 strcat(ldir, "/data");
106 if((rfd = open(ldir, ORDWR)) < 0)
110 if((r = rfork(RFMEM|RFPROC|RFNOWAIT)) <= 0)
113 if((cfd = listen(dir, ldir)) < 0)
115 close(fd); /* close inside udp server */
116 if((fd = accept(cfd, ldir)) < 0)
119 switch(rfork(RFMEM|RFPROC|RFNOWAIT)){
123 while((r = read(fd, msg.data, sizeof(msg.data))) > 0){
127 if(p[0] | p[1] | p[2])
137 v4tov6(msg.raddr, p);
144 memmove(msg.raddr, p, 16);
148 memmove(msg.rport, p, 2);
150 memmove(msg.data, p, r);
151 write(rfd, &msg, sizeof(Udphdr)+r);
155 while((r = read(rfd, &msg, sizeof(msg))) > 0){
164 if(r+n > sizeof(msg.data))
165 r = sizeof(msg.data)-n;
172 v6tov4(p, msg.raddr);
176 memmove(p, msg.raddr, 16);
179 memmove(p, msg.rport, 2);
181 write(fd, msg.data, r);
192 return err ? 0x5b : 0x5a;
198 main(int argc, char *argv[])
200 uchar buf[8*1024], *p;
201 char addr[128], dir[40], ldir[40], *s;
205 fmtinstall('I', eipfmt);
207 setnetmtpt(inside, sizeof(inside), 0);
208 setnetmtpt(outside, sizeof(outside), 0);
211 setnetmtpt(inside, sizeof(inside), ARGF());
214 setnetmtpt(outside, sizeof(outside), ARGF());
218 /* ver+cmd or ver+nmethod */
219 if(readn(0, buf, 2) != 2)
229 if(readn(0, buf+2, 2+4) != 2+4)
232 for(p = buf+2+2+4;; p++){
233 if(p >= buf+sizeof(buf))
235 if(read(0, p, 1) != 1)
240 /* socks 4a dom hack */
241 if((buf[4] | buf[5] | buf[6]) == 0 && buf[7]){
244 if(p >= buf+sizeof(buf))
246 if(read(0, p, 1) != 1)
255 if(readn(0, buf+2, n) != n)
260 buf[1] = 0x00; /* no authentication required */
261 if(write(1, buf, 2) != 2)
264 /* ver+cmd+res+atyp */
265 if(readn(0, buf, 4) != 4)
270 case 0x01: /* +ipv4 */
271 if(readn(0, buf+4, 4+2) != 4+2)
274 case 0x03: /* +len+dom[len] */
275 if(readn(0, buf+4, 1) != 1)
277 if((n = buf[4]) == 0)
279 if(readn(0, buf+5, n+2) != n+2)
282 case 0x04: /* +ipv6 */
283 if(readn(0, buf+4, 16+2) != 16+2)
293 case 0x01: /* CONNECT */
294 snprint(addr, sizeof(addr), "%s/tcp", outside);
295 if((s = addr2str(addr, buf)) == nil)
298 fd = dial(s, 0, dir, &cfd);
301 case 0x02: /* BIND */
302 if(myipaddr(buf, outside) < 0)
304 snprint(addr, sizeof(addr), "%s/tcp!%I!0", outside, buf);
305 fd = announce(addr, dir);
308 if(myipaddr(buf, inside) < 0)
310 snprint(addr, sizeof(addr), "%s/udp!%I!0", inside, buf);
311 fd = announce(addr, dir);
317 buf[1] = sockerr(fd < 0); /* status */
319 buf[0] = 0x00; /* vc */
321 memset(buf+2, 0, 2+4);
322 write(1, buf, 2+2+4);
326 buf[0] = socksver; /* ver */
327 buf[2] = 0x00; /* res */
329 buf[3] = 0x01; /* atyp */
330 memset(buf+4, 0, 4+2);
331 write(1, buf, 4+4+2);
335 if((nc = getnetconninfo(dir, cfd)) == nil)
337 if((n = str2addr((cmd & 0x100) ? nc->raddr : nc->laddr, buf)) <= 0)
339 if(write(1, buf, n) != n)
345 case 0x01: /* CONNECT */
347 case 0x02: /* BIND */
348 cfd = listen(dir, ldir);
353 fd = accept(cfd, dir);
360 if(udprelay(fd, dir) == 0)
361 while(read(0, buf, sizeof(buf)) > 0)
367 switch(rfork(RFMEM|RFPROC|RFFDG|RFNOWAIT)){
376 while((n = read(0, buf, sizeof(buf))) > 0)
377 if(write(1, buf, n) != n)
382 postnote(PNGROUP, getpid(), "kill");