public void NormalizeRelativePathDirective(string name, string basePath) { List <Directive> list = GetDirectiveList(name); if (list != null) { foreach (Directive d in list) { string body = d.Text.Trim(); if (body == "") { continue; } List <string> fields = UtilsString.StringToList(body, " "); if (fields.Count < 1) { return; } string path = fields[0]; fields.RemoveAt(0); if ((path.StartsWith("\"")) && (path.EndsWith("\""))) { path = path.Substring(1, path.Length - 2); } path = Platform.Instance.FileGetAbsolutePath(path, basePath); d.Text = EncodePath(path) + " " + String.Join(" ", fields.ToArray()); d.Text = d.Text.Trim(); } } }
public virtual List <string> GetEnvironmentPaths() { string envPath = Environment.GetEnvironmentVariable("PATH"); List <string> paths = UtilsString.StringToList(envPath, EnvPathSep, true, true, true, true); return(paths); }
public static byte[] AssocToUtf8Bytes(Dictionary <string, byte[]> assoc) { string output = ""; foreach (KeyValuePair <string, byte[]> kp in assoc) { output += UtilsString.Base64Encode(UtilsString.StringToUtf8Bytes(kp.Key)) + ":" + UtilsString.Base64Encode(kp.Value) + "\n"; } return(System.Text.Encoding.UTF8.GetBytes(output)); }
public override string ToString() { if (Engine.Instance.IsConnected()) { return(MessagesFormatter.Format(Messages.PingerStatsPending, UtilsString.FormatTime(LatestCheckDate))); } else { return(MessagesFormatter.Format(Messages.PingerStatsNormal, Invalid.ToString(), UtilsString.FormatTime(OlderCheckDate), UtilsString.FormatTime(LatestCheckDate))); } }
public static void Connect(TcpClient client, string host, int controlPort, string controlPassword) { if (client == null) { throw new Exception("Internal error (client is null)"); } bool controlAuthenticate = Engine.Instance.Storage.GetBool("proxy.tor.control.auth"); byte[] password = System.Text.Encoding.ASCII.GetBytes(controlPassword); if (controlAuthenticate) { if (controlPassword == "") { string path = GetControlAuthCookiePath(); if (path == "") { throw new Exception(Messages.TorControlNoPath); } Engine.Instance.Logs.Log(LogType.Verbose, MessagesFormatter.Format(Messages.TorControlAuth, "Cookie, from " + path)); password = Platform.Instance.FileContentsReadBytes(path); } else { Engine.Instance.Logs.Log(LogType.Verbose, MessagesFormatter.Format(Messages.TorControlAuth, "Password")); } } client.Connect(host, controlPort); if (controlAuthenticate) { Write(client, "AUTHENTICATE "); Write(client, UtilsString.BytesToHex(password)); Write(client, "\n"); string result = Read(client); if (result != "250 OK") { throw new Exception(result); } } Flush(client); }
public void AppendDirective(string name, string body, string comment) { name = UtilsString.StringPruneCharsNotIn(name.Trim(), AllowedCharsInDirectiveName); // Eddie-special: If start with -, remove. if (name.StartsWith("-")) { if (Directives.ContainsKey(name.Substring(1))) { Directives.Remove(name.Substring(1)); } } else { if (IsMultipleDirective(name)) { if (Directives.ContainsKey(name) == false) { Directives[name] = new List <Directive>(); } } else { Directives[name] = new List <Directive>(); } if (Engine.Instance.Storage.GetBool("openvpn.allow.script-security") == false) { if (IsGroupAllowScriptSecurity(name)) { return; } } Directive d = new Directive(); d.Text = body.Trim(); d.Comment = comment.Trim(); Directives[name].Add(d); } }
public static string EscapeHost(string value) { // Note: RFC 952 with _ exception. return(UtilsString.StringPruneCharsNotIn(value, "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_")); }
public static string EscapeAlphaNumeric(string value) { return(UtilsString.StringPruneCharsNotIn(value, "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789")); }
public bool Run() { m_id++; string path = Path; string[] args = Arguments.ToArray(); if (RunAsNormalUser) { if (Platform.Instance.ShellAdaptNormalUser(ref path, ref args) == false) { return(false); } } if (WaitEnd) { bool log = ((NoDebugLog == false) && (Engine.Instance != null) && (Engine.Instance.Storage != null) && (Engine.Instance.Storage.GetBool("log.level.debug"))); if (log) { string message = "Shell(" + m_id + ") of '" + path + "'"; if (Arguments.Count > 0) { message += ", " + Arguments.Count.ToString() + " args: "; foreach (string arg in args) { message += "'" + arg + "';"; } } message = UtilsString.RegExReplace(message, "[a-zA-Z0-9+/]{30,}=", "{base64-omissis}"); Engine.Instance.Logs.Log(LogType.Verbose, message); } int startTime = Environment.TickCount; Platform.Instance.ShellSync(path, args, out StdOut, out StdErr, out ExitCode); int endTime = Environment.TickCount; if (log) { int deltaTime = endTime - startTime; string message = "Shell(" + m_id + ") done in " + deltaTime.ToString() + " ms"; message += ", exit: " + ExitCode.ToString(); if (StdOut != "") { message += ", out: '" + StdOut + "'"; } if (StdErr != "") { message += ", err: '" + StdErr + "'"; } message = UtilsString.RegExReplace(message, "[a-zA-Z0-9+/]{30,}=", "{base64-omissis}"); Engine.Instance.Logs.Log(LogType.Verbose, message); } if (ExceptionIfFail) { if (ExitCode != 0) { if (StdErr != "") { throw new Exception(StdErr); } else { throw new Exception(Messages.Failed); } } } return(ExitCode == 0); } else { Platform.Instance.ShellASync(path, args); return(true); } }
// Called for user events public static void ShellUserEvent(string path, string arguments, bool waitEnd) { List <string> args = UtilsString.StringToList(arguments, " ", true, true, false, false); Shell(path, args.ToArray(), waitEnd); }
public ConnectionActive BuildConnectionActive(bool preview) { // If preview, no physical additional files are created. ConnectionActive connectionActive = new ConnectionActive(); Storage s = Engine.Instance.Storage; connectionActive.OpenVpnProfileStartup = new OvpnBuilder(); OvpnBuilder ovpn = connectionActive.OpenVpnProfileStartup; ovpn.AppendDirective("setenv", "IV_GUI_VER " + Constants.Name + Constants.VersionDesc, "Client level"); if (s.GetBool("openvpn.skip_defaults") == false) { ovpn.AppendDirectives(Engine.Instance.Storage.Get("openvpn.directives"), "Client level"); string directivesPath = Engine.Instance.Storage.Get("openvpn.directives.path"); if (directivesPath.Trim() != "") { try { if (Platform.Instance.FileExists(directivesPath)) { string text = Platform.Instance.FileContentsReadText(directivesPath); ovpn.AppendDirectives(text, "Client level"); } else { Engine.Instance.Logs.Log(LogType.Warning, MessagesFormatter.Format(Messages.FileNotFound, directivesPath)); } } catch (Exception ex) { Engine.Instance.Logs.Log(LogType.Warning, MessagesFormatter.Format(Messages.FileErrorRead, directivesPath, ex.Message)); } } Provider.OnBuildOvpnDefaults(ovpn); ovpn.AppendDirectives(OvpnDirectives, "Server level"); if (Path != "") { if (Platform.Instance.FileExists(Path)) { string text = Platform.Instance.FileContentsReadText(Path); ovpn.AppendDirectives(text, "Config file"); string dirPath = Platform.Instance.FileGetDirectoryPath(Path); ovpn.NormalizeRelativePath(dirPath); } } } if (s.Get("openvpn.dev_node") != "") { ovpn.AppendDirective("dev-node", s.Get("openvpn.dev_node"), ""); } if (s.Get("network.entry.iface") != "") { ovpn.AppendDirective("local", s.Get("network.entry.iface"), ""); ovpn.RemoveDirective("nobind"); } else { ovpn.RemoveDirective("local"); ovpn.AppendDirective("nobind", "", ""); } int rcvbuf = s.GetInt("openvpn.rcvbuf"); if (rcvbuf == -2) { rcvbuf = Platform.Instance.GetRecommendedRcvBufDirective(); } if (rcvbuf == -2) { rcvbuf = -1; } if (rcvbuf != -1) { ovpn.AppendDirective("rcvbuf", rcvbuf.ToString(), ""); } int sndbuf = s.GetInt("openvpn.sndbuf"); if (sndbuf == -2) { sndbuf = Platform.Instance.GetRecommendedSndBufDirective(); } if (sndbuf == -2) { sndbuf = -1; } if (sndbuf != -1) { ovpn.AppendDirective("sndbuf", sndbuf.ToString(), ""); } string proxyDirectiveName = ""; string proxyDirectiveArgs = ""; string proxyMode = s.GetLower("proxy.mode"); string proxyWhen = s.GetLower("proxy.when"); if ((proxyWhen == "none") || (proxyWhen == "web")) { proxyMode = "none"; } if (proxyMode == "tor") { proxyDirectiveName = "socks-proxy"; } else if (proxyMode == "http") { proxyDirectiveName = "http-proxy"; } else if (proxyMode == "socks") { proxyDirectiveName = "socks-proxy"; } if (proxyDirectiveName != "") { proxyDirectiveArgs += s.Get("proxy.host") + " " + s.Get("proxy.port"); if ((s.GetLower("proxy.mode") != "none") && (s.GetLower("proxy.mode") != "tor")) { if (s.Get("proxy.auth") != "None") { string fileNameAuthOvpn = ""; if (preview) { fileNameAuthOvpn = "dummy.ppw"; } else { connectionActive.ProxyAuthFile = new TemporaryFile("ppw"); fileNameAuthOvpn = connectionActive.ProxyAuthFile.Path; string fileNameData = s.Get("proxy.login") + "\n" + s.Get("proxy.password") + "\n"; Platform.Instance.FileContentsWriteText(connectionActive.ProxyAuthFile.Path, fileNameData); Platform.Instance.FileEnsurePermission(connectionActive.ProxyAuthFile.Path, "600"); Platform.Instance.FileEnsureOwner(connectionActive.ProxyAuthFile.Path); } proxyDirectiveArgs += " " + ovpn.EncodePath(fileNameAuthOvpn) + " " + s.Get("proxy.auth").ToLowerInvariant(); // 2.6 Auth Fix } } ovpn.AppendDirective(proxyDirectiveName, proxyDirectiveArgs, ""); } if (Common.Constants.FeatureIPv6ControlOptions) { if (s.GetLower("network.ipv4.mode") == "in") { connectionActive.TunnelIPv4 = true; } else if (s.GetLower("network.ipv4.mode") == "in-out") { if (SupportIPv4) { connectionActive.TunnelIPv4 = true; } else { connectionActive.TunnelIPv4 = false; } } else if (s.GetLower("network.ipv4.mode") == "in-block") { if (SupportIPv4) { connectionActive.TunnelIPv4 = true; } else { connectionActive.TunnelIPv4 = false; // Out, but doesn't matter, will be blocked. } } else if (s.GetLower("network.ipv4.mode") == "out") { connectionActive.TunnelIPv4 = false; } else if (s.GetLower("network.ipv4.mode") == "block") { connectionActive.TunnelIPv4 = false; // Out, but doesn't matter, will be blocked. } if (Engine.Instance.GetNetworkIPv6Mode() == "in") { connectionActive.TunnelIPv6 = true; } else if (Engine.Instance.GetNetworkIPv6Mode() == "in-out") { if (SupportIPv6) { connectionActive.TunnelIPv6 = true; } else { connectionActive.TunnelIPv6 = false; } } else if (Engine.Instance.GetNetworkIPv6Mode() == "in-block") { if (SupportIPv6) { connectionActive.TunnelIPv6 = true; } else { connectionActive.TunnelIPv6 = false; } } else if (Engine.Instance.GetNetworkIPv6Mode() == "out") { connectionActive.TunnelIPv6 = false; } else if (Engine.Instance.GetNetworkIPv6Mode() == "block") { connectionActive.TunnelIPv6 = false; } if (Software.GetTool("openvpn").VersionAboveOrEqual("2.4")) { ovpn.RemoveDirective("redirect-gateway"); // Remove if exists ovpn.AppendDirective("pull-filter", "ignore \"redirect-gateway\"", "Forced at client side"); if (connectionActive.TunnelIPv6 == false) { ovpn.AppendDirective("pull-filter", "ignore \"dhcp-option DNS6\"", "Client side"); ovpn.AppendDirective("pull-filter", "ignore \"tun-ipv6\"", "Client side"); ovpn.AppendDirective("pull-filter", "ignore \"ifconfig-ipv6\"", "Client side"); } if ((connectionActive.TunnelIPv4 == false) && (connectionActive.TunnelIPv6 == false)) { // no redirect-gateway } else if ((connectionActive.TunnelIPv4 == true) && (connectionActive.TunnelIPv6 == false)) { ovpn.AppendDirective("redirect-gateway", "def1 bypass-dhcp", ""); } else if ((connectionActive.TunnelIPv4 == false) && (connectionActive.TunnelIPv6 == true)) { ovpn.AppendDirective("redirect-gateway", "ipv6 !ipv4 def1 bypass-dhcp", ""); } else { ovpn.AppendDirective("redirect-gateway", "ipv6 def1 bypass-dhcp", ""); } } else { // OpenVPN <2.4, IPv6 not supported, IPv4 required. if (connectionActive.TunnelIPv4) { ovpn.AppendDirective("redirect-gateway", "def1 bypass-dhcp", ""); } else { ovpn.AppendDirective("route-nopull", "", "For Routes Out"); // 2.9, this is used by Linux resolv-conf DNS method. Need because route-nopull also filter pushed dhcp-option. // Incorrect with other provider, but the right-approach (pull-filter based) require OpenVPN <2.4. ovpn.AppendDirective("dhcp-option", "DNS " + Common.Constants.DnsVpn, ""); } } } else { string routesDefault = s.Get("routes.default"); connectionActive.TunnelIPv4 = (routesDefault == "in"); connectionActive.TunnelIPv6 = (routesDefault == "in"); if (routesDefault == "out") { if (Software.GetTool("openvpn").VersionAboveOrEqual("2.4")) { ovpn.RemoveDirective("redirect-gateway"); // Remove if exists ovpn.AppendDirective("pull-filter", "ignore \"redirect-gateway\"", "For Routes Out"); } else // Compatibility <2.4 { ovpn.AppendDirective("route-nopull", "", "For Routes Out"); // For DNS // < 2.9. route directive useless, and DNS are forced manually in every supported platform. // TOCLEAN /* * ovpn += "dhcp-option DNS " + Constants.DnsVpn + "\n"; // Manually because route-nopull skip it * ovpn += "route 10.4.0.1 255.255.255.255 vpn_gateway # AirDNS\n"; * ovpn += "route 10.5.0.1 255.255.255.255 vpn_gateway # AirDNS\n"; * ovpn += "route 10.6.0.1 255.255.255.255 vpn_gateway # AirDNS\n"; * ovpn += "route 10.7.0.1 255.255.255.255 vpn_gateway # AirDNS\n"; * ovpn += "route 10.8.0.1 255.255.255.255 vpn_gateway # AirDNS\n"; * ovpn += "route 10.9.0.1 255.255.255.255 vpn_gateway # AirDNS\n"; * ovpn += "route 10.30.0.1 255.255.255.255 vpn_gateway # AirDNS\n"; * ovpn += "route 10.50.0.1 255.255.255.255 vpn_gateway # AirDNS\n"; */ // 2.9, this is used by Linux resolv-conf DNS method. Need because route-nopull also filter pushed dhcp-option. // Incorrect with other provider, but the right-approach (pull-filter based) require OpenVPN <2.4. ovpn.AppendDirective("dhcp-option", "DNS " + Common.Constants.DnsVpn, ""); } } } // For Checking foreach (IpAddress ip in IpsExit.IPs) { connectionActive.AddRoute(ip, "vpn_gateway", "For Checking Route"); } string routes = s.Get("routes.custom"); string[] routes2 = routes.Split(';'); foreach (string route in routes2) { string[] routeEntries = route.Split(','); if (routeEntries.Length != 3) { continue; } string ipCustomRoute = routeEntries[0]; IpAddresses ipsCustomRoute = new IpAddresses(ipCustomRoute); if (ipsCustomRoute.Count == 0) { Engine.Instance.Logs.Log(LogType.Verbose, MessagesFormatter.Format(Messages.CustomRouteInvalid, ipCustomRoute.ToString())); } else { string action = routeEntries[1]; string notes = routeEntries[2]; foreach (IpAddress ip in ipsCustomRoute.IPs) { bool layerIn = false; if (ip.IsV4) { layerIn = connectionActive.TunnelIPv4; } else if (ip.IsV6) { layerIn = connectionActive.TunnelIPv6; } string gateway = ""; if ((layerIn == false) && (action == "in")) { gateway = "vpn_gateway"; } if ((layerIn == true) && (action == "out")) { gateway = "net_gateway"; } if (gateway != "") { connectionActive.AddRoute(ip, gateway, (notes != "") ? UtilsString.StringSafe(notes) : ipCustomRoute); } } } } if (proxyMode == "tor") { if (preview == false) { TorControl.SendNEWNYM(); } IpAddresses torNodeIps = TorControl.GetGuardIps((preview == false)); foreach (IpAddress torNodeIp in torNodeIps.IPs) { if (((connectionActive.TunnelIPv4) && (torNodeIp.IsV4)) || ((connectionActive.TunnelIPv6) && (torNodeIp.IsV6))) { connectionActive.AddRoute(torNodeIp, "net_gateway", "Tor Guard"); } } } { string managementPasswordFile = "dummy.ppw"; if (preview == false) { connectionActive.ManagementPassword = RandomGenerator.GetHash(); connectionActive.ManagementPasswordFile = new TemporaryFile("ppw"); managementPasswordFile = connectionActive.ManagementPasswordFile.Path; Platform.Instance.FileContentsWriteText(managementPasswordFile, connectionActive.ManagementPassword); Platform.Instance.FileEnsurePermission(managementPasswordFile, "600"); Platform.Instance.FileEnsureOwner(managementPasswordFile); } ovpn.AppendDirective("management", "127.0.0.1 " + Engine.Instance.Storage.Get("openvpn.management_port") + " " + ovpn.EncodePath(managementPasswordFile), ""); } // TOCLEAN - Moved bottom in 2.14.0 // ovpn.AppendDirectives(Engine.Instance.Storage.Get("openvpn.custom"), "Custom level"); // Experimental - Allow identification as Public Network in Windows. Advanced Option? // ovpn.Append("route-metric 512"); // ovpn.Append("route 0.0.0.0 0.0.0.0"); Provider.OnBuildConnectionActive(this, connectionActive); Provider.OnBuildConnectionActiveAuth(connectionActive); Platform.Instance.OnBuildOvpn(ovpn); ovpn.AppendDirectives(Engine.Instance.Storage.Get("openvpn.custom"), "Custom level"); foreach (ConnectionActiveRoute route in connectionActive.Routes) { if ((route.Address.IsV6) || (Constants.FeatureAlwaysBypassOpenvpnRoute)) { } else { // We never find a better method to manage IPv6 route via OpenVPN, at least <2.4.4 ovpn.AppendDirective("route", route.Address.ToOpenVPN() + " " + route.Gateway, UtilsString.StringSafe(route.Notes)); } } ovpn.Normalize(); return(connectionActive); }
public static IpAddresses GetGuardIps(bool force) { // This is called a lots of time. Int64 now = UtilsCore.UnixTimeStamp(); if ((force == false) && ((now - m_lastGuardTime < 60))) { return(m_lastGuardIps); } IpAddresses ips = new IpAddresses(); try { string controlHost = Engine.Instance.Storage.Get("proxy.host").ToLowerInvariant().Trim(); if ((controlHost != "127.0.0.1") && (controlHost.ToLowerInvariant() != "localhost")) { // Guard IPS are used to avoid routing loop, that occur only if the Tor host is the same machine when OpenVPN run. return(ips); } List <string> ipsMessages = new List <string>(); using (TcpClient s = new TcpClient()) { Connect(s); Write(s, "getinfo circuit-status\n"); Flush(s); string circuits = Read(s); string[] circuitsLines = circuits.Split('\n'); foreach (string circuit in circuitsLines) { string id = UtilsString.RegExMatchOne(circuit.ToLowerInvariant(), "\\d+\\sbuilt\\s\\$([0-9a-f]+)"); if (id != "") { Write(s, "getinfo ns/id/" + id.ToUpperInvariant() + "\n"); string nodeInfo = Read(s); string[] nodeLines = nodeInfo.Split('\n'); foreach (string line in nodeLines) { string ip = UtilsString.RegExMatchOne(line, "r\\s.+?\\s.+?\\s.+?\\s.+?\\s.+?\\s(.+?)\\s"); if ((IpAddress.IsIP(ip)) && (!ips.Contains(ip))) { ips.Add(ip); ipsMessages.Add(ip + " (circuit)"); } } } } Write(s, "getconf bridge\n"); Flush(s); string bridges = Read(s); if (bridges.IndexOf("meek") == -1) //Panic if we have meek enabled, don't yet know what to do :-( { string[] bridgeLines = bridges.Split('\n'); foreach (string bridge in bridgeLines) { List <string> matches = UtilsString.RegExMatchSingle(bridge.ToLowerInvariant(), "250.bridge=(.+?)\\s([0-9a-f\\.\\:]+?):\\d+\\s"); if ((matches != null) && (matches.Count == 2)) { string bridgeType = matches[0]; string ip = matches[1]; if ((IpAddress.IsIP(ip)) && (!ips.Contains(ip))) { ips.Add(matches[1]); ipsMessages.Add(matches[1] + " (" + bridgeType + ")"); } } } } else { Engine.Instance.Logs.Log(LogType.Warning, Messages.TorControlMeekUnsupported); } if (ips.Count == 0) { Engine.Instance.Logs.Log(LogType.Warning, Messages.TorControlNoIps); //throw new Exception(Messages.TorControlNoIps); } else { string list = String.Join("; ", ipsMessages.ToArray()); Engine.Instance.Logs.Log(LogType.Verbose, MessagesFormatter.Format(Messages.TorControlGuardIps, list)); } } } catch (Exception e) { //throw new Exception(MessagesFormatter.Format(Messages.TorControlException, e.Message)); Engine.Instance.Logs.Log(LogType.Warning, MessagesFormatter.Format(Messages.TorControlException, e.Message)); } m_lastGuardIps = ips; m_lastGuardTime = now; return(ips); }
public IpAddresses GetIpsWhiteListOutgoing(bool includeIpUsedByClient) { IpAddresses result = new IpAddresses(); // Custom { string list = Engine.Instance.Storage.Get("netlock.allowed_ips"); list = list.Replace("\u2028", ","); // macOS Hack // TOCLEAN List <string> hosts = UtilsString.StringToList(list); foreach (string host in hosts) { string host2 = host; int posComment = host2.IndexOf("#"); if (posComment != -1) { host2 = host2.Substring(0, posComment).Trim(); } result.Add(host2); } } // Routes Out { string routes = Engine.Instance.Storage.Get("routes.custom"); string[] routes2 = routes.Split(';'); foreach (string route in routes2) { string[] routeEntries = route.Split(','); if (routeEntries.Length < 2) { continue; } string host = routeEntries[0]; string action = routeEntries[1]; if (action == "out") { result.Add(host); } } } // DNS if (Engine.Instance.Storage.GetBool("netlock.allow_dns")) { result.Add(Platform.Instance.DetectDNS()); } if (includeIpUsedByClient) { // Providers foreach (Provider provider in Engine.Instance.ProvidersManager.Providers) { result.Add(provider.GetNetworkLockAllowedIps()); } // Servers lock (Engine.Instance.Connections) { Dictionary <string, ConnectionInfo> servers = new Dictionary <string, ConnectionInfo>(Engine.Instance.Connections); foreach (ConnectionInfo infoServer in servers.Values) { result.Add(infoServer.IpsEntry); } } } return(result); }