public void Start(int PacketSize, int Timeout) { Client.ClientDisconnecting += ClientClientDisconnecting; SocksEncryption w = null; if (Client == null) { this.Dispose(); return; } Authenticated = AuthenticateConnection(ref w); //Request Site Data. if (Authenticated == 1) { w = new SocksEncryption(); w.SetType(AuthTypes.Login); SocksRequest req = Socks5.RequestTunnel(this, w); if (req == null) { Client.Disconnect(); return; } req1 = new SocksRequest(req.StreamType, req.Type, req.Address, req.Port); //call on plugins for connect callbacks. foreach (ConnectHandler conn in PluginLoader.LoadPlugin(typeof(ConnectHandler))) if (conn.Enabled) if (conn.OnConnect(req1) == false) { req.Error = SocksError.Failure; Client.Send(req.GetData(true)); Client.Disconnect(); return; } //Send Tunnel Data back. SocksTunnel x = new SocksTunnel(this, req, req1, PacketSize, Timeout); x.TunnelDisposing += x_TunnelDisposing; x.Open(); } else if (Authenticated == 2) { SocksRequest req = Socks5.RequestTunnel(this, w); if (req == null) { Client.Disconnect(); return; } req1 = new SocksRequest(req.StreamType, req.Type, req.Address, req.Port); if (PluginLoader.LoadPlugin(typeof(ConnectHandler)).Cast<ConnectHandler>().Where(conn => conn.Enabled).Any(conn => conn.OnConnect(req1) == false)) { req.Error = SocksError.Failure; Client.Send(req.GetData(true)); Client.Disconnect(); return; } //Send Tunnel Data back. SocksSpecialTunnel x = new SocksSpecialTunnel(this, w, req, req1, PacketSize, Timeout); x.TunnelDisposing += x_TunnelDisposing; x.Start(); } }
public static SocksEncryption RequestSpecialMode(List<AuthTypes> auth, Client client) { //select mode, do key exchange if encryption, or start compression. if (auth.Contains(AuthTypes.SocksBoth)) { //tell client that we chose socksboth. client.Send(new byte[] { (byte)HeaderTypes.Socks5, (byte)AuthTypes.SocksBoth }); //wait for public key. SocksEncryption ph = new SocksEncryption(); ph.GenerateKeys(); //wait for public key. byte[] buffer = new byte[4096]; int keysize = client.Receive(buffer, 0, buffer.Length); //store key in our encryption class. ph.SetKey(buffer, 0, keysize); //send key. client.Send(ph.GetPublicKey()); //now we give them our key. client.Send(ph.ShareEncryptionKey()); //send more. int enckeysize = client.Receive(buffer, 0, buffer.Length); //decrypt with our public key. byte[] newkey = new byte[enckeysize]; Buffer.BlockCopy(buffer, 0, newkey, 0, enckeysize); ph.SetEncKey(ph.key.Decrypt(newkey, false)); ph.SetType(AuthTypes.SocksBoth); //ready up our client. return ph; } else if (auth.Contains(AuthTypes.SocksEncrypt)) { //tell client that we chose socksboth. client.Send(new byte[] { (byte)HeaderTypes.Socks5, (byte)AuthTypes.SocksEncrypt }); //wait for public key. SocksEncryption ph = new SocksEncryption(); ph.GenerateKeys(); //wait for public key. byte[] buffer = new byte[4096]; int keysize = client.Receive(buffer, 0, buffer.Length); //store key in our encryption class. ph.SetKey(buffer, 0, keysize); ph.SetType(AuthTypes.SocksBoth); //ready up our client. return ph; } else if (auth.Contains(AuthTypes.SocksCompress)) { //start compression. client.Send(new byte[] { (byte)HeaderTypes.Socks5, (byte)AuthTypes.SocksCompress }); SocksEncryption ph = new SocksEncryption(); ph.SetType(AuthTypes.SocksCompress); //ready } else if (auth.Contains(AuthTypes.Login)) { SocksEncryption ph = new SocksEncryption(); ph.SetType(AuthTypes.Login); return ph; } return null; }