2014-02-04 04:02:17 +00:00
|
|
|
import os, socket, time, threading, copy
|
2012-06-13 06:16:47 +00:00
|
|
|
from OpenSSL import SSL
|
2014-01-31 00:06:35 +00:00
|
|
|
from netlib import tcp, http, certutils, http_auth
|
|
|
|
import utils, version, platform, controller, stateobject
|
2010-02-16 04:09:07 +00:00
|
|
|
|
2014-01-04 21:58:53 +00:00
|
|
|
TRANSPARENT_SSL_PORTS = [443, 8443]
|
2014-03-02 04:27:24 +00:00
|
|
|
CA_CERT_NAME = "mitmproxy-ca.pem"
|
2013-02-23 01:08:28 +00:00
|
|
|
|
2010-02-16 04:09:07 +00:00
|
|
|
|
2014-02-04 01:56:59 +00:00
|
|
|
class AddressPriority(object):
|
|
|
|
"""
|
|
|
|
Enum that signifies the priority of the given address when choosing the destination host.
|
|
|
|
Higher is better (None < i)
|
|
|
|
"""
|
|
|
|
FORCE = 5
|
|
|
|
"""forward mode"""
|
|
|
|
MANUALLY_CHANGED = 4
|
|
|
|
"""user changed the target address in the ui"""
|
|
|
|
FROM_SETTINGS = 3
|
|
|
|
"""reverse proxy mode"""
|
|
|
|
FROM_CONNECTION = 2
|
|
|
|
"""derived from transparent resolver"""
|
|
|
|
FROM_PROTOCOL = 1
|
|
|
|
"""derived from protocol (e.g. absolute-form http requests)"""
|
|
|
|
|
|
|
|
|
2010-02-16 04:09:07 +00:00
|
|
|
class ProxyError(Exception):
|
2012-12-30 09:41:58 +00:00
|
|
|
def __init__(self, code, msg, headers=None):
|
|
|
|
self.code, self.msg, self.headers = code, msg, headers
|
2010-02-16 04:09:07 +00:00
|
|
|
|
|
|
|
def __str__(self):
|
2014-01-18 16:15:33 +00:00
|
|
|
return "ProxyError(%s, %s)" % (self.code, self.msg)
|
2010-02-16 04:09:07 +00:00
|
|
|
|
2014-02-05 19:26:47 +00:00
|
|
|
|
2014-01-09 04:34:29 +00:00
|
|
|
class Log:
|
|
|
|
def __init__(self, msg):
|
|
|
|
self.msg = msg
|
|
|
|
|
|
|
|
|
2011-09-09 02:49:34 +00:00
|
|
|
class ProxyConfig:
|
2014-03-02 04:35:41 +00:00
|
|
|
def __init__(self, certfile=None, keyfile=None, cacert=None, clientcerts=None,
|
|
|
|
no_upstream_cert=False, body_size_limit=None, reverse_proxy=None,
|
|
|
|
forward_proxy=None, transparent_proxy=None, authenticator=None,
|
|
|
|
ciphers=None
|
|
|
|
):
|
|
|
|
self.ciphers = ciphers
|
2011-02-08 17:00:59 +00:00
|
|
|
self.certfile = certfile
|
2014-03-02 04:27:24 +00:00
|
|
|
self.keyfile = keyfile
|
2011-02-08 17:00:59 +00:00
|
|
|
self.cacert = cacert
|
2012-05-23 21:09:03 +00:00
|
|
|
self.clientcerts = clientcerts
|
2012-07-03 10:56:25 +00:00
|
|
|
self.no_upstream_cert = no_upstream_cert
|
2011-09-09 03:27:31 +00:00
|
|
|
self.body_size_limit = body_size_limit
|
2012-02-18 01:45:22 +00:00
|
|
|
self.reverse_proxy = reverse_proxy
|
2013-08-31 00:14:18 +00:00
|
|
|
self.forward_proxy = forward_proxy
|
2012-06-14 21:47:04 +00:00
|
|
|
self.transparent_proxy = transparent_proxy
|
2012-12-30 09:41:58 +00:00
|
|
|
self.authenticator = authenticator
|
2014-03-02 02:14:22 +00:00
|
|
|
self.certstore = certutils.CertStore(cacert)
|
2013-01-04 01:19:32 +00:00
|
|
|
|
2013-01-06 03:44:12 +00:00
|
|
|
|
2014-01-30 17:56:23 +00:00
|
|
|
class ClientConnection(tcp.BaseHandler, stateobject.SimpleStateObject):
|
2014-01-29 01:49:11 +00:00
|
|
|
def __init__(self, client_connection, address, server):
|
2014-01-31 00:06:35 +00:00
|
|
|
if client_connection: # Eventually, this object is restored from state. We don't have a connection then.
|
2014-01-30 19:11:01 +00:00
|
|
|
tcp.BaseHandler.__init__(self, client_connection, address, server)
|
|
|
|
else:
|
2014-02-05 13:33:17 +00:00
|
|
|
self.connection = None
|
|
|
|
self.server = None
|
|
|
|
self.wfile = None
|
|
|
|
self.rfile = None
|
2014-01-30 19:11:01 +00:00
|
|
|
self.address = None
|
|
|
|
self.clientcert = None
|
2014-01-09 04:34:29 +00:00
|
|
|
|
|
|
|
self.timestamp_start = utils.timestamp()
|
|
|
|
self.timestamp_end = None
|
|
|
|
self.timestamp_ssl_setup = None
|
|
|
|
|
2014-01-30 04:00:13 +00:00
|
|
|
_stateobject_attributes = dict(
|
|
|
|
timestamp_start=float,
|
|
|
|
timestamp_end=float,
|
2014-01-31 00:06:35 +00:00
|
|
|
timestamp_ssl_setup=float
|
2014-01-30 04:00:13 +00:00
|
|
|
)
|
|
|
|
|
2014-01-31 00:06:35 +00:00
|
|
|
def _get_state(self):
|
|
|
|
d = super(ClientConnection, self)._get_state()
|
|
|
|
d.update(
|
|
|
|
address={"address": self.address(), "use_ipv6": self.address.use_ipv6},
|
|
|
|
clientcert=self.cert.to_pem() if self.clientcert else None
|
|
|
|
)
|
|
|
|
return d
|
|
|
|
|
|
|
|
def _load_state(self, state):
|
|
|
|
super(ClientConnection, self)._load_state(state)
|
|
|
|
self.address = tcp.Address(**state["address"]) if state["address"] else None
|
|
|
|
self.clientcert = certutils.SSLCert.from_pem(state["clientcert"]) if state["clientcert"] else None
|
|
|
|
|
2014-02-04 04:02:17 +00:00
|
|
|
def copy(self):
|
|
|
|
return copy.copy(self)
|
|
|
|
|
2014-02-07 17:14:15 +00:00
|
|
|
def send(self, message):
|
|
|
|
self.wfile.write(message)
|
|
|
|
self.wfile.flush()
|
|
|
|
|
2014-01-30 04:21:53 +00:00
|
|
|
@classmethod
|
|
|
|
def _from_state(cls, state):
|
2014-02-05 13:33:17 +00:00
|
|
|
f = cls(None, tuple(), None)
|
2014-01-30 19:11:01 +00:00
|
|
|
f._load_state(state)
|
|
|
|
return f
|
2014-01-30 04:21:53 +00:00
|
|
|
|
2014-01-09 04:34:29 +00:00
|
|
|
def convert_to_ssl(self, *args, **kwargs):
|
|
|
|
tcp.BaseHandler.convert_to_ssl(self, *args, **kwargs)
|
|
|
|
self.timestamp_ssl_setup = utils.timestamp()
|
|
|
|
|
|
|
|
def finish(self):
|
|
|
|
tcp.BaseHandler.finish(self)
|
|
|
|
self.timestamp_end = utils.timestamp()
|
|
|
|
|
|
|
|
|
2014-01-30 17:56:23 +00:00
|
|
|
class ServerConnection(tcp.TCPClient, stateobject.SimpleStateObject):
|
2014-02-05 19:26:47 +00:00
|
|
|
def __init__(self, address, priority):
|
2014-01-28 16:28:20 +00:00
|
|
|
tcp.TCPClient.__init__(self, address)
|
2014-02-05 19:26:47 +00:00
|
|
|
self.priority = priority
|
2014-01-09 04:34:29 +00:00
|
|
|
|
2014-01-28 16:28:20 +00:00
|
|
|
self.peername = None
|
2014-01-09 04:34:29 +00:00
|
|
|
self.timestamp_start = None
|
|
|
|
self.timestamp_end = None
|
|
|
|
self.timestamp_tcp_setup = None
|
|
|
|
self.timestamp_ssl_setup = None
|
|
|
|
|
2014-01-30 04:00:13 +00:00
|
|
|
_stateobject_attributes = dict(
|
|
|
|
peername=tuple,
|
|
|
|
timestamp_start=float,
|
|
|
|
timestamp_end=float,
|
|
|
|
timestamp_tcp_setup=float,
|
|
|
|
timestamp_ssl_setup=float,
|
2014-01-30 17:56:23 +00:00
|
|
|
address=tcp.Address,
|
|
|
|
source_address=tcp.Address,
|
2014-02-04 04:02:17 +00:00
|
|
|
cert=certutils.SSLCert,
|
|
|
|
ssl_established=bool,
|
|
|
|
sni=str
|
2014-01-30 04:00:13 +00:00
|
|
|
)
|
|
|
|
|
2014-01-31 00:06:35 +00:00
|
|
|
def _get_state(self):
|
|
|
|
d = super(ServerConnection, self)._get_state()
|
|
|
|
d.update(
|
|
|
|
address={"address": self.address(), "use_ipv6": self.address.use_ipv6},
|
|
|
|
source_address= {"address": self.source_address(),
|
|
|
|
"use_ipv6": self.source_address.use_ipv6} if self.source_address else None,
|
|
|
|
cert=self.cert.to_pem() if self.cert else None
|
|
|
|
)
|
|
|
|
return d
|
|
|
|
|
|
|
|
def _load_state(self, state):
|
|
|
|
super(ServerConnection, self)._load_state(state)
|
|
|
|
|
|
|
|
self.address = tcp.Address(**state["address"]) if state["address"] else None
|
|
|
|
self.source_address = tcp.Address(**state["source_address"]) if state["source_address"] else None
|
|
|
|
self.cert = certutils.SSLCert.from_pem(state["cert"]) if state["cert"] else None
|
|
|
|
|
2014-01-30 04:21:53 +00:00
|
|
|
@classmethod
|
|
|
|
def _from_state(cls, state):
|
2014-02-05 19:26:47 +00:00
|
|
|
f = cls(tuple(), None)
|
2014-01-30 19:11:01 +00:00
|
|
|
f._load_state(state)
|
|
|
|
return f
|
2014-01-30 04:21:53 +00:00
|
|
|
|
2014-02-04 04:02:17 +00:00
|
|
|
def copy(self):
|
|
|
|
return copy.copy(self)
|
|
|
|
|
2013-02-24 09:24:21 +00:00
|
|
|
def connect(self):
|
2014-01-09 04:34:29 +00:00
|
|
|
self.timestamp_start = utils.timestamp()
|
2012-06-25 03:53:26 +00:00
|
|
|
tcp.TCPClient.connect(self)
|
2014-01-28 16:28:20 +00:00
|
|
|
self.peername = self.connection.getpeername()
|
2014-01-09 04:34:29 +00:00
|
|
|
self.timestamp_tcp_setup = utils.timestamp()
|
2014-01-05 00:03:55 +00:00
|
|
|
|
2014-01-29 01:49:11 +00:00
|
|
|
def send(self, message):
|
|
|
|
self.wfile.write(message)
|
|
|
|
self.wfile.flush()
|
|
|
|
|
2014-01-09 04:34:29 +00:00
|
|
|
def establish_ssl(self, clientcerts, sni):
|
2014-01-05 00:03:55 +00:00
|
|
|
clientcert = None
|
2014-01-09 04:34:29 +00:00
|
|
|
if clientcerts:
|
2014-01-29 01:49:11 +00:00
|
|
|
path = os.path.join(clientcerts, self.address.host.encode("idna")) + ".pem"
|
2014-01-05 00:03:55 +00:00
|
|
|
if os.path.exists(path):
|
|
|
|
clientcert = path
|
|
|
|
try:
|
2014-01-09 04:34:29 +00:00
|
|
|
self.convert_to_ssl(cert=clientcert, sni=sni)
|
|
|
|
self.timestamp_ssl_setup = utils.timestamp()
|
2014-01-05 00:03:55 +00:00
|
|
|
except tcp.NetLibError, v:
|
|
|
|
raise ProxyError(400, str(v))
|
2012-06-25 03:53:26 +00:00
|
|
|
|
2014-01-09 04:34:29 +00:00
|
|
|
def finish(self):
|
2014-01-18 16:15:33 +00:00
|
|
|
tcp.TCPClient.finish(self)
|
2014-01-09 04:34:29 +00:00
|
|
|
self.timestamp_end = utils.timestamp()
|
2013-01-28 22:35:57 +00:00
|
|
|
|
2014-02-04 04:02:17 +00:00
|
|
|
from . import protocol
|
|
|
|
from .protocol.http import HTTPResponse
|
|
|
|
|
2013-03-24 20:20:26 +00:00
|
|
|
|
2013-02-24 04:35:24 +00:00
|
|
|
class RequestReplayThread(threading.Thread):
|
2014-02-07 06:08:59 +00:00
|
|
|
name="RequestReplayThread"
|
|
|
|
|
2013-02-24 04:35:24 +00:00
|
|
|
def __init__(self, config, flow, masterq):
|
|
|
|
self.config, self.flow, self.channel = config, flow, controller.Channel(masterq)
|
|
|
|
threading.Thread.__init__(self)
|
|
|
|
|
|
|
|
def run(self):
|
|
|
|
try:
|
|
|
|
r = self.flow.request
|
2014-02-05 19:26:47 +00:00
|
|
|
server = ServerConnection(self.flow.server_conn.address(), None)
|
2013-02-24 09:24:21 +00:00
|
|
|
server.connect()
|
2014-02-04 04:02:17 +00:00
|
|
|
if self.flow.server_conn.ssl_established:
|
|
|
|
server.establish_ssl(self.config.clientcerts,
|
|
|
|
self.flow.server_conn.sni)
|
|
|
|
server.send(r._assemble())
|
|
|
|
self.flow.response = HTTPResponse.from_stream(server.rfile, r.method, body_size_limit=self.config.body_size_limit)
|
|
|
|
self.channel.ask("response", self.flow.response)
|
2013-02-24 04:35:24 +00:00
|
|
|
except (ProxyError, http.HttpError, tcp.NetLibError), v:
|
2014-02-04 04:02:17 +00:00
|
|
|
self.flow.error = protocol.primitives.Error(str(v))
|
|
|
|
self.channel.ask("error", self.flow.error)
|
2014-01-30 04:00:13 +00:00
|
|
|
|
2014-02-05 19:26:47 +00:00
|
|
|
|
2014-01-05 00:03:55 +00:00
|
|
|
class ConnectionHandler:
|
|
|
|
def __init__(self, config, client_connection, client_address, server, channel, server_version):
|
2012-06-10 04:02:48 +00:00
|
|
|
self.config = config
|
2014-01-29 01:49:11 +00:00
|
|
|
self.client_conn = ClientConnection(client_connection, client_address, server)
|
2014-01-09 04:34:29 +00:00
|
|
|
self.server_conn = None
|
2014-01-05 00:03:55 +00:00
|
|
|
self.channel, self.server_version = channel, server_version
|
2013-12-12 09:00:23 +00:00
|
|
|
|
2014-01-09 04:34:29 +00:00
|
|
|
self.close = False
|
2014-01-05 00:03:55 +00:00
|
|
|
self.conntype = None
|
|
|
|
self.sni = None
|
2013-12-12 09:00:23 +00:00
|
|
|
|
2014-01-05 00:03:55 +00:00
|
|
|
self.mode = "regular"
|
|
|
|
if self.config.reverse_proxy:
|
|
|
|
self.mode = "reverse"
|
|
|
|
if self.config.transparent_proxy:
|
|
|
|
self.mode = "transparent"
|
2013-02-24 09:24:21 +00:00
|
|
|
|
2010-02-16 04:09:07 +00:00
|
|
|
def handle(self):
|
2014-01-13 01:25:58 +00:00
|
|
|
self.log("clientconnect")
|
2014-01-07 01:29:10 +00:00
|
|
|
self.channel.ask("clientconnect", self)
|
2014-01-05 00:03:55 +00:00
|
|
|
|
2014-01-29 01:49:11 +00:00
|
|
|
self.determine_conntype()
|
|
|
|
|
2014-01-09 04:34:29 +00:00
|
|
|
try:
|
2014-01-30 17:56:23 +00:00
|
|
|
try:
|
|
|
|
# Can we already identify the target server and connect to it?
|
|
|
|
server_address = None
|
2014-02-04 01:56:59 +00:00
|
|
|
address_priority = None
|
2014-01-30 17:56:23 +00:00
|
|
|
if self.config.forward_proxy:
|
|
|
|
server_address = self.config.forward_proxy[1:]
|
2014-02-04 01:56:59 +00:00
|
|
|
address_priority = AddressPriority.FORCE
|
|
|
|
elif self.config.reverse_proxy:
|
|
|
|
server_address = self.config.reverse_proxy[1:]
|
|
|
|
address_priority = AddressPriority.FROM_SETTINGS
|
|
|
|
elif self.config.transparent_proxy:
|
|
|
|
server_address = self.config.transparent_proxy["resolver"].original_addr(
|
|
|
|
self.client_conn.connection)
|
|
|
|
if not server_address:
|
|
|
|
raise ProxyError(502, "Transparent mode failure: could not resolve original destination.")
|
|
|
|
address_priority = AddressPriority.FROM_CONNECTION
|
|
|
|
self.log("transparent to %s:%s" % server_address)
|
2014-01-30 17:56:23 +00:00
|
|
|
|
|
|
|
if server_address:
|
2014-02-04 01:56:59 +00:00
|
|
|
self.set_server_address(server_address, address_priority)
|
2014-01-30 17:56:23 +00:00
|
|
|
self._handle_ssl()
|
|
|
|
|
|
|
|
while not self.close:
|
|
|
|
try:
|
|
|
|
protocol.handle_messages(self.conntype, self)
|
|
|
|
except protocol.ConnectionTypeChange:
|
2014-01-31 00:44:55 +00:00
|
|
|
self.log("Connection Type Changed: %s" % self.conntype)
|
2014-01-30 17:56:23 +00:00
|
|
|
continue
|
|
|
|
|
|
|
|
# FIXME: Do we want to persist errors?
|
|
|
|
except (ProxyError, tcp.NetLibError), e:
|
|
|
|
protocol.handle_error(self.conntype, self, e)
|
2014-01-29 01:49:11 +00:00
|
|
|
except Exception, e:
|
|
|
|
self.log(e.__class__)
|
2014-01-30 04:00:13 +00:00
|
|
|
import traceback
|
|
|
|
self.log(traceback.format_exc())
|
2014-01-09 04:34:29 +00:00
|
|
|
self.log(str(e))
|
2012-06-30 12:15:03 +00:00
|
|
|
|
2014-01-29 01:49:11 +00:00
|
|
|
self.del_server_connection()
|
2014-01-13 01:25:58 +00:00
|
|
|
self.log("clientdisconnect")
|
2014-01-07 01:29:10 +00:00
|
|
|
self.channel.tell("clientdisconnect", self)
|
2010-11-12 15:01:17 +00:00
|
|
|
|
2014-01-09 16:56:42 +00:00
|
|
|
def _handle_ssl(self):
|
|
|
|
"""
|
2014-02-04 01:56:59 +00:00
|
|
|
Helper function of .handle()
|
2014-01-09 16:56:42 +00:00
|
|
|
Check if we can already identify SSL connections.
|
2014-02-04 01:56:59 +00:00
|
|
|
If so, connect to the server and establish an SSL connection
|
2014-01-09 16:56:42 +00:00
|
|
|
"""
|
2014-02-04 01:56:59 +00:00
|
|
|
client_ssl = False
|
|
|
|
server_ssl = False
|
|
|
|
|
2014-01-09 16:56:42 +00:00
|
|
|
if self.config.transparent_proxy:
|
2014-01-28 16:28:20 +00:00
|
|
|
client_ssl = server_ssl = (self.server_conn.address.port in self.config.transparent_proxy["sslports"])
|
2014-01-09 16:56:42 +00:00
|
|
|
elif self.config.reverse_proxy:
|
|
|
|
client_ssl = server_ssl = (self.config.reverse_proxy[0] == "https")
|
|
|
|
# TODO: Make protocol generic (as with transparent proxies)
|
|
|
|
# TODO: Add SSL-terminating capatbility (SSL -> mitmproxy -> plain and vice versa)
|
2014-02-04 01:56:59 +00:00
|
|
|
if client_ssl or server_ssl:
|
|
|
|
self.establish_server_connection()
|
|
|
|
self.establish_ssl(client=client_ssl, server=server_ssl)
|
2014-01-09 16:56:42 +00:00
|
|
|
|
2014-02-04 01:56:59 +00:00
|
|
|
def del_server_connection(self):
|
|
|
|
"""
|
|
|
|
Deletes an existing server connection.
|
|
|
|
"""
|
|
|
|
if self.server_conn and self.server_conn.connection:
|
|
|
|
self.server_conn.finish()
|
|
|
|
self.log("serverdisconnect", ["%s:%s" % (self.server_conn.address.host, self.server_conn.address.port)])
|
|
|
|
self.channel.tell("serverdisconnect", self)
|
|
|
|
self.server_conn = None
|
|
|
|
self.sni = None
|
2014-01-09 04:34:29 +00:00
|
|
|
|
|
|
|
def determine_conntype(self):
|
2014-01-05 00:03:55 +00:00
|
|
|
#TODO: Add ruleset to select correct protocol depending on mode/target port etc.
|
|
|
|
self.conntype = "http"
|
|
|
|
|
2014-02-04 01:56:59 +00:00
|
|
|
def set_server_address(self, address, priority):
|
2014-01-05 00:03:55 +00:00
|
|
|
"""
|
2014-02-06 21:16:26 +00:00
|
|
|
Sets a new server address with the given priority.
|
|
|
|
Does not re-establish either connection or SSL handshake.
|
2014-02-04 01:56:59 +00:00
|
|
|
@type priority: AddressPriority
|
2014-01-05 00:03:55 +00:00
|
|
|
"""
|
2014-02-04 01:56:59 +00:00
|
|
|
address = tcp.Address.wrap(address)
|
|
|
|
|
2014-02-06 21:16:26 +00:00
|
|
|
if self.server_conn:
|
|
|
|
if self.server_conn.priority > priority:
|
|
|
|
self.log("Attempt to change server address, "
|
|
|
|
"but priority is too low (is: %s, got: %s)" % (self.server_conn.priority, priority))
|
|
|
|
return
|
|
|
|
if self.server_conn.address == address:
|
|
|
|
self.server_conn.priority = priority # Possibly increase priority
|
|
|
|
return
|
2014-02-04 01:56:59 +00:00
|
|
|
|
|
|
|
self.del_server_connection()
|
2014-02-06 21:16:26 +00:00
|
|
|
|
|
|
|
self.log("Set new server address: %s:%s" % (address.host, address.port))
|
|
|
|
self.server_conn = ServerConnection(address, priority)
|
2014-02-04 01:56:59 +00:00
|
|
|
|
|
|
|
def establish_server_connection(self):
|
|
|
|
"""
|
|
|
|
Establishes a new server connection.
|
|
|
|
If there is already an existing server connection, the function returns immediately.
|
|
|
|
"""
|
|
|
|
if self.server_conn.connection:
|
|
|
|
return
|
|
|
|
self.log("serverconnect", ["%s:%s" % self.server_conn.address()[:2]])
|
|
|
|
self.channel.tell("serverconnect", self)
|
2014-01-18 14:35:37 +00:00
|
|
|
try:
|
|
|
|
self.server_conn.connect()
|
|
|
|
except tcp.NetLibError, v:
|
|
|
|
raise ProxyError(502, v)
|
2014-01-05 00:03:55 +00:00
|
|
|
|
2014-01-18 16:15:33 +00:00
|
|
|
def establish_ssl(self, client=False, server=False):
|
2014-01-10 00:38:28 +00:00
|
|
|
"""
|
|
|
|
Establishes SSL on the existing connection(s) to the server or the client,
|
|
|
|
as specified by the parameters. If the target server is on the pass-through list,
|
2014-02-04 01:56:59 +00:00
|
|
|
the conntype attribute will be changed and the SSL connection won't be wrapped.
|
2014-01-10 00:38:28 +00:00
|
|
|
A protocol handler must raise a ConnTypeChanged exception if it detects that this is happening
|
|
|
|
"""
|
2014-01-05 00:03:55 +00:00
|
|
|
# TODO: Implement SSL pass-through handling and change conntype
|
2014-01-31 03:45:39 +00:00
|
|
|
passthrough = [
|
2014-02-06 22:05:53 +00:00
|
|
|
# "echo.websocket.org",
|
|
|
|
# "174.129.224.73" # echo.websocket.org, transparent mode
|
2014-01-31 03:45:39 +00:00
|
|
|
]
|
2014-01-31 02:01:51 +00:00
|
|
|
if self.server_conn.address.host in passthrough or self.sni in passthrough:
|
2014-01-09 16:56:42 +00:00
|
|
|
self.conntype = "tcp"
|
2014-01-31 02:01:51 +00:00
|
|
|
return
|
|
|
|
|
2014-02-04 01:56:59 +00:00
|
|
|
# Logging
|
2014-01-31 02:01:51 +00:00
|
|
|
if client or server:
|
|
|
|
subs = []
|
|
|
|
if client:
|
|
|
|
subs.append("with client")
|
|
|
|
if server:
|
|
|
|
subs.append("with server (sni: %s)" % self.sni)
|
|
|
|
self.log("Establish SSL", subs)
|
2014-01-09 16:56:42 +00:00
|
|
|
|
|
|
|
if server:
|
|
|
|
if self.server_conn.ssl_established:
|
|
|
|
raise ProxyError(502, "SSL to Server already established.")
|
2014-02-06 21:16:26 +00:00
|
|
|
self.establish_server_connection() # make sure there is a server connection.
|
2014-01-09 04:34:29 +00:00
|
|
|
self.server_conn.establish_ssl(self.config.clientcerts, self.sni)
|
2014-01-09 16:56:42 +00:00
|
|
|
if client:
|
|
|
|
if self.client_conn.ssl_established:
|
|
|
|
raise ProxyError(502, "SSL to Client already established.")
|
2014-01-07 01:29:10 +00:00
|
|
|
dummycert = self.find_cert()
|
2014-03-02 04:35:41 +00:00
|
|
|
self.client_conn.convert_to_ssl(
|
|
|
|
dummycert,
|
|
|
|
self.config.keyfile or self.config.cacert,
|
|
|
|
handle_sni = self.handle_sni,
|
|
|
|
cipher_list = self.config.ciphers
|
|
|
|
)
|
2014-01-05 00:03:55 +00:00
|
|
|
|
2014-01-18 21:57:28 +00:00
|
|
|
def server_reconnect(self, no_ssl=False):
|
2014-02-04 01:56:59 +00:00
|
|
|
address = self.server_conn.address
|
|
|
|
had_ssl = self.server_conn.ssl_established
|
2014-02-06 21:16:26 +00:00
|
|
|
priority = self.server_conn.priority
|
2014-02-04 01:56:59 +00:00
|
|
|
sni = self.sni
|
2014-01-31 02:01:51 +00:00
|
|
|
self.log("(server reconnect follows)")
|
2014-02-04 01:56:59 +00:00
|
|
|
self.del_server_connection()
|
|
|
|
self.set_server_address(address, priority)
|
|
|
|
self.establish_server_connection()
|
2014-01-18 21:57:28 +00:00
|
|
|
if had_ssl and not no_ssl:
|
2014-01-18 16:15:33 +00:00
|
|
|
self.sni = sni
|
|
|
|
self.establish_ssl(server=True)
|
|
|
|
|
2014-02-04 01:56:59 +00:00
|
|
|
def finish(self):
|
|
|
|
self.client_conn.finish()
|
|
|
|
|
2014-01-05 00:03:55 +00:00
|
|
|
def log(self, msg, subs=()):
|
2012-06-30 12:15:03 +00:00
|
|
|
msg = [
|
2014-01-28 16:28:20 +00:00
|
|
|
"%s:%s: %s" % (self.client_conn.address.host, self.client_conn.address.port, msg)
|
2012-06-30 12:15:03 +00:00
|
|
|
]
|
|
|
|
for i in subs:
|
2014-01-18 16:15:33 +00:00
|
|
|
msg.append(" -> " + i)
|
2012-06-30 12:15:03 +00:00
|
|
|
msg = "\n".join(msg)
|
2014-01-09 04:34:29 +00:00
|
|
|
self.channel.tell("log", Log(msg))
|
2012-06-30 12:15:03 +00:00
|
|
|
|
2014-01-07 01:29:10 +00:00
|
|
|
def find_cert(self):
|
2011-02-19 23:53:42 +00:00
|
|
|
if self.config.certfile:
|
2013-12-10 02:13:37 +00:00
|
|
|
with open(self.config.certfile, "rb") as f:
|
|
|
|
return certutils.SSLCert.from_pem(f.read())
|
2011-02-08 17:00:59 +00:00
|
|
|
else:
|
2014-01-28 16:28:20 +00:00
|
|
|
host = self.server_conn.address.host
|
2012-02-27 02:05:45 +00:00
|
|
|
sans = []
|
2014-01-07 01:29:10 +00:00
|
|
|
if not self.config.no_upstream_cert or not self.server_conn.ssl_established:
|
|
|
|
upstream_cert = self.server_conn.cert
|
|
|
|
if upstream_cert.cn:
|
|
|
|
host = upstream_cert.cn.decode("utf8").encode("idna")
|
|
|
|
sans = upstream_cert.altnames
|
|
|
|
|
2014-03-02 02:14:22 +00:00
|
|
|
ret = self.config.certstore.get_cert(host, sans)
|
2011-02-19 23:53:42 +00:00
|
|
|
if not ret:
|
2013-03-02 03:59:16 +00:00
|
|
|
raise ProxyError(502, "Unable to generate dummy cert.")
|
2011-02-19 23:53:42 +00:00
|
|
|
return ret
|
2011-02-08 17:00:59 +00:00
|
|
|
|
2014-01-07 01:29:10 +00:00
|
|
|
def handle_sni(self, connection):
|
2012-06-26 11:51:38 +00:00
|
|
|
"""
|
2014-01-07 01:29:10 +00:00
|
|
|
This callback gets called during the SSL handshake with the client.
|
|
|
|
The client has just sent the Sever Name Indication (SNI). We now connect upstream to
|
|
|
|
figure out which certificate needs to be served.
|
2012-06-26 11:51:38 +00:00
|
|
|
"""
|
2011-01-27 01:19:48 +00:00
|
|
|
try:
|
2014-01-07 01:29:10 +00:00
|
|
|
sn = connection.get_servername()
|
|
|
|
if sn and sn != self.sni:
|
|
|
|
self.sni = sn.decode("utf8").encode("idna")
|
2014-02-04 01:56:59 +00:00
|
|
|
self.log("SNI received: %s" % self.sni)
|
2014-01-29 01:49:11 +00:00
|
|
|
self.server_reconnect() # reconnect to upstream server with SNI
|
2014-01-07 01:29:10 +00:00
|
|
|
# Now, change client context to reflect changed certificate:
|
|
|
|
new_context = SSL.Context(SSL.TLSv1_METHOD)
|
|
|
|
new_context.use_privatekey_file(self.config.certfile or self.config.cacert)
|
|
|
|
dummycert = self.find_cert()
|
|
|
|
new_context.use_certificate(dummycert.x509)
|
|
|
|
connection.set_context(new_context)
|
|
|
|
# An unhandled exception in this method will core dump PyOpenSSL, so
|
|
|
|
# make dang sure it doesn't happen.
|
2014-02-04 01:56:59 +00:00
|
|
|
except Exception, e: # pragma: no cover
|
2011-01-27 01:19:48 +00:00
|
|
|
pass
|
2010-02-16 04:09:07 +00:00
|
|
|
|
2014-01-18 16:15:33 +00:00
|
|
|
|
2014-02-04 01:56:59 +00:00
|
|
|
class ProxyServerError(Exception):
|
|
|
|
pass
|
2011-03-12 00:47:37 +00:00
|
|
|
|
2012-06-15 23:40:44 +00:00
|
|
|
|
2012-06-18 21:58:50 +00:00
|
|
|
class ProxyServer(tcp.TCPServer):
|
2010-02-16 04:09:07 +00:00
|
|
|
allow_reuse_address = True
|
2012-04-02 01:24:51 +00:00
|
|
|
bound = True
|
2014-01-28 16:28:20 +00:00
|
|
|
def __init__(self, config, port, host='', server_version=version.NAMEVERSION):
|
2011-03-12 00:47:37 +00:00
|
|
|
"""
|
|
|
|
Raises ProxyServerError if there's a startup problem.
|
|
|
|
"""
|
2014-01-28 16:28:20 +00:00
|
|
|
self.config = config
|
2012-07-03 02:12:52 +00:00
|
|
|
self.server_version = server_version
|
2011-03-12 00:47:37 +00:00
|
|
|
try:
|
2014-01-28 16:28:20 +00:00
|
|
|
tcp.TCPServer.__init__(self, (host, port))
|
2011-03-12 00:47:37 +00:00
|
|
|
except socket.error, v:
|
|
|
|
raise ProxyServerError('Error starting proxy server: ' + v.strerror)
|
2013-02-16 23:42:48 +00:00
|
|
|
self.channel = None
|
2010-02-16 04:09:07 +00:00
|
|
|
|
2013-02-16 23:42:48 +00:00
|
|
|
def start_slave(self, klass, channel):
|
|
|
|
slave = klass(channel, self)
|
2012-04-02 01:24:51 +00:00
|
|
|
slave.start()
|
|
|
|
|
2013-02-16 23:42:48 +00:00
|
|
|
def set_channel(self, channel):
|
|
|
|
self.channel = channel
|
2010-02-16 04:09:07 +00:00
|
|
|
|
2014-01-05 00:03:55 +00:00
|
|
|
def handle_client_connection(self, conn, client_address):
|
|
|
|
h = ConnectionHandler(self.config, conn, client_address, self, self.channel, self.server_version)
|
2012-06-24 23:37:12 +00:00
|
|
|
h.handle()
|
2013-03-02 23:13:33 +00:00
|
|
|
h.finish()
|
2010-02-16 04:09:07 +00:00
|
|
|
|
2011-02-19 23:53:42 +00:00
|
|
|
|
2012-04-02 01:24:51 +00:00
|
|
|
class DummyServer:
|
|
|
|
bound = False
|
2014-01-18 16:15:33 +00:00
|
|
|
|
2012-04-02 01:24:51 +00:00
|
|
|
def __init__(self, config):
|
|
|
|
self.config = config
|
|
|
|
|
2013-03-02 23:13:33 +00:00
|
|
|
def start_slave(self, *args):
|
2012-04-02 01:24:51 +00:00
|
|
|
pass
|
|
|
|
|
|
|
|
def shutdown(self):
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
2011-02-19 23:53:42 +00:00
|
|
|
# Command-line utils
|
2014-03-02 04:27:24 +00:00
|
|
|
def ssl_option_group(parser):
|
2012-08-17 17:04:39 +00:00
|
|
|
group = parser.add_argument_group("SSL")
|
|
|
|
group.add_argument(
|
2014-03-02 04:27:24 +00:00
|
|
|
"--certfile", action="store",
|
|
|
|
type=str, dest="certfile", default=None,
|
|
|
|
help="SSL certificate in PEM format, optionally with the key in the same file."
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"--keyfile", action="store",
|
|
|
|
type=str, dest="keyfile", default=None,
|
|
|
|
help="Key matching certfile."
|
2011-02-19 23:53:42 +00:00
|
|
|
)
|
2012-08-17 17:04:39 +00:00
|
|
|
group.add_argument(
|
2012-05-23 21:09:03 +00:00
|
|
|
"--client-certs", action="store",
|
2014-01-18 16:15:33 +00:00
|
|
|
type=str, dest="clientcerts", default=None,
|
|
|
|
help="Client certificate directory."
|
2012-05-23 21:09:03 +00:00
|
|
|
)
|
2014-03-02 04:35:41 +00:00
|
|
|
group.add_argument(
|
|
|
|
"--ciphers", action="store",
|
|
|
|
type=str, dest="ciphers", default=None,
|
|
|
|
help="SSL cipher specification."
|
|
|
|
)
|
2011-02-19 23:53:42 +00:00
|
|
|
|
|
|
|
|
2011-09-09 03:27:31 +00:00
|
|
|
def process_proxy_options(parser, options):
|
2014-03-02 04:27:24 +00:00
|
|
|
if options.certfile:
|
|
|
|
options.certfile = os.path.expanduser(options.certfile)
|
|
|
|
if not os.path.exists(options.certfile):
|
|
|
|
return parser.error("Certificate file does not exist: %s" % options.certfile)
|
|
|
|
|
|
|
|
if options.keyfile:
|
|
|
|
options.keyfile = os.path.expanduser(options.keyfile)
|
|
|
|
if not os.path.exists(options.keyfile):
|
|
|
|
return parser.error("Key file does not exist: %s" % options.keyfile)
|
|
|
|
|
|
|
|
if options.certfile and not options.keyfile:
|
|
|
|
options.keyfile = options.certfile
|
2011-03-18 03:45:31 +00:00
|
|
|
|
2014-03-02 04:27:24 +00:00
|
|
|
cacert = os.path.join(options.confdir, CA_CERT_NAME)
|
2011-03-18 03:45:31 +00:00
|
|
|
cacert = os.path.expanduser(cacert)
|
|
|
|
if not os.path.exists(cacert):
|
2012-02-29 00:20:53 +00:00
|
|
|
certutils.dummy_ca(cacert)
|
2011-09-09 03:27:31 +00:00
|
|
|
body_size_limit = utils.parse_size(options.body_size_limit)
|
2012-06-26 08:08:24 +00:00
|
|
|
if options.reverse_proxy and options.transparent_proxy:
|
2013-03-02 22:58:57 +00:00
|
|
|
return parser.error("Can't set both reverse proxy and transparent proxy.")
|
2012-06-26 08:08:24 +00:00
|
|
|
|
|
|
|
if options.transparent_proxy:
|
2012-06-29 23:24:41 +00:00
|
|
|
if not platform.resolver:
|
2013-03-02 22:58:57 +00:00
|
|
|
return parser.error("Transparent mode not supported on this platform.")
|
2012-06-26 08:08:24 +00:00
|
|
|
trans = dict(
|
2014-01-18 16:15:33 +00:00
|
|
|
resolver=platform.resolver(),
|
|
|
|
sslports=TRANSPARENT_SSL_PORTS
|
2012-06-26 08:08:24 +00:00
|
|
|
)
|
|
|
|
else:
|
|
|
|
trans = None
|
|
|
|
|
2012-02-18 01:45:22 +00:00
|
|
|
if options.reverse_proxy:
|
|
|
|
rp = utils.parse_proxy_spec(options.reverse_proxy)
|
|
|
|
if not rp:
|
2014-01-18 16:15:33 +00:00
|
|
|
return parser.error("Invalid reverse proxy specification: %s" % options.reverse_proxy)
|
2012-02-18 01:45:22 +00:00
|
|
|
else:
|
|
|
|
rp = None
|
|
|
|
|
2013-08-31 00:14:18 +00:00
|
|
|
if options.forward_proxy:
|
|
|
|
fp = utils.parse_proxy_spec(options.forward_proxy)
|
|
|
|
if not fp:
|
2014-01-18 16:15:33 +00:00
|
|
|
return parser.error("Invalid forward proxy specification: %s" % options.forward_proxy)
|
2013-08-31 00:14:18 +00:00
|
|
|
else:
|
|
|
|
fp = None
|
|
|
|
|
2012-05-23 21:09:03 +00:00
|
|
|
if options.clientcerts:
|
|
|
|
options.clientcerts = os.path.expanduser(options.clientcerts)
|
|
|
|
if not os.path.exists(options.clientcerts) or not os.path.isdir(options.clientcerts):
|
2014-01-04 21:58:53 +00:00
|
|
|
return parser.error(
|
2014-01-18 16:15:33 +00:00
|
|
|
"Client certificate directory does not exist or is not a directory: %s" % options.clientcerts
|
|
|
|
)
|
2012-05-23 21:09:03 +00:00
|
|
|
|
2013-01-02 04:35:44 +00:00
|
|
|
if (options.auth_nonanonymous or options.auth_singleuser or options.auth_htpasswd):
|
|
|
|
if options.auth_singleuser:
|
|
|
|
if len(options.auth_singleuser.split(':')) != 2:
|
2013-03-02 22:58:57 +00:00
|
|
|
return parser.error("Invalid single-user specification. Please use the format username:password")
|
2012-12-30 09:41:58 +00:00
|
|
|
username, password = options.auth_singleuser.split(':')
|
2013-03-02 21:37:06 +00:00
|
|
|
password_manager = http_auth.PassManSingleUser(username, password)
|
2013-01-02 04:35:44 +00:00
|
|
|
elif options.auth_nonanonymous:
|
2013-03-02 21:37:06 +00:00
|
|
|
password_manager = http_auth.PassManNonAnon()
|
2012-12-30 09:41:58 +00:00
|
|
|
elif options.auth_htpasswd:
|
2013-03-02 22:58:57 +00:00
|
|
|
try:
|
|
|
|
password_manager = http_auth.PassManHtpasswd(options.auth_htpasswd)
|
|
|
|
except ValueError, v:
|
|
|
|
return parser.error(v.message)
|
2013-03-02 21:37:06 +00:00
|
|
|
authenticator = http_auth.BasicProxyAuth(password_manager, "mitmproxy")
|
2012-12-30 09:41:58 +00:00
|
|
|
else:
|
2013-03-02 21:37:06 +00:00
|
|
|
authenticator = http_auth.NullProxyAuth(None)
|
2012-12-30 09:41:58 +00:00
|
|
|
|
2011-09-09 02:49:34 +00:00
|
|
|
return ProxyConfig(
|
2014-03-02 04:27:24 +00:00
|
|
|
certfile=options.certfile,
|
|
|
|
keyfile=options.keyfile,
|
2014-01-18 16:15:33 +00:00
|
|
|
cacert=cacert,
|
|
|
|
clientcerts=options.clientcerts,
|
|
|
|
body_size_limit=body_size_limit,
|
|
|
|
no_upstream_cert=options.no_upstream_cert,
|
|
|
|
reverse_proxy=rp,
|
|
|
|
forward_proxy=fp,
|
|
|
|
transparent_proxy=trans,
|
2014-03-02 04:35:41 +00:00
|
|
|
authenticator=authenticator,
|
|
|
|
ciphers=options.ciphers,
|
2011-02-19 23:53:42 +00:00
|
|
|
)
|