2012-04-28 00:42:03 +00:00
|
|
|
#!/usr/bin/env python
|
2014-08-31 00:09:04 +00:00
|
|
|
import argparse, sys, logging, logging.handlers, os
|
|
|
|
from . import pathoc as _pathoc, pathod as _pathod, utils, version, language
|
|
|
|
from netlib import tcp, http_uastrings
|
2012-04-28 00:42:03 +00:00
|
|
|
|
2012-08-23 00:00:16 +00:00
|
|
|
|
2014-08-31 00:09:04 +00:00
|
|
|
def pathoc():
|
|
|
|
preparser = argparse.ArgumentParser(add_help=False)
|
|
|
|
preparser.add_argument(
|
|
|
|
"--show-uas", dest="showua", action="store_true", default=False,
|
|
|
|
help="Print user agent shortcuts and exit."
|
|
|
|
)
|
|
|
|
pa = preparser.parse_known_args()[0]
|
|
|
|
if pa.showua:
|
|
|
|
print "User agent strings:"
|
|
|
|
for i in http_uastrings.UASTRINGS:
|
|
|
|
print " ", i[1], i[0]
|
|
|
|
sys.exit(0)
|
|
|
|
|
|
|
|
parser = argparse.ArgumentParser(description='A perverse HTTP client.', parents=[preparser])
|
|
|
|
parser.add_argument('--version', action='version', version="pathoc " + version.VERSION)
|
|
|
|
parser.add_argument(
|
|
|
|
"-c", dest="connect_to", type=str, default=False,
|
|
|
|
metavar = "HOST:PORT",
|
|
|
|
help="Issue an HTTP CONNECT to connect to the specified host."
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"-n", dest='repeat', default=1, type=int, metavar="N",
|
|
|
|
help='Repeat requests N times'
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"-p", dest="port", type=int, default=None,
|
|
|
|
help="Port. Defaults to 80, or 443 if SSL is active"
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"-t", dest="timeout", type=int, default=None,
|
|
|
|
help="Connection timeout"
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
'host', type=str,
|
|
|
|
help='Host to connect to'
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
'request', type=str, nargs="+",
|
|
|
|
help='Request specification'
|
|
|
|
)
|
|
|
|
|
|
|
|
group = parser.add_argument_group(
|
|
|
|
'SSL',
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-s", dest="ssl", action="store_true", default=False,
|
|
|
|
help="Connect with SSL"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-C", dest="clientcert", type=str, default=False,
|
|
|
|
help="Path to a file containing client certificate and private key"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-i", dest="sni", type=str, default=False,
|
|
|
|
help="SSL Server Name Indication"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"--ciphers", dest="ciphers", type=str, default=False,
|
|
|
|
help="SSL cipher specification"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"--sslversion", dest="sslversion", type=int, default=4,
|
|
|
|
choices=[1, 2, 3, 4],
|
|
|
|
help="Use a specified protocol - TLSv1, SSLv2, SSLv3, SSLv23. Default to SSLv23."
|
|
|
|
)
|
|
|
|
|
|
|
|
group = parser.add_argument_group(
|
|
|
|
'Controlling Output',
|
|
|
|
"""
|
|
|
|
Some of these options expand generated values for logging - if
|
|
|
|
you're generating large data, use them with caution.
|
|
|
|
"""
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-I", dest="ignorecodes", type=str, default="",
|
|
|
|
help="Comma-separated list of response codes to ignore"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-S", dest="showssl", action="store_true", default=False,
|
|
|
|
help="Show info on SSL connection"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-e", dest="explain", action="store_true", default=False,
|
|
|
|
help="Explain requests"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-o", dest="oneshot", action="store_true", default=False,
|
|
|
|
help="Oneshot - exit after first non-ignored response"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-q", dest="showreq", action="store_true", default=False,
|
|
|
|
help="Print full request"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-r", dest="showresp", action="store_true", default=False,
|
|
|
|
help="Print full response"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-T", dest="ignoretimeout", action="store_true", default=False,
|
|
|
|
help="Ignore timeouts"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-x", dest="hexdump", action="store_true", default=False,
|
|
|
|
help="Output in hexdump format"
|
|
|
|
)
|
|
|
|
|
|
|
|
args = parser.parse_args()
|
|
|
|
|
|
|
|
if args.port is None:
|
|
|
|
port = 443 if args.ssl else 80
|
|
|
|
else:
|
|
|
|
port = args.port
|
|
|
|
|
|
|
|
try:
|
|
|
|
codes = [int(i) for i in args.ignorecodes.split(",") if i]
|
|
|
|
except ValueError:
|
|
|
|
parser.error("Invalid return code specification: %s"%args.ignorecodes)
|
|
|
|
|
|
|
|
if args.connect_to:
|
|
|
|
parts = args.connect_to.split(":")
|
|
|
|
if len(parts) != 2:
|
|
|
|
parser.error("Invalid CONNECT specification: %s"%args.connect_to)
|
|
|
|
try:
|
|
|
|
parts[1] = int(parts[1])
|
|
|
|
except ValueError:
|
|
|
|
parser.error("Invalid CONNECT specification: %s"%args.connect_to)
|
|
|
|
connect_to = parts
|
|
|
|
else:
|
|
|
|
connect_to = None
|
|
|
|
|
|
|
|
try:
|
|
|
|
for i in range(args.repeat):
|
|
|
|
p = _pathoc.Pathoc(
|
|
|
|
(args.host, port),
|
|
|
|
ssl=args.ssl,
|
|
|
|
sni=args.sni,
|
|
|
|
sslversion=args.sslversion,
|
|
|
|
clientcert=args.clientcert,
|
|
|
|
ciphers=args.ciphers
|
|
|
|
)
|
|
|
|
try:
|
|
|
|
p.connect(connect_to)
|
|
|
|
except (tcp.NetLibError, _pathoc.PathocError), v:
|
|
|
|
print >> sys.stderr, str(v)
|
|
|
|
sys.exit(1)
|
|
|
|
if args.timeout:
|
|
|
|
p.settimeout(args.timeout)
|
|
|
|
for spec in args.request:
|
|
|
|
ret = p.print_request(
|
|
|
|
spec,
|
|
|
|
showreq=args.showreq,
|
|
|
|
showresp=args.showresp,
|
|
|
|
explain=args.explain,
|
|
|
|
showssl=args.showssl,
|
|
|
|
hexdump=args.hexdump,
|
|
|
|
ignorecodes=codes,
|
|
|
|
ignoretimeout=args.ignoretimeout
|
|
|
|
)
|
|
|
|
sys.stdout.flush()
|
|
|
|
if ret and args.oneshot:
|
|
|
|
sys.exit(0)
|
|
|
|
except KeyboardInterrupt:
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
|
|
|
def daemonize(stdin='/dev/null', stdout='/dev/null', stderr='/dev/null'):
|
2012-08-16 04:07:23 +00:00
|
|
|
try:
|
|
|
|
pid = os.fork()
|
|
|
|
if pid > 0:
|
|
|
|
sys.exit(0)
|
|
|
|
except OSError, e:
|
2014-08-31 00:09:04 +00:00
|
|
|
sys.stderr.write("fork #1 failed: (%d) %s\n" % (e.errno, e.strerror))
|
2012-08-16 04:07:23 +00:00
|
|
|
sys.exit(1)
|
|
|
|
os.chdir("/")
|
|
|
|
os.umask(0)
|
|
|
|
os.setsid()
|
|
|
|
try:
|
|
|
|
pid = os.fork()
|
|
|
|
if pid > 0:
|
|
|
|
sys.exit(0)
|
|
|
|
except OSError, e:
|
2014-08-31 00:09:04 +00:00
|
|
|
sys.stderr.write("fork #2 failed: (%d) %s\n" % (e.errno, e.strerror))
|
2012-08-16 04:07:23 +00:00
|
|
|
sys.exit(1)
|
2013-08-19 17:21:47 +00:00
|
|
|
si = open(stdin, 'rb')
|
|
|
|
so = open(stdout, 'a+b')
|
|
|
|
se = open(stderr, 'a+b', 0)
|
2012-08-16 04:07:23 +00:00
|
|
|
os.dup2(si.fileno(), sys.stdin.fileno())
|
|
|
|
os.dup2(so.fileno(), sys.stdout.fileno())
|
|
|
|
os.dup2(se.fileno(), sys.stderr.fileno())
|
|
|
|
|
2012-06-21 02:29:49 +00:00
|
|
|
|
2014-08-31 00:09:04 +00:00
|
|
|
def pathod_main(parser, args):
|
2014-03-05 02:03:31 +00:00
|
|
|
certs = []
|
|
|
|
for i in args.ssl_certs:
|
|
|
|
parts = i.split("=", 1)
|
|
|
|
if len(parts) == 1:
|
|
|
|
parts = ["*", parts[0]]
|
|
|
|
parts[1] = os.path.expanduser(parts[1])
|
|
|
|
if not os.path.exists(parts[1]):
|
|
|
|
parser.error("Certificate file does not exist: %s"%parts[1])
|
|
|
|
certs.append(parts)
|
|
|
|
|
2014-08-31 00:09:04 +00:00
|
|
|
ssloptions = _pathod.SSLOptions(
|
2014-03-02 00:45:35 +00:00
|
|
|
cn = args.cn,
|
|
|
|
confdir = args.confdir,
|
|
|
|
not_after_connect = args.ssl_not_after_connect,
|
|
|
|
ciphers = args.ciphers,
|
2014-03-05 02:03:31 +00:00
|
|
|
sslversion = utils.SSLVERSIONS[args.sslversion],
|
|
|
|
certs = certs
|
2013-01-05 03:48:49 +00:00
|
|
|
)
|
2012-06-21 02:29:49 +00:00
|
|
|
|
2012-06-24 04:38:32 +00:00
|
|
|
alst = []
|
|
|
|
for i in args.anchors:
|
|
|
|
parts = utils.parse_anchor_spec(i)
|
|
|
|
if not parts:
|
|
|
|
parser.error("Invalid anchor specification: %s"%i)
|
|
|
|
alst.append(parts)
|
|
|
|
|
2012-06-24 09:40:31 +00:00
|
|
|
root = logging.getLogger()
|
|
|
|
if root.handlers:
|
|
|
|
for handler in root.handlers:
|
|
|
|
root.removeHandler(handler)
|
2012-08-23 00:00:16 +00:00
|
|
|
|
|
|
|
log = logging.getLogger('pathod')
|
|
|
|
log.setLevel(logging.DEBUG)
|
|
|
|
fmt = logging.Formatter(
|
|
|
|
'%(asctime)s: %(message)s',
|
2012-08-23 05:22:17 +00:00
|
|
|
datefmt='%d-%m-%y %H:%M:%S',
|
2012-06-24 09:40:31 +00:00
|
|
|
)
|
2012-07-27 02:03:15 +00:00
|
|
|
if args.logfile:
|
2012-08-23 00:00:16 +00:00
|
|
|
fh = logging.handlers.WatchedFileHandler(args.logfile)
|
|
|
|
fh.setFormatter(fmt)
|
|
|
|
log.addHandler(fh)
|
|
|
|
if not args.daemonize:
|
|
|
|
sh = logging.StreamHandler()
|
|
|
|
sh.setFormatter(fmt)
|
|
|
|
log.addHandler(sh)
|
2012-06-24 09:40:31 +00:00
|
|
|
|
2012-07-23 03:03:56 +00:00
|
|
|
sizelimit = None
|
|
|
|
if args.sizelimit:
|
|
|
|
try:
|
|
|
|
sizelimit = utils.parse_size(args.sizelimit)
|
|
|
|
except ValueError, v:
|
|
|
|
parser.error(v)
|
|
|
|
|
2012-06-24 04:38:32 +00:00
|
|
|
try:
|
2014-08-31 00:09:04 +00:00
|
|
|
pd = _pathod.Pathod(
|
2012-06-24 04:38:32 +00:00
|
|
|
(args.address, args.port),
|
2012-07-24 09:51:43 +00:00
|
|
|
craftanchor = args.craftanchor,
|
2013-01-05 03:48:49 +00:00
|
|
|
ssl = args.ssl,
|
2013-01-05 02:25:09 +00:00
|
|
|
ssloptions = ssloptions,
|
2012-06-24 04:38:32 +00:00
|
|
|
staticdir = args.staticdir,
|
2012-07-23 03:03:56 +00:00
|
|
|
anchors = alst,
|
|
|
|
sizelimit = sizelimit,
|
2012-07-23 09:39:31 +00:00
|
|
|
noweb = args.noweb,
|
2012-07-23 11:31:26 +00:00
|
|
|
nocraft = args.nocraft,
|
2012-07-27 02:03:15 +00:00
|
|
|
noapi = args.noapi,
|
2012-09-30 23:01:02 +00:00
|
|
|
nohang = args.nohang,
|
2012-09-30 23:48:26 +00:00
|
|
|
timeout = args.timeout,
|
|
|
|
logreq = args.logreq,
|
|
|
|
logresp = args.logresp,
|
2012-10-30 22:23:53 +00:00
|
|
|
hexdump = args.hexdump,
|
2013-01-05 02:25:09 +00:00
|
|
|
explain = args.explain,
|
2012-06-24 04:38:32 +00:00
|
|
|
)
|
2014-08-31 00:09:04 +00:00
|
|
|
except _pathod.PathodError, v:
|
2012-06-24 04:38:32 +00:00
|
|
|
parser.error(str(v))
|
2012-10-04 21:30:32 +00:00
|
|
|
except language.FileAccessDenied, v:
|
2012-07-29 04:10:22 +00:00
|
|
|
parser.error("%s You probably want to a -d argument."%str(v))
|
|
|
|
|
2012-06-21 02:29:49 +00:00
|
|
|
try:
|
2014-02-27 05:33:48 +00:00
|
|
|
print "%s listening on %s:%s"%(version.NAMEVERSION, pd.address.host, pd.address.port)
|
2012-06-21 02:29:49 +00:00
|
|
|
pd.serve_forever()
|
|
|
|
except KeyboardInterrupt:
|
|
|
|
pass
|
2012-08-16 04:07:23 +00:00
|
|
|
|
|
|
|
|
2014-08-31 00:09:04 +00:00
|
|
|
def pathod():
|
2012-08-16 04:07:23 +00:00
|
|
|
parser = argparse.ArgumentParser(description='A pathological HTTP/S daemon.')
|
2013-05-15 06:56:05 +00:00
|
|
|
parser.add_argument('--version', action='version', version="pathod " + version.VERSION)
|
2012-08-16 04:07:23 +00:00
|
|
|
parser.add_argument("-p", dest='port', default=9999, type=int, help='Port. Specify 0 to pick an arbitrary empty port.')
|
|
|
|
parser.add_argument("-l", dest='address', default="127.0.0.1", type=str, help='Listening address.')
|
|
|
|
parser.add_argument(
|
|
|
|
"-a", dest='anchors', default=[], type=str, action="append", metavar="ANCHOR",
|
|
|
|
help='Add an anchor. Specified as a string with the form pattern=pagespec'
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"-c", dest='craftanchor', default="/p/", type=str,
|
|
|
|
help='Anchorpoint for URL crafting commands.'
|
|
|
|
)
|
2014-03-02 00:45:35 +00:00
|
|
|
parser.add_argument(
|
|
|
|
"--confdir",
|
|
|
|
action="store", type = str, dest="confdir", default='~/.mitmproxy',
|
|
|
|
help = "Configuration directory. (~/.mitmproxy)"
|
|
|
|
)
|
2012-08-16 04:07:23 +00:00
|
|
|
parser.add_argument(
|
|
|
|
"-d", dest='staticdir', default=None, type=str,
|
|
|
|
help='Directory for static files.'
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"-D", dest='daemonize', default=False, action="store_true",
|
|
|
|
help='Daemonize.'
|
|
|
|
)
|
2012-09-30 23:01:02 +00:00
|
|
|
parser.add_argument(
|
|
|
|
"-t", dest="timeout", type=int, default=None,
|
|
|
|
help="Connection timeout"
|
|
|
|
)
|
2012-08-16 04:07:23 +00:00
|
|
|
parser.add_argument(
|
|
|
|
"--limit-size", dest='sizelimit', default=None, type=str,
|
|
|
|
help='Size limit of served responses. Understands size suffixes, i.e. 100k.'
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"--noapi", dest='noapi', default=False, action="store_true",
|
|
|
|
help='Disable API.'
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"--nohang", dest='nohang', default=False, action="store_true",
|
|
|
|
help='Disable pauses during crafted response generation.'
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"--noweb", dest='noweb', default=False, action="store_true",
|
|
|
|
help='Disable both web interface and API.'
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"--nocraft", dest='nocraft', default=False, action="store_true",
|
|
|
|
help='Disable response crafting. If anchors are specified, they still work.'
|
|
|
|
)
|
2013-01-05 02:25:09 +00:00
|
|
|
|
|
|
|
group = parser.add_argument_group(
|
|
|
|
'SSL',
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-s", dest='ssl', default=False, action="store_true",
|
2013-01-05 03:48:49 +00:00
|
|
|
help='Run in HTTPS mode.'
|
2013-01-05 02:25:09 +00:00
|
|
|
)
|
|
|
|
group.add_argument(
|
2014-03-02 00:45:35 +00:00
|
|
|
"--cn", dest="cn", type=str, default=None,
|
2014-08-31 00:09:04 +00:00
|
|
|
help="CN for generated SSL certs. Default: %s"%_pathod.DEFAULT_CERT_DOMAIN
|
2014-03-02 00:45:35 +00:00
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-C", dest='ssl_not_after_connect', default=False, action="store_true",
|
|
|
|
help="Don't expect SSL after a CONNECT request."
|
2012-08-16 04:07:23 +00:00
|
|
|
)
|
2013-01-05 02:25:09 +00:00
|
|
|
group.add_argument(
|
2014-03-05 02:03:31 +00:00
|
|
|
"--cert", dest='ssl_certs', default=[], type=str,
|
2014-08-31 00:09:04 +00:00
|
|
|
metavar = "SPEC", action="append",
|
2014-03-05 02:03:31 +00:00
|
|
|
help='Add an SSL certificate. SPEC is of the form "[domain=]path". '\
|
|
|
|
'The domain may include a wildcard, and is equal to "*" if not specified. '\
|
|
|
|
'The file at path is a certificate in PEM format. If a private key is included in the PEM, '\
|
|
|
|
'it is used, else the default key in the conf dir is used. Can be passed multiple times.'
|
2012-08-16 04:07:23 +00:00
|
|
|
)
|
2014-02-27 05:33:48 +00:00
|
|
|
group.add_argument(
|
|
|
|
"--ciphers", dest="ciphers", type=str, default=False,
|
|
|
|
help="SSL cipher specification"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"--sslversion", dest="sslversion", type=int, default=4,
|
|
|
|
choices=[1, 2, 3, 4],
|
2014-03-02 00:45:35 +00:00
|
|
|
help="Use a specified protocol - TLSv1, SSLv2, SSLv3, SSLv23. Default to SSLv23."
|
2014-02-27 05:33:48 +00:00
|
|
|
)
|
2012-09-30 23:48:26 +00:00
|
|
|
|
2012-10-30 22:23:53 +00:00
|
|
|
group = parser.add_argument_group(
|
2012-12-30 23:23:42 +00:00
|
|
|
'Controlling Logging',
|
2012-10-30 22:23:53 +00:00
|
|
|
"""
|
|
|
|
Some of these options expand generated values for logging - if
|
|
|
|
you're generating large data, use them with caution.
|
|
|
|
"""
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-e", dest="explain", action="store_true", default=False,
|
|
|
|
help="Explain responses"
|
|
|
|
)
|
2012-09-30 23:48:26 +00:00
|
|
|
group.add_argument(
|
|
|
|
"-f", dest='logfile', default=None, type=str,
|
|
|
|
help='Log to file.'
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-q", dest="logreq", action="store_true", default=False,
|
|
|
|
help="Log full request"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-r", dest="logresp", action="store_true", default=False,
|
|
|
|
help="Log full response"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-x", dest="hexdump", action="store_true", default=False,
|
|
|
|
help="Log request/response in hexdump format"
|
|
|
|
)
|
2012-08-16 04:07:23 +00:00
|
|
|
args = parser.parse_args()
|
|
|
|
if args.daemonize:
|
|
|
|
daemonize()
|
2014-08-31 00:09:04 +00:00
|
|
|
pathod_main(parser, args)
|
2012-08-16 04:07:23 +00:00
|
|
|
|
2014-08-31 00:09:04 +00:00
|
|
|
|
|
|
|
if __name__ == "__main__":
|
|
|
|
pathoc()
|