mitmproxy/libmproxy/proxy/server.py

291 lines
11 KiB
Python
Raw Normal View History

from __future__ import absolute_import
2014-08-09 01:03:21 +00:00
import re
2014-03-09 20:13:08 +00:00
import socket
2014-03-10 16:01:30 +00:00
from OpenSSL import SSL
2014-03-09 20:51:24 +00:00
from netlib import tcp
from .primitives import ProxyServerError, Log, ProxyError, ConnectionTypeChange, \
AddressPriority
2014-03-10 16:01:30 +00:00
from .connection import ClientConnection, ServerConnection
from ..protocol.handle import handle_messages, handle_error, handle_server_reconnect
2014-03-10 20:57:50 +00:00
from .. import version
2014-03-09 20:13:08 +00:00
2014-03-09 20:51:24 +00:00
class DummyServer:
bound = False
2014-01-09 04:34:29 +00:00
2014-03-09 20:51:24 +00:00
def __init__(self, config):
self.config = config
2014-01-09 04:34:29 +00:00
2014-03-09 20:51:24 +00:00
def start_slave(self, *args):
pass
2014-03-09 20:51:24 +00:00
def shutdown(self):
pass
2014-02-04 04:02:17 +00:00
2014-03-09 20:51:24 +00:00
class ProxyServer(tcp.TCPServer):
allow_reuse_address = True
bound = True
2014-03-10 16:01:30 +00:00
2014-03-09 20:51:24 +00:00
def __init__(self, config, port, host='', server_version=version.NAMEVERSION):
"""
Raises ProxyServerError if there's a startup problem.
"""
self.config = config
self.server_version = server_version
try:
tcp.TCPServer.__init__(self, (host, port))
except socket.error, v:
2014-08-08 17:04:58 +00:00
raise ProxyServerError('Error starting proxy server: ' + repr(v))
2014-03-09 20:51:24 +00:00
self.channel = None
2013-03-24 20:20:26 +00:00
2014-03-09 20:51:24 +00:00
def start_slave(self, klass, channel):
slave = klass(channel, self)
slave.start()
2014-02-07 06:08:59 +00:00
2014-03-09 20:51:24 +00:00
def set_channel(self, channel):
self.channel = channel
2013-02-24 04:35:24 +00:00
2014-03-09 20:51:24 +00:00
def handle_client_connection(self, conn, client_address):
h = ConnectionHandler(self.config, conn, client_address, self, self.channel,
self.server_version)
2014-03-09 20:51:24 +00:00
h.handle()
h.finish()
2014-01-05 00:03:55 +00:00
class ConnectionHandler:
def __init__(self, config, client_connection, client_address, server, channel,
server_version):
self.config = config
2014-03-10 16:01:30 +00:00
"""@type: libmproxy.proxy.config.ProxyConfig"""
self.client_conn = ClientConnection(client_connection, client_address, server)
2014-03-10 16:01:30 +00:00
"""@type: libmproxy.proxy.connection.ClientConnection"""
2014-01-09 04:34:29 +00:00
self.server_conn = None
2014-03-10 16:01:30 +00:00
"""@type: libmproxy.proxy.connection.ServerConnection"""
2014-01-05 00:03:55 +00:00
self.channel, self.server_version = channel, server_version
2014-01-09 04:34:29 +00:00
self.close = False
2014-08-09 01:03:21 +00:00
self.conntype = "http"
2014-01-05 00:03:55 +00:00
self.sni = None
2010-02-16 04:09:07 +00:00
def handle(self):
2014-03-13 00:04:45 +00:00
self.log("clientconnect", "info")
2014-01-09 04:34:29 +00:00
try:
2014-05-15 16:16:42 +00:00
# Can we already identify the target server and connect to it?
2014-08-09 01:03:21 +00:00
client_ssl, server_ssl = False, False
2014-05-15 16:16:42 +00:00
if self.config.get_upstream_server:
upstream_info = self.config.get_upstream_server(
self.client_conn.connection)
self.set_server_address(upstream_info[2:], AddressPriority.FROM_SETTINGS)
client_ssl, server_ssl = upstream_info[:2]
2014-08-09 01:03:21 +00:00
self.determine_conntype()
self.channel.ask("clientconnect", self)
if self.server_conn:
self.establish_server_connection()
2014-05-15 16:16:42 +00:00
if client_ssl or server_ssl:
self.establish_ssl(client=client_ssl, server=server_ssl)
while not self.close:
try:
handle_messages(self.conntype, self)
except ConnectionTypeChange:
2014-08-09 01:03:21 +00:00
self.log("Connection type changed: %s" % self.conntype, "info")
2014-05-15 16:16:42 +00:00
continue
except (ProxyError, tcp.NetLibError), e:
handle_error(self.conntype, self, e)
except Exception:
import traceback, sys
2014-03-13 00:04:45 +00:00
self.log(traceback.format_exc(), "error")
print >> sys.stderr, traceback.format_exc()
print >> sys.stderr, "mitmproxy has crashed!"
print >> sys.stderr, "Please lodge a bug report at: https://github.com/mitmproxy/mitmproxy"
raise
2012-06-30 12:15:03 +00:00
self.del_server_connection()
2014-03-13 00:04:45 +00:00
self.log("clientdisconnect", "info")
2014-01-07 01:29:10 +00:00
self.channel.tell("clientdisconnect", self)
def del_server_connection(self):
"""
2014-03-10 16:01:30 +00:00
Deletes (and closes) an existing server connection.
"""
if self.server_conn and self.server_conn.connection:
self.server_conn.finish()
2014-03-13 00:04:45 +00:00
self.log("serverdisconnect", "debug", ["%s:%s" % (self.server_conn.address.host,
self.server_conn.address.port)])
self.channel.tell("serverdisconnect", self)
self.server_conn = None
self.sni = None
2014-01-09 04:34:29 +00:00
def determine_conntype(self):
2014-08-09 01:03:21 +00:00
if self.server_conn and any(rex.search(self.server_conn.address.host) for rex in self.config.ignore):
self.log("Ignore host: %s" % self.server_conn.address.host, "info")
self.conntype = "tcp"
else:
self.conntype = "http"
2014-01-05 00:03:55 +00:00
def set_server_address(self, address, priority):
2014-01-05 00:03:55 +00:00
"""
Sets a new server address with the given priority.
Does not re-establish either connection or SSL handshake.
2014-01-05 00:03:55 +00:00
"""
address = tcp.Address.wrap(address)
if self.server_conn:
if self.server_conn.priority > priority:
self.log("Attempt to change server address, "
"but priority is too low (is: %s, got: %s)" % (
2014-08-09 01:03:21 +00:00
self.server_conn.priority, priority), "debug")
return
if self.server_conn.address == address:
self.server_conn.priority = priority # Possibly increase priority
return
self.del_server_connection()
2014-03-13 00:04:45 +00:00
self.log("Set new server address: %s:%s" % (address.host, address.port), "debug")
self.server_conn = ServerConnection(address, priority)
2014-07-26 10:02:18 +00:00
def establish_server_connection(self, ask=True):
"""
Establishes a new server connection.
If there is already an existing server connection, the function returns immediately.
2014-07-26 10:02:18 +00:00
By default, this function ".ask"s the proxy master. This is deadly if this function is already called from the
master (e.g. via change_server), because this navigates us in a simple deadlock (the master is single-threaded).
In these scenarios, ask=False can be passed to suppress the call to the master.
"""
if self.server_conn.connection:
return
2014-03-13 00:04:45 +00:00
self.log("serverconnect", "debug", ["%s:%s" % self.server_conn.address()[:2]])
2014-07-26 10:02:18 +00:00
if ask:
self.channel.ask("serverconnect", self)
2014-01-18 14:35:37 +00:00
try:
self.server_conn.connect()
except tcp.NetLibError, v:
raise ProxyError(502, v)
2014-01-05 00:03:55 +00:00
def establish_ssl(self, client=False, server=False):
"""
Establishes SSL on the existing connection(s) to the server or the client,
as specified by the parameters. If the target server is on the pass-through list,
2014-03-10 16:01:30 +00:00
the conntype attribute will be changed and a ConnTypeChanged exception will be raised.
"""
2014-08-09 01:03:21 +00:00
# If the host is on our ignore list, change to passthrough/ignore mode.
for host in (self.server_conn.address.host, self.sni):
if host and any(rex.search(host) for rex in self.config.ignore):
self.log("Ignore host: %s" % host, "info")
self.conntype = "tcp"
raise ConnectionTypeChange()
# Logging
if client or server:
subs = []
if client:
subs.append("with client")
if server:
subs.append("with server (sni: %s)" % self.sni)
2014-03-13 00:04:45 +00:00
self.log("Establish SSL", "debug", subs)
2014-01-09 16:56:42 +00:00
if server:
2014-07-26 10:02:18 +00:00
if not self.server_conn or not self.server_conn.connection:
raise ProxyError(502, "No server connection.")
2014-01-09 16:56:42 +00:00
if self.server_conn.ssl_established:
raise ProxyError(502, "SSL to Server already established.")
2014-01-09 04:34:29 +00:00
self.server_conn.establish_ssl(self.config.clientcerts, self.sni)
2014-01-09 16:56:42 +00:00
if client:
if self.client_conn.ssl_established:
raise ProxyError(502, "SSL to Client already established.")
cert, key = self.find_cert()
2014-03-02 04:35:41 +00:00
self.client_conn.convert_to_ssl(
2014-03-09 20:51:24 +00:00
cert, key,
handle_sni=self.handle_sni,
cipher_list=self.config.ciphers,
dhparams=self.config.certstore.dhparams,
ca_file=self.config.ca_file
2014-03-02 04:35:41 +00:00
)
2014-01-05 00:03:55 +00:00
def server_reconnect(self):
address = self.server_conn.address
had_ssl = self.server_conn.ssl_established
priority = self.server_conn.priority
state = self.server_conn.state
sni = self.sni
2014-03-13 00:04:45 +00:00
self.log("(server reconnect follows)", "debug")
self.del_server_connection()
self.set_server_address(address, priority)
self.establish_server_connection()
for s in state:
handle_server_reconnect(s[0], self, s[1])
self.server_conn.state = state
if had_ssl:
self.sni = sni
self.establish_ssl(server=True)
def finish(self):
self.client_conn.finish()
2014-03-13 00:04:45 +00:00
def log(self, msg, level, subs=()):
2012-06-30 12:15:03 +00:00
msg = [
2014-01-28 16:28:20 +00:00
"%s:%s: %s" % (self.client_conn.address.host, self.client_conn.address.port, msg)
2012-06-30 12:15:03 +00:00
]
for i in subs:
msg.append(" -> " + i)
2012-06-30 12:15:03 +00:00
msg = "\n".join(msg)
2014-03-13 00:04:45 +00:00
self.channel.tell("log", Log(msg, level))
2012-06-30 12:15:03 +00:00
2014-01-07 01:29:10 +00:00
def find_cert(self):
2014-03-11 00:02:10 +00:00
if self.config.certforward and self.server_conn.ssl_established:
return self.server_conn.cert, self.config.certstore.gen_pkey(self.server_conn.cert)
else:
host = self.server_conn.address.host
sans = []
2014-08-03 00:01:40 +00:00
if self.server_conn.ssl_established and (not self.config.no_upstream_cert):
2014-03-11 00:02:10 +00:00
upstream_cert = self.server_conn.cert
if upstream_cert.cn:
host = upstream_cert.cn.decode("utf8").encode("idna")
sans = upstream_cert.altnames
2014-08-03 00:01:40 +00:00
elif self.sni:
sans = [self.sni]
2014-03-11 00:02:10 +00:00
ret = self.config.certstore.get_cert(host, sans)
if not ret:
raise ProxyError(502, "Unable to generate dummy cert.")
return ret
2011-02-08 17:00:59 +00:00
2014-01-07 01:29:10 +00:00
def handle_sni(self, connection):
2012-06-26 11:51:38 +00:00
"""
2014-01-07 01:29:10 +00:00
This callback gets called during the SSL handshake with the client.
The client has just sent the Sever Name Indication (SNI). We now connect upstream to
figure out which certificate needs to be served.
2012-06-26 11:51:38 +00:00
"""
try:
2014-01-07 01:29:10 +00:00
sn = connection.get_servername()
if sn and sn != self.sni:
self.sni = sn.decode("utf8").encode("idna")
2014-03-13 00:04:45 +00:00
self.log("SNI received: %s" % self.sni, "debug")
self.server_reconnect() # reconnect to upstream server with SNI
2014-01-07 01:29:10 +00:00
# Now, change client context to reflect changed certificate:
cert, key = self.find_cert()
new_context = self.client_conn._create_ssl_context(
cert, key,
method=SSL.TLSv1_METHOD,
cipher_list=self.config.ciphers,
dhparams=self.config.certstore.dhparams,
ca_file=self.config.ca_file
)
2014-01-07 01:29:10 +00:00
connection.set_context(new_context)
# An unhandled exception in this method will core dump PyOpenSSL, so
# make dang sure it doesn't happen.
except Exception: # pragma: no cover
2014-03-13 00:04:45 +00:00
import traceback
self.log("Error in handle_sni:\r\n" + traceback.format_exc(), "error")