feat: replacement functionality and final cleanups

This commit is contained in:
Mahdi Dibaiee 2021-03-19 17:04:49 +00:00
parent c3f3321a57
commit 36587867c2
6 changed files with 166 additions and 47 deletions

64
Cargo.lock generated
View File

@ -1,5 +1,14 @@
# This file is automatically @generated by Cargo. # This file is automatically @generated by Cargo.
# It is not intended for manual editing. # It is not intended for manual editing.
[[package]]
name = "aho-corasick"
version = "0.7.15"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "7404febffaa47dac81aa44dba71523c9d069b1bdc50a77db41195149e17f68e5"
dependencies = [
"memchr",
]
[[package]] [[package]]
name = "ansi_term" name = "ansi_term"
version = "0.11.0" version = "0.11.0"
@ -77,6 +86,19 @@ dependencies = [
"vec_map", "vec_map",
] ]
[[package]]
name = "env_logger"
version = "0.8.3"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "17392a012ea30ef05a610aa97dfb49496e71c9f676b27879922ea5bdf60d9d3f"
dependencies = [
"atty",
"humantime",
"log",
"regex",
"termcolor",
]
[[package]] [[package]]
name = "futures" name = "futures"
version = "0.3.13" version = "0.3.13"
@ -184,6 +206,12 @@ version = "1.3.5"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "615caabe2c3160b313d52ccc905335f4ed5f10881dd63dc5699d47e90be85691" checksum = "615caabe2c3160b313d52ccc905335f4ed5f10881dd63dc5699d47e90be85691"
[[package]]
name = "humantime"
version = "2.1.0"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "9a3a5bfb195931eeb336b2a7b4d761daec841b97f947d34394601737a7bba5e4"
[[package]] [[package]]
name = "instant" name = "instant"
version = "0.1.9" version = "0.1.9"
@ -362,6 +390,23 @@ dependencies = [
"bitflags", "bitflags",
] ]
[[package]]
name = "regex"
version = "1.4.5"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "957056ecddbeba1b26965114e191d2e8589ce74db242b6ea25fc4062427a5c19"
dependencies = [
"aho-corasick",
"memchr",
"regex-syntax",
]
[[package]]
name = "regex-syntax"
version = "0.6.23"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "24d5f089152e60f62d28b835fbff2cd2e8dc0baf1ac13343bef92ab7eed84548"
[[package]] [[package]]
name = "ring" name = "ring"
version = "0.16.20" version = "0.16.20"
@ -470,6 +515,15 @@ dependencies = [
"unicode-xid", "unicode-xid",
] ]
[[package]]
name = "termcolor"
version = "1.1.2"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "2dfed899f0eb03f32ee8c6a0aabdb8a7949659e3466561fc0adf54e26d88c5f4"
dependencies = [
"winapi-util",
]
[[package]] [[package]]
name = "textwrap" name = "textwrap"
version = "0.11.0" version = "0.11.0"
@ -484,6 +538,7 @@ name = "tlsproxy"
version = "0.1.0" version = "0.1.0"
dependencies = [ dependencies = [
"clap", "clap",
"env_logger",
"futures", "futures",
"httparse", "httparse",
"rustls", "rustls",
@ -647,6 +702,15 @@ version = "0.4.0"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "ac3b87c63620426dd9b991e5ce0329eff545bccbbb34f3be09ff6fb6ab51b7b6" checksum = "ac3b87c63620426dd9b991e5ce0329eff545bccbbb34f3be09ff6fb6ab51b7b6"
[[package]]
name = "winapi-util"
version = "0.1.5"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "70ec6ce85bb158151cae5e5c87f95a8e97d2c0c4b001223f33a334e3ce5de178"
dependencies = [
"winapi",
]
[[package]] [[package]]
name = "winapi-x86_64-pc-windows-gnu" name = "winapi-x86_64-pc-windows-gnu"
version = "0.4.0" version = "0.4.0"

View File

@ -7,10 +7,11 @@ edition = "2018"
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html # See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
[dependencies] [dependencies]
env_logger = "0.8.3"
tokio = { version = "1", features = ["full"] } tokio = { version = "1", features = ["full"] }
httparse = "1.3.4" httparse = "1.3.4"
futures = "0.3.13" futures = "0.3.13"
rustls = { version = "0.19.0", features = ["dangerous_configuration"] } rustls = { version = "0.19.0", features = ["dangerous_configuration", "logging"] }
webpki = "0.21.4" webpki = "0.21.4"
webpki-roots = "0.21.0" webpki-roots = "0.21.0"
rustls-pemfile = "0.2.0" rustls-pemfile = "0.2.0"

View File

@ -1,3 +1,4 @@
use env_logger;
use rustls_pemfile; use rustls_pemfile;
use std::io::BufReader; use std::io::BufReader;
use std::{fs, str}; use std::{fs, str};
@ -7,15 +8,18 @@ use clap::{App, Arg};
#[derive(Debug, Clone)] #[derive(Debug, Clone)]
pub struct Args { pub struct Args {
pub port: u16, pub port: u16,
pub certs: String, pub chaincert: String,
pub key: String, pub key: String,
pub replaces: Vec<String>, pub cacert: String,
pub replaces: Vec<(String, String)>,
pub verbose: bool, pub verbose: bool,
} }
pub fn args() -> Args { pub fn args() -> Args {
let version = env!("CARGO_PKG_NAME").to_string() + ", version: " + env!("CARGO_PKG_VERSION"); let version = env!("CARGO_PKG_NAME").to_string() + ", version: " + env!("CARGO_PKG_VERSION");
//env_logger::Builder::new().parse_filters("trace").init();
let matches = App::new("tlsproxy") let matches = App::new("tlsproxy")
.version(&*version) .version(&*version)
.author("Mahdi Dibaiee <mdibaiee@pm.me>") .author("Mahdi Dibaiee <mdibaiee@pm.me>")
@ -26,10 +30,10 @@ pub fn args() -> Args {
.value_name("PORT") .value_name("PORT")
.help("Listen on PORT [default: 8080]") .help("Listen on PORT [default: 8080]")
.takes_value(true)) .takes_value(true))
.arg(Arg::with_name("certs") .arg(Arg::with_name("chaincert")
.long("certs") .long("chaincert")
.value_name("FILE") .value_name("FILE")
.help("Read server certificates from FILE. This should contain PEM-format certificates in the right order. The first certificate should certify KEYFILE, the last should be a root CA.") .help("Read server certificate from FILE. This should contain PEM-format certificate in the right order. The first certificate should certify KEYFILE, the last should be a root CA.")
.required(true) .required(true)
.takes_value(true)) .takes_value(true))
.arg(Arg::with_name("key") .arg(Arg::with_name("key")
@ -38,10 +42,16 @@ pub fn args() -> Args {
.help("Read private key from FILE. This should be a RSA private key or PKCS8-encoded private key, in PEM format.") .help("Read private key from FILE. This should be a RSA private key or PKCS8-encoded private key, in PEM format.")
.required(true) .required(true)
.takes_value(true)) .takes_value(true))
.arg(Arg::with_name("cacert")
.long("cacert")
.value_name("FILE")
.help("Read CA certificate for client from FILE. This should be a CA certificate for the client.")
.required(true)
.takes_value(true))
.arg(Arg::with_name("replace") .arg(Arg::with_name("replace")
.long("replace") .long("replace")
.value_name("PATTERN") .value_name("PATTERN")
.help("Replace data in outgoing requests according to patterns specified in the s/MATCH/REPLACEMENT format.") .help("Replace data in outgoing requests according to a pattern specified in the s/MATCH/REPLACEMENT format. Please note MATCH and REPLACEMENT must be of same length!")
.multiple(true) .multiple(true)
.use_delimiter(true) .use_delimiter(true)
.takes_value(true)) .takes_value(true))
@ -57,18 +67,30 @@ pub fn args() -> Args {
.unwrap_or("8080") .unwrap_or("8080")
.parse::<u16>() .parse::<u16>()
.unwrap(), .unwrap(),
certs: matches chaincert: matches
.value_of("certs") .value_of("chaincert")
.map(|a| a.to_owned()) .map(|a| a.to_owned())
.expect("--certs must be specified"), .expect("--chaincert must be specified"),
key: matches key: matches
.value_of("key") .value_of("key")
.map(|a| a.to_owned()) .map(|a| a.to_owned())
.expect("--key must be specified"), .expect("--key must be specified"),
cacert: matches
.value_of("cacert")
.map(|a| a.to_owned())
.expect("--cacert must be specified"),
verbose: matches.is_present("verbose"), verbose: matches.is_present("verbose"),
replaces: matches replaces: matches.values_of("replace").map_or(vec![], |a| {
.values_of("replace") a.map(|b| {
.map_or(vec![], |a| a.map(|b| b.to_owned()).collect()), let mut split = b.split("/").skip(1);
(
split.next().unwrap().to_owned(),
split.next().unwrap().to_owned(),
)
})
.collect()
}),
}; };
} }

View File

@ -1,4 +1,4 @@
use std::sync::Arc; use std::sync::{Arc};
use std::net::SocketAddr; use std::net::SocketAddr;
use tokio::net::{TcpListener}; use tokio::net::{TcpListener};
use rustls::{ServerConfig, ClientConfig, NoClientAuth}; use rustls::{ServerConfig, ClientConfig, NoClientAuth};
@ -17,27 +17,24 @@ async fn main() -> Result<(), Box<dyn std::error::Error + Send + Sync>> {
println!("Listening on {:#?}", addr); println!("Listening on {:#?}", addr);
let mut server_config = ServerConfig::new(NoClientAuth::new()); let mut server_config = ServerConfig::new(NoClientAuth::new());
let certs = command::load_certs(&args.certs); let chaincert = command::load_certs(&args.chaincert);
let privkey = command::load_private_key(&args.key); let privkey = command::load_private_key(&args.key);
server_config server_config
.set_single_cert(certs.clone(), privkey.clone()) .set_single_cert(chaincert, privkey)
.expect("bad certificates/private key"); .expect("bad certificates/private key");
let mut client_config = ClientConfig::new(); let mut client_config = ClientConfig::new();
client_config.key_log = Arc::new(rustls::KeyLogFile::new());
client_config let (added, unused) = client_config
.dangerous()
.set_certificate_verifier(Arc::new(cert::NoCertificateVerification {}));
client_config
.root_store .root_store
.add_pem_file(&mut command::read_file(&args.certs)).unwrap(); .add_pem_file(&mut command::read_file(&args.cacert)).unwrap();
//client_config
//.root_store
//.add_server_trust_anchors(&webpki_roots::TLS_SERVER_ROOTS);
println!("{} certificates added, {} unused", added, unused);
let (added, unused) = client_config
.root_store
.add_pem_file(&mut command::read_file(&args.chaincert)).unwrap();
println!("{} certificates added, {} unused", added, unused);
let tcp_listener = TcpListener::bind(addr).await?; let tcp_listener = TcpListener::bind(addr).await?;
loop { loop {
let (tcp_stream, _) = tcp_listener.accept().await?; let (tcp_stream, _) = tcp_listener.accept().await?;

View File

@ -4,6 +4,7 @@ use std::error::Error;
use httparse::Request; use httparse::Request;
use webpki; use webpki;
use std::str; use std::str;
use std::io;
use std::io::{Write, Read}; use std::io::{Write, Read};
use rustls::{ServerConfig, ClientConfig, Session}; use rustls::{ServerConfig, ClientConfig, Session};
@ -37,30 +38,64 @@ pub async fn proxy(mut incoming: TcpStream, client_config: ClientConfig, server_
let mut outgoing_std = outgoing.into_std()?; let mut outgoing_std = outgoing.into_std()?;
let mut outgoing_tls = rustls::Stream::new(&mut client_session, &mut outgoing_std); let mut outgoing_tls = rustls::Stream::new(&mut client_session, &mut outgoing_std);
let mut tmp = vec![0; 1024^2]; let mut incoming_buf = vec![0; 4086];
let mut tmp2 = vec![0; 1024^2]; let mut outgoing_buf = vec![0; 4086];
//let ciphersuite = incoming_tls.sess.get_negotiated_ciphersuite().unwrap();
//println!("{:#?}", ciphersuite);
loop { loop {
println!("incoming"); match incoming_tls.read(&mut incoming_buf) {
let incoming_read = ops::sync_read(&mut incoming_tls, &mut tmp); Ok(n) => {
println!("incoming {:#?}", str::from_utf8(&tmp)?); incoming_buf.truncate(n);
match incoming_read { if args.verbose && n > 0 {
Ok(n) if n > 0 => ops::sync_write(&mut outgoing_tls, &tmp), println!("received data of size {:#?} from client: {:#?}", n, str::from_utf8(&incoming_buf)?);
Ok(0) => return Ok(()), }
e => e
}.unwrap();
let outgoing_read = ops::sync_read(&mut outgoing_tls, &mut tmp2); args.replaces.iter().for_each(|(from, to)| {
let from_buf = from.as_bytes().to_vec();
let to_buf = to.as_bytes().to_vec();
let from_len = from.len();
println!("outgoing {:#?}", str::from_utf8(&tmp2)?); let mut windowed = incoming_buf.windows(from_len).collect::<Vec<&[u8]>>();
let mut indices: Vec<usize> = vec![];
match outgoing_read { while let Some(p) = windowed.iter().position(|x| x.to_owned() == from_buf) {
Ok(n) if n > 0 => ops::sync_write(&mut incoming_tls, &tmp2), windowed.push(&to_buf);
Ok(0) => return Ok(()), windowed.swap_remove(p);
indices.push(p);
}
e => e indices.iter().for_each(|p| {
}.unwrap(); let range = p..&(p+from_len);
incoming_buf.splice(range, to_buf.clone());
});
if args.verbose {
println!("replaced {} instances of {} with {}", indices.len(), from, to);
}
});
outgoing_tls.write_all(&incoming_buf)?;
println!("done writing");
},
Err(e) if e.kind() == io::ErrorKind::WouldBlock => {},
Err(e) => return Err(e.into())
}
match outgoing_tls.read(&mut outgoing_buf) {
Ok(n) => {
outgoing_buf.truncate(n);
if args.verbose && n > 0 {
println!("received data of size {:#?} from server: {:#?}", n, str::from_utf8(&outgoing_buf)?);
}
incoming_tls.write_all(&outgoing_buf)?;
}
Err(ref e) if e.kind() == io::ErrorKind::WouldBlock => {
continue;
}
Err(e) => {
println!("error reading from stream: {:#?}", e);
return Err(e.into());
}
}
} }
} }

View File

@ -54,7 +54,7 @@ pub fn sync_read<T: Read>(stream: &mut T, buf: &mut Vec<u8>) -> Result<usize, Bo
buf.truncate(n); buf.truncate(n);
return Ok(n); return Ok(n);
} }
Err(ref e) if e.kind() == io::ErrorKind::WouldBlock => { Err(e) if e.kind() == io::ErrorKind::WouldBlock => {
continue; continue;
} }
Err(e) => { Err(e) => {