diff options
author | Maximilian Hils <git@maximilianhils.com> | 2014-02-04 02:56:59 +0100 |
---|---|---|
committer | Maximilian Hils <git@maximilianhils.com> | 2014-02-04 02:56:59 +0100 |
commit | f6253a80fff2ed3a6f7846e866469c8776f1254d (patch) | |
tree | 459fde63bc18ee692c8f85de1bdcfc2b96a959cf /libmproxy/proxy.py | |
parent | 2db5f9de26f6ce2c90dfba86576d81fc3ce79924 (diff) | |
download | mitmproxy-f6253a80fff2ed3a6f7846e866469c8776f1254d.tar.gz mitmproxy-f6253a80fff2ed3a6f7846e866469c8776f1254d.tar.bz2 mitmproxy-f6253a80fff2ed3a6f7846e866469c8776f1254d.zip |
add priorities for the destination server address
Diffstat (limited to 'libmproxy/proxy.py')
-rw-r--r-- | libmproxy/proxy.py | 133 |
1 files changed, 99 insertions, 34 deletions
diff --git a/libmproxy/proxy.py b/libmproxy/proxy.py index e3e40c7b..4842a81f 100644 --- a/libmproxy/proxy.py +++ b/libmproxy/proxy.py @@ -7,6 +7,23 @@ import utils, version, platform, controller, stateobject TRANSPARENT_SSL_PORTS = [443, 8443] +class AddressPriority(object): + """ + Enum that signifies the priority of the given address when choosing the destination host. + Higher is better (None < i) + """ + FORCE = 5 + """forward mode""" + MANUALLY_CHANGED = 4 + """user changed the target address in the ui""" + FROM_SETTINGS = 3 + """reverse proxy mode""" + FROM_CONNECTION = 2 + """derived from transparent resolver""" + FROM_PROTOCOL = 1 + """derived from protocol (e.g. absolute-form http requests)""" + + class ProxyError(Exception): def __init__(self, code, msg, headers=None): self.code, self.msg, self.headers = code, msg, headers @@ -189,6 +206,7 @@ class ConnectionHandler: self.close = False self.conntype = None self.sni = None + self.server_address_priority = None self.mode = "regular" if self.config.reverse_proxy: @@ -196,14 +214,6 @@ class ConnectionHandler: if self.config.transparent_proxy: self.mode = "transparent" - def del_server_connection(self): - if self.server_conn and self.server_conn.connection: - self.server_conn.finish() - self.log("serverdisconnect", ["%s:%s" % (self.server_conn.address.host, self.server_conn.address.port)]) - self.channel.tell("serverdisconnect", self) - self.server_conn = None - self.sni = None - def handle(self): self.log("clientconnect") self.channel.ask("clientconnect", self) @@ -214,20 +224,23 @@ class ConnectionHandler: try: # Can we already identify the target server and connect to it? server_address = None + address_priority = None if self.config.forward_proxy: server_address = self.config.forward_proxy[1:] - else: - if self.config.reverse_proxy: - server_address = self.config.reverse_proxy[1:] - elif self.config.transparent_proxy: - server_address = self.config.transparent_proxy["resolver"].original_addr( - self.client_conn.connection) - if not server_address: - raise ProxyError(502, "Transparent mode failure: could not resolve original destination.") - self.log("transparent to %s:%s" % server_address) + address_priority = AddressPriority.FORCE + elif self.config.reverse_proxy: + server_address = self.config.reverse_proxy[1:] + address_priority = AddressPriority.FROM_SETTINGS + elif self.config.transparent_proxy: + server_address = self.config.transparent_proxy["resolver"].original_addr( + self.client_conn.connection) + if not server_address: + raise ProxyError(502, "Transparent mode failure: could not resolve original destination.") + address_priority = AddressPriority.FROM_CONNECTION + self.log("transparent to %s:%s" % server_address) if server_address: - self.establish_server_connection(server_address) + self.set_server_address(server_address, address_priority) self._handle_ssl() while not self.close: @@ -252,53 +265,95 @@ class ConnectionHandler: def _handle_ssl(self): """ + Helper function of .handle() Check if we can already identify SSL connections. + If so, connect to the server and establish an SSL connection """ + client_ssl = False + server_ssl = False + if self.config.transparent_proxy: client_ssl = server_ssl = (self.server_conn.address.port in self.config.transparent_proxy["sslports"]) elif self.config.reverse_proxy: client_ssl = server_ssl = (self.config.reverse_proxy[0] == "https") # TODO: Make protocol generic (as with transparent proxies) # TODO: Add SSL-terminating capatbility (SSL -> mitmproxy -> plain and vice versa) - self.establish_ssl(client=client_ssl, server=server_ssl) + if client_ssl or server_ssl: + self.establish_server_connection() + self.establish_ssl(client=client_ssl, server=server_ssl) - def finish(self): - self.client_conn.finish() + def del_server_connection(self): + """ + Deletes an existing server connection. + """ + if self.server_conn and self.server_conn.connection: + self.server_conn.finish() + self.log("serverdisconnect", ["%s:%s" % (self.server_conn.address.host, self.server_conn.address.port)]) + self.channel.tell("serverdisconnect", self) + self.server_conn = None + self.server_address_priority = None + self.sni = None def determine_conntype(self): #TODO: Add ruleset to select correct protocol depending on mode/target port etc. self.conntype = "http" - def establish_server_connection(self, address): + def set_server_address(self, address, priority): """ - Establishes a new server connection to the given server - If there is already an existing server connection, it will be killed. + Sets a new server address with the given priority + @type priority: AddressPriority """ - self.del_server_connection() - self.server_conn = ServerConnection(address) + address = tcp.Address.wrap(address) + self.log("Set server address: %s:%s" % (address.host, address.port)) + if self.server_conn and (self.server_address_priority > priority): + self.log("Server address priority too low (is: %s, got: %s)" % (self.server_address_priority, priority)) + return + + self.address_priority = priority + + if self.server_conn and (self.server_conn.address == address): + self.log("Addresses match, skip.") + return + + server_conn = ServerConnection(address) + if self.server_conn and self.server_conn.connection: + self.del_server_connection() + self.server_conn = server_conn + self.establish_server_connection() + else: + self.server_conn = server_conn + + def establish_server_connection(self): + """ + Establishes a new server connection. + If there is already an existing server connection, the function returns immediately. + """ + if self.server_conn.connection: + return + self.log("serverconnect", ["%s:%s" % self.server_conn.address()[:2]]) + self.channel.tell("serverconnect", self) try: self.server_conn.connect() except tcp.NetLibError, v: raise ProxyError(502, v) - self.log("serverconnect", ["%s:%s" % address[:2]]) - self.channel.tell("serverconnect", self) def establish_ssl(self, client=False, server=False): """ Establishes SSL on the existing connection(s) to the server or the client, as specified by the parameters. If the target server is on the pass-through list, - the conntype attribute will be changed and no the SSL connection won't be wrapped. + the conntype attribute will be changed and the SSL connection won't be wrapped. A protocol handler must raise a ConnTypeChanged exception if it detects that this is happening """ # TODO: Implement SSL pass-through handling and change conntype passthrough = [ "echo.websocket.org", - "174.129.224.73" # echo.websocket.org, transparent mode + "174.129.224.73" # echo.websocket.org, transparent mode ] if self.server_conn.address.host in passthrough or self.sni in passthrough: self.conntype = "tcp" return + # Logging if client or server: subs = [] if client: @@ -319,13 +374,21 @@ class ConnectionHandler: handle_sni=self.handle_sni) def server_reconnect(self, no_ssl=False): - had_ssl, sni = self.server_conn.ssl_established, self.sni + address = self.server_conn.address + had_ssl = self.server_conn.ssl_established + priority = self.server_address_priority + sni = self.sni self.log("(server reconnect follows)") - self.establish_server_connection(self.server_conn.address()) + self.del_server_connection() + self.set_server_address(address, priority) + self.establish_server_connection() if had_ssl and not no_ssl: self.sni = sni self.establish_ssl(server=True) + def finish(self): + self.client_conn.finish() + def log(self, msg, subs=()): msg = [ "%s:%s: %s" % (self.client_conn.address.host, self.client_conn.address.port, msg) @@ -363,6 +426,7 @@ class ConnectionHandler: sn = connection.get_servername() if sn and sn != self.sni: self.sni = sn.decode("utf8").encode("idna") + self.log("SNI received: %s" % self.sni) self.server_reconnect() # reconnect to upstream server with SNI # Now, change client context to reflect changed certificate: new_context = SSL.Context(SSL.TLSv1_METHOD) @@ -372,11 +436,12 @@ class ConnectionHandler: connection.set_context(new_context) # An unhandled exception in this method will core dump PyOpenSSL, so # make dang sure it doesn't happen. - except Exception, e: # pragma: no cover + except Exception, e: # pragma: no cover pass -class ProxyServerError(Exception): pass +class ProxyServerError(Exception): + pass class ProxyServer(tcp.TCPServer): |