167 Commits

Author SHA1 Message Date
intika
aabf9dfeb5 v5.60 rewrite core functions (check change log) v5.60 2019-05-31 19:42:05 +02:00
intika
d0b562c9b7 code cleaning 2019-05-29 21:03:16 +02:00
intika
76510d068e fix dns/skype proxy 2019-05-29 04:09:22 +02:00
intika
166121a6f9 update debug output 2019-05-29 04:00:21 +02:00
intika
ae650ef746 v5.50 initial bind support v5.50 2019-05-20 12:57:46 +02:00
intika
a7b0ed9ae5 initial bind support final 2019-05-20 07:06:21 +02:00
intika
49eee52bf3 initial bind support fix 2019-05-20 06:39:56 +02:00
intika
e9e1b71f71 initial bind support 2019-05-20 06:27:01 +02:00
intika
02e49d8987 v5.5 Block non tcp packet on send() and Prevent bypass noleak 2019-05-20 05:59:41 +02:00
intika
c44925214b update documentation v5.40 2019-05-12 02:58:16 +02:00
intika
29709c329d clean 2019-05-12 02:56:20 +02:00
intika
79b5e5d037 update readme 2019-05-12 02:55:22 +02:00
intika
d22c8b701d 5.40 adding help and documentation 2019-05-12 02:53:56 +02:00
intika
5e7371ea5b 5.20 fix release v5.30 2019-05-12 02:00:10 +02:00
intika
225ee380ab 5.30 hosts support 2019-05-12 01:47:04 +02:00
intika
ee8d71fe4c Update README 2019-05-07 01:01:40 +02:00
intika
926f88a37f Update README 2019-05-06 23:42:45 +02:00
intika
db55059f7a update readme v5.20 2019-03-04 04:56:55 +01:00
intika
72e6a79ec8 update readme 2019-03-04 04:49:50 +01:00
intika
2afabd099e Release v5.2 2019-03-04 04:35:17 +01:00
intika
7b96064b85 fix PROXYBOUND_ALLOW_DNS 2019-03-04 01:24:40 +01:00
intika
2acf3f984f Clean bins 2019-03-04 01:13:56 +01:00
intika
9f3547873c PROXYBOUND_ALLOW_DNS 2019-03-04 01:13:29 +01:00
intika
0546f807ee set proxify dns by default 2019-03-04 00:32:00 +01:00
intika
adf83f7b98 block udp sendmsg sendto 2019-03-04 00:27:04 +01:00
intika
c38bd90863 block udp sendto v5.10 2019-03-03 20:13:11 +01:00
intika
d0f3a6e7c5 PROXYBOUND_ALLOW_LEAKS in connect() v5.00 2019-03-03 19:39:46 +01:00
intika
d669d49e9b Debug version 2019-03-03 06:05:31 +01:00
intika
6057e27cf9 Reject UDP requests to non-local addresses on connect() 2019-03-03 03:10:30 +01:00
intika
96d51f2ff6 Initial block udp feature 2019-03-03 02:22:57 +01:00
intika
1d26392034 Initial block udp feature 2019-03-03 02:22:40 +01:00
intika
c3fd2daf07 update readme v4.90 2019-03-02 22:27:50 +01:00
intika
ae19b49bee Revert readme changes 2019-03-02 22:21:08 +01:00
intika
4eb5b8aa6f Add socks 5 env & other settings 2019-03-02 22:18:55 +01:00
intika
6e16c21922 Fix compilation error in get_config_path() v4.80 2019-03-02 20:49:53 +01:00
intika
1b60c84e15 better random proxy selection 2019-03-02 20:46:28 +01:00
intika
c97f93a24a Fix wrong glibc prototype 2019-03-02 20:26:47 +01:00
intika
2232f02558 Revert to 4-Nov to fix chrome compatibility v4.70 2019-03-02 20:10:02 +01:00
intika
0a56d70577 update v4.60 2019-03-01 21:15:10 +01:00
intika
55fbd34bb8 Initial release v4.50 2019-03-01 21:07:56 +01:00
intika
ee1a9da2a3 Fix security issue CVE-2015-3887 v4.40 2019-01-22 14:09:29 +01:00
rofl0r
b255484a42 update README for 4.3 release v4.3 2012-12-12 04:04:38 +01:00
rofl0r
af5c6f0c6a replace hostent lookup with better performing in-memory copy.
the central dns resolver function proxy_gethostbyname() used
to iterate over the gethostent() db (/etc/hosts) on each dns
request.
since this is not threadsafe, we synchronized access to it
previously using mutexes. the parsing of this file is slow,
and blocking all threads to do it even moreso.
since gethostent_r() is only available on a few platforms,
i decided to read the hostent db once and then use a quick
in-memory lookup on further usage.

+ some further refactoring.
2012-11-08 01:18:19 +01:00
rofl0r
c698d48c03 move stringfromipv4 into common.c 2012-11-07 22:00:03 +01:00
rofl0r
8b19829de4 README: remove paragraph about now fixed fork problems. 2012-11-07 21:55:34 +01:00
rofl0r
03ee84060e remove THREAD_SAFE ifdefs. from now on, pthreads are required.
additionally we have some explicit init and deinit routines for
core.c now, so that we dont need to share variables with
libproxychains.c.
2012-11-07 21:31:19 +01:00
rofl0r
bd07ca49b9 use pipe instead of pipe2 2012-11-07 21:31:18 +01:00
rofl0r
f570a66902 use mutexes also to protect the pipe communication
wasn't threadsafe before.
2012-11-07 21:31:18 +01:00
rofl0r
d0abc93c74 preliminary first fork-safe version
instead of allocating memory in the child, we now use the allocator
thread to do all the necessary allocations himself.
additionally we provide a clean API to query the ip <-> dns mapping.
these functions connect via a pipe to the allocator thread, and
exchange messages.

further cleanup is needed, but it seems to work so far.
thread-safety is not yet guaranteed.

closes #1
2012-11-07 21:31:11 +01:00
rofl0r
25afe98b20 failed attempt to use shared memory for the ip <-> dns mapping
this is in order to get irssi, which forks for DNS lookups,
and similar programs, to work as intended.

in a previous attempt i learned that shared memory created in a
child process is not visible to the parent;
in this attempt i spin off a thread from the parent which listens
on a pipe and manages the shared memory allocation from the parent
address-space. however this doesnt work as expected:
memory allocated in the parent after the child forked is not visi-
ble to the child as well.

so what happens is: irssi starts a child process, the thread allocs
memory and hands it to the child, the child attempts to write and
segfaults. however irssi doesnt crash. since now the memory is
already allocated, doing the dns lookup again will succeed.

i.e. the dns lookup works now in irssi by luck.
all but the first dns lookups will suceed.

however this is not good enough for me to be satisfied, i commit
this only for documentation purposes.
2012-11-07 16:49:14 +01:00