/* Copyright (c) 2003-2018, Arvid Norberg All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of the author nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include "libtorrent/config.hpp" #include "libtorrent/socket_io.hpp" #include #include #include #include #include #include #include // for snprintf #include // for PRId64 et.al. #include "libtorrent/tracker_manager.hpp" #include "libtorrent/http_tracker_connection.hpp" #include "libtorrent/http_connection.hpp" #include "libtorrent/aux_/escape_string.hpp" #include "libtorrent/io.hpp" #include "libtorrent/socket.hpp" #include "libtorrent/string_util.hpp" // for is_i2p_url #include "libtorrent/aux_/session_settings.hpp" #include "libtorrent/resolver_interface.hpp" #include "libtorrent/ip_filter.hpp" namespace libtorrent { http_tracker_connection::http_tracker_connection( io_service& ios , tracker_manager& man , tracker_request const& req , std::weak_ptr c) : tracker_connection(man, req, ios, std::move(c)) {} void http_tracker_connection::start() { std::string url = tracker_req().url; if (0 != (tracker_req().kind & tracker_request::scrape_request)) { // find and replace "announce" with "scrape" // in request std::size_t pos = url.find("announce"); if (pos == std::string::npos) { tracker_connection::fail(errors::scrape_not_available); return; } url.replace(pos, 8, "scrape"); } #if TORRENT_USE_I2P bool const i2p = is_i2p_url(url); #else static const bool i2p = false; #endif aux::session_settings const& settings = m_man.settings(); // if request-string already contains // some parameters, append an ampersand instead // of a question mark std::size_t arguments_start = url.find('?'); if (arguments_start != std::string::npos) url += "&"; else url += "?"; url += "info_hash="; url += escape_string({tracker_req().info_hash.data(), 20}); if (0 == (tracker_req().kind & tracker_request::scrape_request)) { static const char* event_string[] = {"completed", "started", "stopped", "paused"}; char str[1024]; std::snprintf(str, sizeof(str) , "&peer_id=%s" "&port=%d" "&uploaded=%" PRId64 "&downloaded=%" PRId64 "&left=%" PRId64 "&corrupt=%" PRId64 "&key=%08X" "%s%s" // event "&numwant=%d" "&compact=1" "&no_peer_id=1" , escape_string({tracker_req().pid.data(), 20}).c_str() // the i2p tracker seems to verify that the port is not 0, // even though it ignores it otherwise , tracker_req().listen_port , tracker_req().uploaded , tracker_req().downloaded , tracker_req().left , tracker_req().corrupt , tracker_req().key , (tracker_req().event != tracker_request::none) ? "&event=" : "" , (tracker_req().event != tracker_request::none) ? event_string[tracker_req().event - 1] : "" , tracker_req().num_want); url += str; #if !defined TORRENT_DISABLE_ENCRYPTION if (settings.get_int(settings_pack::in_enc_policy) != settings_pack::pe_disabled && settings.get_bool(settings_pack::announce_crypto_support)) url += "&supportcrypto=1"; #endif if (settings.get_bool(settings_pack::report_redundant_bytes)) { url += "&redundant="; url += to_string(tracker_req().redundant).data(); } if (!tracker_req().trackerid.empty()) { url += "&trackerid="; url += escape_string(tracker_req().trackerid); } #if TORRENT_USE_I2P if (i2p && tracker_req().i2pconn) { if (tracker_req().i2pconn->local_endpoint().empty()) { fail(errors::no_i2p_endpoint, "Waiting for i2p acceptor from SAM bridge", seconds32(5)); return; } else { url += "&ip=" + tracker_req().i2pconn->local_endpoint () + ".i2p"; } } else #endif if (!settings.get_bool(settings_pack::anonymous_mode)) { std::string const& announce_ip = settings.get_str(settings_pack::announce_ip); if (!announce_ip.empty()) { url += "&ip=" + escape_string(announce_ip); } } } if (!tracker_req().ipv4.empty() && !i2p) { for (auto const& v4 : tracker_req().ipv4) { error_code err; std::string const ip = v4.to_string(err); if (err) continue; url += "&ipv4="; url += escape_string(ip); } } if (!tracker_req().ipv6.empty() && !i2p) { for (auto const& v6 : tracker_req().ipv6) { error_code err; std::string const ip = v6.to_string(err); if (err) continue; url += "&ipv6="; url += escape_string(ip); } } if (!tracker_req().outgoing_socket) { fail(errors::invalid_listen_socket, "outgoing socket was closed"); return; } using namespace std::placeholders; m_tracker_connection = std::make_shared(get_io_service(), m_man.host_resolver() , std::bind(&http_tracker_connection::on_response, shared_from_this(), _1, _2, _3) , true, settings.get_int(settings_pack::max_http_recv_buffer_size) , std::bind(&http_tracker_connection::on_connect, shared_from_this(), _1) , std::bind(&http_tracker_connection::on_filter, shared_from_this(), _1, _2) #ifdef TORRENT_USE_OPENSSL , tracker_req().ssl_ctx #endif ); int const timeout = tracker_req().event == tracker_request::stopped ? settings.get_int(settings_pack::stop_tracker_timeout) : settings.get_int(settings_pack::tracker_completion_timeout); // in anonymous mode we omit the user agent to mitigate fingerprinting of // the client. Private torrents is an exception because some private // trackers may require the user agent std::string const user_agent = settings.get_bool(settings_pack::anonymous_mode) && !tracker_req().private_torrent ? "" : settings.get_str(settings_pack::user_agent); // when sending stopped requests, prefer the cached DNS entry // to avoid being blocked for slow or failing responses. Chances // are that we're shutting down, and this should be a best-effort // attempt. It's not worth stalling shutdown. aux::proxy_settings ps(settings); m_tracker_connection->get(url, seconds(timeout) , tracker_req().event == tracker_request::stopped ? 2 : 1 , ps.proxy_tracker_connections ? &ps : nullptr , 5, user_agent, bind_interface() , (tracker_req().event == tracker_request::stopped ? resolver_interface::cache_only : resolver_flags{}) | resolver_interface::abort_on_shutdown #if TORRENT_ABI_VERSION == 1 , tracker_req().auth #else , "" #endif #if TORRENT_USE_I2P , tracker_req().i2pconn #endif ); // the url + 100 estimated header size sent_bytes(int(url.size()) + 100); #ifndef TORRENT_DISABLE_LOGGING std::shared_ptr cb = requester(); if (cb) { cb->debug_log("==> TRACKER_REQUEST [ url: %s ]", url.c_str()); } #endif } void http_tracker_connection::close() { if (m_tracker_connection) { m_tracker_connection->close(); m_tracker_connection.reset(); } cancel(); m_man.remove_request(this); } // endpoints is an in-out parameter void http_tracker_connection::on_filter(http_connection& c , std::vector& endpoints) { // filter all endpoints we cannot reach from this listen socket, which may // be all of them, in which case we should not announce this listen socket // to this tracker auto const ls = bind_socket(); endpoints.erase(std::remove_if(endpoints.begin(), endpoints.end() , [&](tcp::endpoint const& ep) { return !ls.can_route(ep.address()); }) , endpoints.end()); if (endpoints.empty()) { fail(error_code(boost::system::errc::host_unreachable, system_category())); return; } TORRENT_UNUSED(c); if (!tracker_req().filter) return; // remove endpoints that are filtered by the IP filter for (auto i = endpoints.begin(); i != endpoints.end();) { if (tracker_req().filter->access(i->address()) == ip_filter::blocked) i = endpoints.erase(i); else ++i; } #ifndef TORRENT_DISABLE_LOGGING std::shared_ptr cb = requester(); if (cb) { cb->debug_log("*** TRACKER_FILTER"); } #endif if (endpoints.empty()) fail(errors::banned_by_ip_filter); } void http_tracker_connection::on_connect(http_connection& c) { error_code ec; tcp::endpoint ep = c.socket().remote_endpoint(ec); m_tracker_ip = ep.address(); } void http_tracker_connection::on_response(error_code const& ec , http_parser const& parser, span data) { // keep this alive std::shared_ptr me(shared_from_this()); if (ec && ec != boost::asio::error::eof) { fail(ec); return; } if (!parser.header_finished()) { fail(boost::asio::error::eof); return; } if (parser.status_code() != 200) { fail(error_code(parser.status_code(), http_category()) , parser.message().c_str()); return; } received_bytes(static_cast(data.size()) + parser.body_start()); // handle tracker response error_code ecode; std::shared_ptr cb = requester(); if (!cb) { close(); return; } tracker_response resp = parse_tracker_response(data, ecode , tracker_req().kind, tracker_req().info_hash); if (!resp.warning_message.empty()) cb->tracker_warning(tracker_req(), resp.warning_message); if (ecode) { fail(ecode, resp.failure_reason.c_str() , resp.interval, resp.min_interval); close(); return; } // do slightly different things for scrape requests if (0 != (tracker_req().kind & tracker_request::scrape_request)) { cb->tracker_scrape_response(tracker_req(), resp.complete , resp.incomplete, resp.downloaded, resp.downloaders); } else { std::list
ip_list; if (m_tracker_connection) { for (auto const& endp : m_tracker_connection->endpoints()) { ip_list.push_back(endp.address()); } } cb->tracker_response(tracker_req(), m_tracker_ip, ip_list, resp); } close(); } // TODO: 2 returning a bool here is redundant. Instead this function should // return the peer_entry bool extract_peer_info(bdecode_node const& info, peer_entry& ret, error_code& ec) { // extract peer id (if any) if (info.type() != bdecode_node::dict_t) { ec = errors::invalid_peer_dict; return false; } bdecode_node i = info.dict_find_string("peer id"); if (i && i.string_length() == 20) { std::copy(i.string_ptr(), i.string_ptr() + 20, ret.pid.begin()); } else { // if there's no peer_id, just initialize it to a bunch of zeroes ret.pid.clear(); } // extract ip i = info.dict_find_string("ip"); if (!i) { ec = errors::invalid_tracker_response; return false; } ret.hostname = i.string_value().to_string(); // extract port i = info.dict_find_int("port"); if (!i) { ec = errors::invalid_tracker_response; return false; } ret.port = std::uint16_t(i.int_value()); return true; } tracker_response parse_tracker_response(span const data, error_code& ec , int const flags, sha1_hash const& scrape_ih) { tracker_response resp; bdecode_node e; int const res = bdecode(data.begin(), data.end(), e, ec); if (ec) return resp; if (res != 0 || e.type() != bdecode_node::dict_t) { ec = errors::invalid_tracker_response; return resp; } // if no interval is specified, default to 30 minutes resp.interval = seconds32{e.dict_find_int_value("interval", 1800)}; resp.min_interval = seconds32{e.dict_find_int_value("min interval", 30)}; bdecode_node const tracker_id = e.dict_find_string("tracker id"); if (tracker_id) resp.trackerid = tracker_id.string_value().to_string(); // parse the response bdecode_node const failure = e.dict_find_string("failure reason"); if (failure) { resp.failure_reason = failure.string_value().to_string(); ec = errors::tracker_failure; return resp; } bdecode_node const warning = e.dict_find_string("warning message"); if (warning) resp.warning_message = warning.string_value().to_string(); if (0 != (flags & tracker_request::scrape_request)) { bdecode_node const files = e.dict_find_dict("files"); if (!files) { ec = errors::invalid_files_entry; return resp; } bdecode_node const scrape_data = files.dict_find_dict( scrape_ih.to_string()); if (!scrape_data) { ec = errors::invalid_hash_entry; return resp; } resp.complete = int(scrape_data.dict_find_int_value("complete", -1)); resp.incomplete = int(scrape_data.dict_find_int_value("incomplete", -1)); resp.downloaded = int(scrape_data.dict_find_int_value("downloaded", -1)); resp.downloaders = int(scrape_data.dict_find_int_value("downloaders", -1)); return resp; } // look for optional scrape info resp.complete = int(e.dict_find_int_value("complete", -1)); resp.incomplete = int(e.dict_find_int_value("incomplete", -1)); resp.downloaded = int(e.dict_find_int_value("downloaded", -1)); bdecode_node peers_ent = e.dict_find("peers"); if (peers_ent && peers_ent.type() == bdecode_node::string_t) { char const* peers = peers_ent.string_ptr(); int const len = peers_ent.string_length(); #if TORRENT_USE_I2P if (0 != (flags & tracker_request::i2p)) { for (int i = 0; i < len; i += 32) { if (len - i < 32) break; peer_entry p; p.hostname = base32encode(std::string(peers + i, 32), string::i2p); p.hostname += ".b32.i2p"; p.port = 6881; resp.peers.push_back(p); } } else #endif { resp.peers4.reserve(std::size_t(len / 6)); for (int i = 0; i < len; i += 6) { if (len - i < 6) break; ipv4_peer_entry p; p.ip = detail::read_v4_address(peers).to_v4().to_bytes(); p.port = detail::read_uint16(peers); resp.peers4.push_back(p); } } } else if (peers_ent && peers_ent.type() == bdecode_node::list_t) { int const len = peers_ent.list_size(); resp.peers.reserve(std::size_t(len)); error_code parse_error; for (int i = 0; i < len; ++i) { peer_entry p; if (!extract_peer_info(peers_ent.list_at(i), p, parse_error)) continue; resp.peers.push_back(p); } // only report an error if all peer entries are invalid if (resp.peers.empty() && parse_error) { ec = parse_error; return resp; } } else { peers_ent.clear(); } bdecode_node ipv6_peers = e.dict_find_string("peers6"); if (ipv6_peers) { char const* peers = ipv6_peers.string_ptr(); int const len = ipv6_peers.string_length(); resp.peers6.reserve(std::size_t(len / 18)); for (int i = 0; i < len; i += 18) { if (len - i < 18) break; ipv6_peer_entry p; p.ip = detail::read_v6_address(peers).to_v6().to_bytes(); p.port = detail::read_uint16(peers); resp.peers6.push_back(p); } } else { ipv6_peers.clear(); } /* // if we didn't receive any peers. We don't care if we're stopping anyway if (peers_ent == 0 && ipv6_peers == 0 && tracker_req().event != tracker_request::stopped) { ec = errors::invalid_peers_entry; return resp; } */ bdecode_node const ip_ent = e.dict_find_string("external ip"); if (ip_ent) { char const* p = ip_ent.string_ptr(); if (ip_ent.string_length() == std::tuple_size::value) resp.external_ip = detail::read_v4_address(p); else if (ip_ent.string_length() == std::tuple_size::value) resp.external_ip = detail::read_v6_address(p); } return resp; } }