summaryrefslogtreecommitdiffhomepage
path: root/src/transparent-proxy.c
diff options
context:
space:
mode:
authorrofl0r <rofl0r@users.noreply.github.com>2020-09-06 16:22:11 +0100
committerrofl0r <rofl0r@users.noreply.github.com>2020-09-06 16:22:11 +0100
commit36c9b93cfec19efdbc6600b85dac4a2b2e841013 (patch)
treeb35021bfac97e1b792fbdf1640672292a6a03cb2 /src/transparent-proxy.c
parent51b8be3ee4b9017287400b76a55a04f39f56a2ab (diff)
transparent: remove usage of inet_ntoa(), make IPv6 ready
inet_ntoa() uses a static buffer and is therefore not threadsafe. additionally it has been deprecated by POSIX. by using inet_ntop() instead the code has been made ipv6 aware. note that this codepath was only entered in the unlikely event that no hosts header was being passed to the proxy, i.e. pre-HTTP/1.1.
Diffstat (limited to 'src/transparent-proxy.c')
-rw-r--r--src/transparent-proxy.c20
1 files changed, 15 insertions, 5 deletions
diff --git a/src/transparent-proxy.c b/src/transparent-proxy.c
index 727ef3e..2c1e069 100644
--- a/src/transparent-proxy.c
+++ b/src/transparent-proxy.c
@@ -64,12 +64,16 @@ do_transparent_proxy (struct conn_s *connptr, hashmap_t hashofheaders,
length = hashmap_entry_by_key (hashofheaders, "host", (void **) &data);
if (length <= 0) {
- struct sockaddr_in dest_addr;
+ union sockaddr_union dest_addr;
+ const void *dest_inaddr;
+ char namebuf[INET6_ADDRSTRLEN+1];
+ int af;
length = sizeof(dest_addr);
if (getsockname
- (connptr->client_fd, (struct sockaddr *) &dest_addr,
+ (connptr->client_fd, (void *) &dest_addr,
&length) < 0 || length > sizeof(dest_addr)) {
+ addr_err:;
log_message (LOG_ERR,
"process_request: cannot get destination IP for %d",
connptr->client_fd);
@@ -79,10 +83,16 @@ do_transparent_proxy (struct conn_s *connptr, hashmap_t hashofheaders,
return 0;
}
- request->host = (char *) safemalloc (17);
- strlcpy (request->host, inet_ntoa (dest_addr.sin_addr), 17);
+ af = length == sizeof(dest_addr.v4) ? AF_INET : AF_INET6;
+ if (af == AF_INET) dest_inaddr = &dest_addr.v4.sin_addr;
+ else dest_inaddr = &dest_addr.v6.sin6_addr;
- request->port = ntohs (dest_addr.sin_port);
+ if (!inet_ntop(af, dest_inaddr, namebuf, sizeof namebuf))
+ goto addr_err;
+
+ request->host = safestrdup (namebuf);
+ request->port = ntohs (af == AF_INET ? dest_addr.v4.sin_port
+ : dest_addr.v6.sin6_port);
request->path = (char *) safemalloc (ulen + 1);
strlcpy (request->path, *url, ulen + 1);