From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([2001:4830:134:3::10]:40577) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1cvBq9-0007kP-F6 for qemu-devel@nongnu.org; Mon, 03 Apr 2017 19:56:54 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1cvBq4-0002ST-KC for qemu-devel@nongnu.org; Mon, 03 Apr 2017 19:56:53 -0400 Received: from mout.kundenserver.de ([217.72.192.75]:52740) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_128_CBC_SHA1:16) (Exim 4.71) (envelope-from ) id 1cvBq4-0002Rd-9x for qemu-devel@nongnu.org; Mon, 03 Apr 2017 19:56:48 -0400 From: Laurent Vivier Date: Tue, 4 Apr 2017 01:56:35 +0200 Message-Id: <20170403235636.5647-1-laurent@vivier.eu> Subject: [Qemu-devel] [PATCH v3 0/1] slirp: add SOCKS5 support List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: Samuel Thibault Cc: Eric Blake , qemu-devel@nongnu.org, "Daniel P . Berrange" , Jason Wang , Laurent Vivier This patch implements the SOCKS5 client part for "-net user" backend. It allows to route all internet traffic of the virtual machine to a SOCKS5 server. But all the local traffic (to the host) is sent to the host. It is needed because this SOCKS5 client doesn't route UDP traffic, and this allows to use the host DNS server. I've tested this using public SOCKS5 proxy list found on the WEB, and using TOR server on my host. Used with TOR, all the TCP connections are sent to the TOR network and this allows to insert a virtual machine directly in the TOR network without needing more configuration in the virtual machine. But be aware that all DNS requests will be sent to the host that can forward them to internet with its own IP address. So confidentiality will not be as good as with the TOR browser which hides in the TOR network all the DNS requests. If you want to test this: - with a public SOCKS5 server, ask google for "socks5 proxy address" and start QEMU with, for instance: qemu-system-x86_64 -net nic,model=e1000 -net user,proxy-server=46.105.121.37:63066 ... if needed, you can provide user/password using secret objects framework: "-object secret,id=sec0,data=password,format=raw \ -net user,...,proxy-user=user,proxy-secretid=sec0" - with a local TOR proxy: sudo systemctl start tor qemu-system-x86_64 -net nic,model=e1000 -net user,proxy-server=localhost:9050 ... You can check your IP address is the one of the proxy by connecting to http://check.torproject.org with a browser inside the VM. v3: - rewrite SOCKS5 functions from scratch and drop code from nmap/ncat - don't drop the IPv6 UDP local traffic - don't pass to the proxy the IPv6 TCP local traffic - add some comments... v2: - use secret objects framework to provide password - add documentation for new parameters in qapi-schema.json - s/passwd/password/g - I didn't move proxy paramaters to a substruct as I didn't find a way to set them from the command line :( Laurent Vivier (1): slirp: add SOCKS5 support net/slirp.c | 39 ++++++- qapi-schema.json | 9 ++ qemu-options.hx | 11 ++ slirp/Makefile.objs | 2 +- slirp/ip_icmp.c | 2 +- slirp/libslirp.h | 3 + slirp/slirp.c | 68 ++++++++++- slirp/slirp.h | 6 + slirp/socket.h | 4 + slirp/socks5.c | 328 ++++++++++++++++++++++++++++++++++++++++++++++++++++ slirp/socks5.h | 24 ++++ slirp/tcp_subr.c | 22 +++- slirp/udp.c | 9 ++ slirp/udp6.c | 8 ++ 14 files changed, 524 insertions(+), 11 deletions(-) create mode 100644 slirp/socks5.c create mode 100644 slirp/socks5.h -- 2.9.3