/*
Plugin of Miranda IM for communicating with users of the MSN Messenger protocol.
Copyright (c) 2012-2014 Miranda NG Team
Copyright (c) 2007-2012 Boris Krasnovskiy.
This program is free software; you can redistribute it and/or
modify it under the terms of the GNU General Public License
as published by the Free Software Foundation; either version 2
of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see .
*/
#include "stdafx.h"
#include "msn_proto.h"
#include
#ifdef OBSOLETE
#ifndef CLSID_NetFwMgr
#define MDEF_CLSID(name, l, w1, w2, b1, b2, b3, b4, b5, b6, b7, b8) \
const CLSID name = { l, w1, w2, { b1, b2, b3, b4, b5, b6, b7, b8 } }
MDEF_CLSID(CLSID_NetFwMgr, 0x304ce942, 0x6e39, 0x40d8, 0x94, 0x3a, 0xb9, 0x13, 0xc4, 0x0c, 0x9c, 0xd4);
MDEF_CLSID(IID_INetFwMgr, 0xf7898af5, 0xcac4, 0x4632, 0xa2, 0xec, 0xda ,0x06, 0xe5, 0x11, 0x1a, 0xf2);
#endif
MyConnectionType MyConnection;
const char* conStr[] =
{
"Unknown-Connect",
"Direct-Connect",
"Unknown-NAT",
"IP-Restrict-NAT",
"Port-Restrict-NAT",
"Symmetric-NAT",
"Firewall",
"ISALike"
};
void CMsnProto::DecryptEchoPacket(UDPProbePkt& pkt)
{
pkt.clientPort ^= 0x3141;
pkt.discardPort ^= 0x3141;
pkt.testPort ^= 0x3141;
pkt.clientIP ^= 0x31413141;
pkt.testIP ^= 0x31413141;
IN_ADDR addr;
debugLogA("Echo packet: version: 0x%x service code: 0x%x transaction ID: 0x%x",
pkt.version, pkt.serviceCode, pkt.trId);
addr.S_un.S_addr = pkt.clientIP;
debugLogA("Echo packet: client port: %u client addr: %s",
pkt.clientPort, inet_ntoa(addr));
addr.S_un.S_addr = pkt.testIP;
debugLogA("Echo packet: discard port: %u test port: %u test addr: %s",
pkt.discardPort, pkt.testPort, inet_ntoa(addr));
}
static void DiscardExtraPackets(SOCKET s)
{
Sleep(3000);
static const TIMEVAL tv = { 0, 0 };
unsigned buf;
for (;;) {
if (g_bTerminated) break;
fd_set fd;
FD_ZERO(&fd);
FD_SET(s, &fd);
if (select(1, &fd, NULL, NULL, &tv) == 1)
recv(s, (char*)&buf, sizeof(buf), 0);
else
break;
}
}
void CMsnProto::MSNatDetect(void)
{
PHOSTENT host = gethostbyname("echo.edge.messenger.live.com");
if (host == NULL) {
debugLogA("P2PNAT could not find echo server \"echo.edge.messenger.live.com\"");
return;
}
SOCKADDR_IN addr;
addr.sin_family = AF_INET;
addr.sin_port = _htons(7001);
addr.sin_addr = *(PIN_ADDR)host->h_addr_list[0];
debugLogA("P2PNAT Detected echo server IP %d.%d.%d.%d",
addr.sin_addr.S_un.S_un_b.s_b1, addr.sin_addr.S_un.S_un_b.s_b2,
addr.sin_addr.S_un.S_un_b.s_b3, addr.sin_addr.S_un.S_un_b.s_b4);
SOCKET s = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
if (connect(s, (SOCKADDR*)&addr, sizeof(addr)) == SOCKET_ERROR) {
debugLogA("P2PNAT could not connect to echo server \"echo.edge.messenger.live.com\"");
closesocket(s);
return;
}
UDPProbePkt pkt = { 0 }, pkt2;
// Detect My IP
pkt.version = 2;
pkt.serviceCode = 4;
send(s, (char*)&pkt, sizeof(pkt), 0);
SOCKADDR_IN myaddr;
int szname = sizeof(myaddr);
getsockname(s, (SOCKADDR*)&myaddr, &szname);
MyConnection.intIP = myaddr.sin_addr.S_un.S_addr;
debugLogA("P2PNAT Detected IP facing internet %d.%d.%d.%d",
myaddr.sin_addr.S_un.S_un_b.s_b1, myaddr.sin_addr.S_un.S_un_b.s_b2,
myaddr.sin_addr.S_un.S_un_b.s_b3, myaddr.sin_addr.S_un.S_un_b.s_b4);
SOCKET s1 = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
pkt.version = 2;
pkt.serviceCode = 1;
pkt.clientPort = 0x3141;
pkt.clientIP = 0x31413141;
UDPProbePkt rpkt = { 0 };
// NAT detection
unsigned i;
for (i = 0; i < 4; ++i) {
if (g_bTerminated) break;
// Send echo request to server 1
debugLogA("P2PNAT Request 1 attempt %d sent", i);
sendto(s1, (char*)&pkt, sizeof(pkt), 0, (SOCKADDR*)&addr, sizeof(addr));
fd_set fd;
FD_ZERO(&fd);
FD_SET(s1, &fd);
TIMEVAL tv = { 0, 200000 * (1 << i) };
if (select(1, &fd, NULL, NULL, &tv) == 1) {
debugLogA("P2PNAT Request 1 attempt %d response", i);
recv(s1, (char*)&rpkt, sizeof(rpkt), 0);
pkt2 = rpkt;
DecryptEchoPacket(rpkt);
break;
}
else debugLogA("P2PNAT Request 1 attempt %d timeout", i);
}
closesocket(s);
// Server did not respond
if (i >= 4) {
MyConnection.udpConType = conFirewall;
closesocket(s1);
return;
}
MyConnection.extIP = rpkt.clientIP;
// Check if NAT not found
if (MyConnection.extIP == MyConnection.intIP) {
if (msnExternalIP != NULL && inet_addr(msnExternalIP) != MyConnection.extIP)
MyConnection.udpConType = conISALike;
else
MyConnection.udpConType = conDirect;
closesocket(s1);
return;
}
// Detect UPnP NAT
NETLIBBIND nlb = { 0 };
nlb.cbSize = sizeof(nlb);
nlb.pfnNewConnectionV2 = MSN_ConnectionProc;
nlb.pExtra = this;
HANDLE sb = (HANDLE)CallService(MS_NETLIB_BINDPORT, (WPARAM)m_hNetlibUser, (LPARAM)&nlb);
if (sb != NULL) {
MyConnection.upnpNAT = htonl(nlb.dwExternalIP) == MyConnection.extIP;
Sleep(100);
Netlib_CloseHandle(sb);
}
DiscardExtraPackets(s1);
// Start IP Restricted NAT detection
UDPProbePkt rpkt2 = { 0 };
pkt2.serviceCode = 3;
SOCKADDR_IN addr2 = addr;
addr2.sin_addr.S_un.S_addr = rpkt.testIP;
addr2.sin_port = rpkt.discardPort;
for (i = 0; i < 4; ++i) {
if (g_bTerminated) break;
debugLogA("P2PNAT Request 2 attempt %d sent", i);
// Remove IP restriction for server 2
sendto(s1, NULL, 0, 0, (SOCKADDR*)&addr2, sizeof(addr2));
// Send echo request to server 1 for server 2
sendto(s1, (char*)&pkt2, sizeof(pkt2), 0, (SOCKADDR*)&addr, sizeof(addr));
fd_set fd;
FD_ZERO(&fd);
FD_SET(s1, &fd);
TIMEVAL tv = { 0, 200000 * (1 << i) };
if (select(1, &fd, NULL, NULL, &tv) == 1) {
debugLogA("P2PNAT Request 2 attempt %d response", i);
recv(s1, (char*)&rpkt2, sizeof(rpkt2), 0);
DecryptEchoPacket(rpkt2);
break;
}
else
debugLogA("P2PNAT Request 2 attempt %d timeout", i);
}
// Response recieved so it's an IP Restricted NAT (Restricted Cone NAT)
// (MSN does not detect Full Cone NAT and consider it as IP Restricted NAT)
if (i < 4) {
MyConnection.udpConType = conIPRestrictNAT;
closesocket(s1);
return;
}
DiscardExtraPackets(s1);
// Symmetric NAT detection
addr2.sin_port = rpkt.testPort;
for (i = 0; i < 4; ++i) {
if (g_bTerminated) break;
debugLogA("P2PNAT Request 3 attempt %d sent", i);
// Send echo request to server 1
sendto(s1, (char*)&pkt, sizeof(pkt), 0, (SOCKADDR*)&addr2, sizeof(addr2));
fd_set fd;
FD_ZERO(&fd);
FD_SET(s1, &fd);
TIMEVAL tv = { 1 << i, 0 };
if (select(1, &fd, NULL, NULL, &tv) == 1) {
debugLogA("P2PNAT Request 3 attempt %d response", i);
recv(s1, (char*)&rpkt2, sizeof(rpkt2), 0);
DecryptEchoPacket(rpkt2);
break;
}
else
debugLogA("P2PNAT Request 3 attempt %d timeout", i);
}
if (i < 4) {
// If ports different it's symmetric NAT
MyConnection.udpConType = rpkt.clientPort == rpkt2.clientPort ?
conPortRestrictNAT : conSymmetricNAT;
}
closesocket(s1);
}
static bool IsIcfEnabled(void)
{
HRESULT hr;
VARIANT_BOOL fwEnabled = VARIANT_FALSE;
INetFwProfile* fwProfile = NULL;
INetFwMgr* fwMgr = NULL;
INetFwPolicy* fwPolicy = NULL;
INetFwAuthorizedApplication* fwApp = NULL;
INetFwAuthorizedApplications* fwApps = NULL;
BSTR fwBstrProcessImageFileName = NULL;
wchar_t *wszFileName = NULL;
hr = CoInitialize(NULL);
if (FAILED(hr)) return false;
// Create an instance of the firewall settings manager.
hr = CoCreateInstance(CLSID_NetFwMgr, NULL, CLSCTX_INPROC_SERVER,
IID_INetFwMgr, (void**)&fwMgr);
if (FAILED(hr)) goto error;
// Retrieve the local firewall policy.
hr = fwMgr->get_LocalPolicy(&fwPolicy);
if (FAILED(hr)) goto error;
// Retrieve the firewall profile currently in effect.
hr = fwPolicy->get_CurrentProfile(&fwProfile);
if (FAILED(hr)) goto error;
// Get the current state of the firewall.
hr = fwProfile->get_FirewallEnabled(&fwEnabled);
if (FAILED(hr)) goto error;
if (fwEnabled == VARIANT_FALSE) goto error;
// Retrieve the authorized application collection.
hr = fwProfile->get_AuthorizedApplications(&fwApps);
if (FAILED(hr)) goto error;
TCHAR szFileName[MAX_PATH];
GetModuleFileName(NULL, szFileName, _countof(szFileName));
wszFileName = mir_t2u(szFileName);
// Allocate a BSTR for the process image file name.
fwBstrProcessImageFileName = SysAllocString(wszFileName);
if (FAILED(hr)) goto error;
// Attempt to retrieve the authorized application.
hr = fwApps->Item(fwBstrProcessImageFileName, &fwApp);
if (SUCCEEDED(hr)) {
// Find out if the authorized application is enabled.
fwApp->get_Enabled(&fwEnabled);
fwEnabled = ~fwEnabled;
}
error:
// Free the BSTR.
SysFreeString(fwBstrProcessImageFileName);
mir_free(wszFileName);
// Release the authorized application instance.
if (fwApp != NULL) fwApp->Release();
// Release the authorized application collection.
if (fwApps != NULL) fwApps->Release();
// Release the firewall profile.
if (fwProfile != NULL) fwProfile->Release();
// Release the local firewall policy.
if (fwPolicy != NULL) fwPolicy->Release();
// Release the firewall settings manager.
if (fwMgr != NULL) fwMgr->Release();
CoUninitialize();
return fwEnabled != VARIANT_FALSE;
}
void CMsnProto::MSNConnDetectThread(void*)
{
char parBuf[512] = "";
memset(&MyConnection, 0, sizeof(MyConnection));
MyConnection.icf = IsIcfEnabled();
bool portsMapped = getByte("NLSpecifyIncomingPorts", 0) != 0;
unsigned gethst = getByte("AutoGetHost", 1);
switch (gethst) {
case 0:
debugLogA("P2PNAT User overwrote IP connection is guessed by user settings only");
// User specified host by himself so check if it matches MSN information
// if it does, move to connection type autodetection,
// if it does not, guess connection type from available info
db_get_static(NULL, m_szModuleName, "YourHost", parBuf, sizeof(parBuf));
if (msnExternalIP == NULL || mir_strcmp(msnExternalIP, parBuf) != 0) {
MyConnection.extIP = inet_addr(parBuf);
if (MyConnection.extIP == INADDR_NONE) {
PHOSTENT myhost = gethostbyname(parBuf);
if (myhost != NULL)
MyConnection.extIP = ((PIN_ADDR)myhost->h_addr)->S_un.S_addr;
else
setByte("AutoGetHost", 1);
}
if (MyConnection.extIP != INADDR_NONE) {
MyConnection.intIP = MyConnection.extIP;
MyConnection.udpConType = MyConnection.extIP ? (ConEnum)portsMapped : conUnknown;
MyConnection.CalculateWeight();
return;
}
else
MyConnection.extIP = 0;
}
break;
case 1:
if (msnExternalIP != NULL)
MyConnection.extIP = inet_addr(msnExternalIP);
else {
gethostname(parBuf, sizeof(parBuf));
PHOSTENT myhost = gethostbyname(parBuf);
if (myhost != NULL)
MyConnection.extIP = ((PIN_ADDR)myhost->h_addr)->S_un.S_addr;
}
MyConnection.intIP = MyConnection.extIP;
break;
case 2:
MyConnection.udpConType = conUnknown;
MyConnection.CalculateWeight();
return;
}
if (getByte("NLSpecifyOutgoingPorts", 0)) {
// User specified outgoing ports so the connection must be firewalled
// do not autodetect and guess connection type from available info
MyConnection.intIP = MyConnection.extIP;
MyConnection.udpConType = (ConEnum)portsMapped;
MyConnection.upnpNAT = false;
MyConnection.CalculateWeight();
return;
}
MSNatDetect();
// If user mapped incoming ports consider direct connection
if (portsMapped) {
debugLogA("P2PNAT User manually mapped ports for incoming connection");
switch (MyConnection.udpConType) {
case conUnknown:
case conFirewall:
case conISALike:
MyConnection.udpConType = conDirect;
break;
case conUnknownNAT:
case conPortRestrictNAT:
case conIPRestrictNAT:
case conSymmetricNAT:
MyConnection.upnpNAT = true;
break;
}
}
debugLogA("P2PNAT Connection %s found UPnP: %d ICF: %d", conStr[MyConnection.udpConType],
MyConnection.upnpNAT, MyConnection.icf);
MyConnection.CalculateWeight();
}
void MyConnectionType::SetUdpCon(const char* str)
{
for (unsigned i = 0; i < sizeof(conStr) / sizeof(char*); ++i) {
if (mir_strcmp(conStr[i], str) == 0) {
udpConType = (ConEnum)i;
break;
}
}
}
void MyConnectionType::CalculateWeight(void)
{
if (icf) weight = 0;
else if (udpConType == conDirect) weight = 6;
else if (udpConType >= conIPRestrictNAT && udpConType <= conSymmetricNAT)
weight = upnpNAT ? 5 : 2;
else if (udpConType == conUnknownNAT)
weight = upnpNAT ? 4 : 1;
else if (udpConType == conUnknown) weight = 1;
else if (udpConType == conFirewall) weight = 2;
else if (udpConType == conISALike) weight = 3;
}
#endif