C++;HTTP over SOCKS5(TOR)400错误请求 < >我使用C++代码获取特定网站的HTML源代码。 一个函数创建HTTP请求,其他函数发送它

C++;HTTP over SOCKS5(TOR)400错误请求 < >我使用C++代码获取特定网站的HTML源代码。 一个函数创建HTTP请求,其他函数发送它,c++,http,tor,socks,C++,Http,Tor,Socks,但是,当我尝试以相同的方式访问网站时,除了使用TOR(SOCKS5),我得到的是HTTP400错误请求响应。两次请求都是相同的,我可以通过Wireshark/调试看出它是正确的 看起来TOR可能搞乱了一些事情,但是其他需要通过TOR发送HTTP/HTTPS请求的工具似乎工作正常 以下是我的一些代码片段: GET / HTTP/1.1 Host: www.host.de User-Agent: UA Accept: text/html,application/xhtml+xml,applicati

但是,当我尝试以相同的方式访问网站时,除了使用TOR(SOCKS5),我得到的是
HTTP400错误请求响应
。两次请求都是相同的,我可以通过Wireshark/调试看出它是正确的

看起来TOR可能搞乱了一些事情,但是其他需要通过TOR发送HTTP/HTTPS请求的工具似乎工作正常

以下是我的一些代码片段:

GET / HTTP/1.1
Host: www.host.de
User-Agent: UA
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US;q=0.7,en;q=0.3
Connection: close

----END-----

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>400 Bad Request</title>
</head><body>
<h1>Bad Request</h1>
<p>Your browser sent a request that this server could not understand.<br />
</p>
</body></html>
Main

int main(int argc, const char * argv[]) {

bool use_tor = false;

if(argc < 3){

    std::cout << "[!] Please supply a url and 0 for no tor or 1 for tor." << std::endl;

    return -1;

}

if(strcmp(argv[2],"1")==0){

    use_tor = true;

}

        int sock = createSocket();

        if(use_tor){

            SOCKS5_Greeting_Response socks_gresp;
            SOCKS5_Command_Response socks_cresp;

            socketConnect(sock, "127.0.0.1", 9050);

            socks_gresp = socketWriteSOCKS5Greeting_TOR(sock);

            if(socks_gresp.Version != 5){

                std::cout << std::endl << "[!] SOCKS5 Version mismatch!" << std::endl;

                closeSocket(sock);

                return -1;

            }

            socks_cresp = SOCKS5_Connect(sock, get_IPv4(argv[1]), 80);

            if(socks_cresp.Reply != 0){

                std::cout << std::endl << "[!] SOCKS5 Connection failed!" << std::endl;

                closeSocket(sock);

                return -1;

            }

        }
        else{

            socketConnect(sock, argv[1], 80);

        }

        socketWrite(sock, generate_basic_GET_request("url","UA",""));

        socketRead(sock)

        closeSocket(sock);
}
这实际上让这更奇怪

另一个更新:现在它不再工作了,400个错误请求,在它似乎工作1分钟后。我不明白

只是另一个更新:我设置了端口转发,通过ncat(nmap工具)打开了一个端口,用Wireshark监控lo0上的传出请求(到TOR的socks5代理端口),用tcpdump监控en1上的传入请求,它们都是完全相同的,一个字节接一个字节。 因此,问题不依赖于TOR或socks5代理。请求按其应该的方式和发送的方式到达,但产生400个错误请求

就像整个服务器世界都知道我在代理背后阻止我一样

另一个更新,可能是最重要的更新:调试错误日志报告中的Apache:AH00566:请求失败:URI中的字符无效


但是,再次查看请求/响应,没有无效字符…

确保
sizeof(req)
是您认为的。我打赌你正在发送一些额外的垃圾字节,这些字节有时会损坏动词。socks5服务器会不会在我向Web服务器发送数据之前不回复错误?不会,因为垃圾会被解释为URI的一部分。这很好地解释了你所看到的行为,有时随机垃圾是有效的,有时是无效的。非常感谢你的解释,我最终使用了libcurl,因为它是开箱即用的。。。可悲的是,我无法在那里为自己编写代码,但是的,我现在不想恢复所有更改。考虑到你的建议,我以后可能会试着自己做这件事。
GET / HTTP/1.1
Host: www.host.de
User-Agent: UA
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US;q=0.7,en;q=0.3
Connection: close

----END-----

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>400 Bad Request</title>
</head><body>
<h1>Bad Request</h1>
<p>Your browser sent a request that this server could not understand.<br />
</p>
</body></html>
struct SOCKS5_Greeting{

unsigned char Version;
unsigned char NumberOfMethods;
unsigned char Methods[256];

};

struct SOCKS5_Greeting_Response{

unsigned char Version;
unsigned char Method;

};

struct SOCKS5_Command{

unsigned char Version;
unsigned char Cmd;
unsigned char Reserved = 0x00;
unsigned char AddrType;
union{
    in_addr_t IPv4;
} DestAddr;
unsigned short DestPort;

};

struct SOCKS5_Command_Response{

unsigned char Version;
unsigned char Reply;
unsigned char Reserved = 0x00;
unsigned char AddrType;
union{
    in_addr_t IPv4;
} BindAddr;
unsigned short BindPort;

};

SOCKS5_Greeting_Response socketWriteSOCKS5Greeting_TOR(int sock){

SOCKS5_Greeting req;
SOCKS5_Greeting_Response resp;

req.Version = 5;
req.NumberOfMethods = 1;
req.Methods[0] = 0x00; //No Auth

send(sock, &req, 2+req.NumberOfMethods, 0);

recv(sock, &resp, sizeof(resp), 0);

return resp;

}

SOCKS5_Command_Response SOCKS5_Connect(int sock, std::string dest_str, unsigned short port){

SOCKS5_Command req;
SOCKS5_Command_Response resp;

in_addr_t dest = inet_addr(dest_str.c_str());

req.Version = 5;
req.Cmd = 1;
req.AddrType = 1;
req.DestAddr.IPv4 = dest;
req.DestPort = htons(port);

send(sock, &req, sizeof(req), 0);

recv(sock, &resp, sizeof(resp), 0);

return resp;

}

int createSocket(){

int sockfd = socket(AF_INET, SOCK_STREAM, 0);

return sockfd;

}

void closeSocket(int sock){

close(sock);

}

int socketConnect(int sock, const char *address, int port){

struct hostent *server;
struct sockaddr_in serv_addr;

server = gethostbyname(address);

if(server == NULL){
    return -1;
}

bzero((char *) &serv_addr, sizeof(serv_addr));

serv_addr.sin_family = AF_INET;

bcopy((char *)server->h_addr, (char *)&serv_addr.sin_addr.s_addr, server->h_length);

serv_addr.sin_port = htons(port);

if(connect(sock,(struct sockaddr *) &serv_addr, sizeof(serv_addr)) < 0){
    return -1;
}
else{
    return 0;
}

}

int socketWrite(int sock, std::string data){

char buffer[512];

int error;

std::string chunk;

if(data.length() > 511){

    while(data.length() > 0){

        if(data.length() >= 511){

            chunk = data.substr(0, 511);

            data = data.substr(511, data.length());

        }
        else{

            chunk = data;

            data = "";

        }

        bzero(buffer, 512);

        chunk.copy(buffer, chunk.length());

        error = write(sock, buffer, strlen(buffer));

        if(error < 0){
            return error;
        }

    }

}
else{

    bzero(buffer, 512);

    data.copy(buffer, 512);

    error = write(sock, buffer, strlen(buffer));

}

return error;

}

std::string socketRead(int sock){

std::string response = "";

char buffer[512];

int bytes;

while((bytes = read(sock, buffer, 511)) > 0){

    std::string temp(buffer, bytes);

    response = response + temp;

    bzero(buffer, 512);

}

return response;

}
HTTP/1.1 501 Not Implemented
Date: Sat, 06 Feb 2016 21:43:08 GMT
Server: Apache
Allow: OPTIONS,GET,HEAD,POST
Vary: Accept-Encoding
Content-Length: 240
Content-Type: text/html; charset=iso-8859-1
Connection: close