C++;HTTP over SOCKS5(TOR)400错误请求 < >我使用C++代码获取特定网站的HTML源代码。 一个函数创建HTTP请求,其他函数发送它
但是,当我尝试以相同的方式访问网站时,除了使用TOR(SOCKS5),我得到的是C++;HTTP over SOCKS5(TOR)400错误请求 < >我使用C++代码获取特定网站的HTML源代码。 一个函数创建HTTP请求,其他函数发送它,c++,http,tor,socks,C++,Http,Tor,Socks,但是,当我尝试以相同的方式访问网站时,除了使用TOR(SOCKS5),我得到的是HTTP400错误请求响应。两次请求都是相同的,我可以通过Wireshark/调试看出它是正确的 看起来TOR可能搞乱了一些事情,但是其他需要通过TOR发送HTTP/HTTPS请求的工具似乎工作正常 以下是我的一些代码片段: GET / HTTP/1.1 Host: www.host.de User-Agent: UA Accept: text/html,application/xhtml+xml,applicati
HTTP400错误请求响应
。两次请求都是相同的,我可以通过Wireshark/调试看出它是正确的
看起来TOR可能搞乱了一些事情,但是其他需要通过TOR发送HTTP/HTTPS请求的工具似乎工作正常
以下是我的一些代码片段:
GET / HTTP/1.1
Host: www.host.de
User-Agent: UA
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US;q=0.7,en;q=0.3
Connection: close
----END-----
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>400 Bad Request</title>
</head><body>
<h1>Bad Request</h1>
<p>Your browser sent a request that this server could not understand.<br />
</p>
</body></html>
Main
int main(int argc, const char * argv[]) {
bool use_tor = false;
if(argc < 3){
std::cout << "[!] Please supply a url and 0 for no tor or 1 for tor." << std::endl;
return -1;
}
if(strcmp(argv[2],"1")==0){
use_tor = true;
}
int sock = createSocket();
if(use_tor){
SOCKS5_Greeting_Response socks_gresp;
SOCKS5_Command_Response socks_cresp;
socketConnect(sock, "127.0.0.1", 9050);
socks_gresp = socketWriteSOCKS5Greeting_TOR(sock);
if(socks_gresp.Version != 5){
std::cout << std::endl << "[!] SOCKS5 Version mismatch!" << std::endl;
closeSocket(sock);
return -1;
}
socks_cresp = SOCKS5_Connect(sock, get_IPv4(argv[1]), 80);
if(socks_cresp.Reply != 0){
std::cout << std::endl << "[!] SOCKS5 Connection failed!" << std::endl;
closeSocket(sock);
return -1;
}
}
else{
socketConnect(sock, argv[1], 80);
}
socketWrite(sock, generate_basic_GET_request("url","UA",""));
socketRead(sock)
closeSocket(sock);
}
这实际上让这更奇怪
另一个更新:现在它不再工作了,400个错误请求,在它似乎工作1分钟后。我不明白
只是另一个更新:我设置了端口转发,通过ncat(nmap工具)打开了一个端口,用Wireshark监控lo0上的传出请求(到TOR的socks5代理端口),用tcpdump监控en1上的传入请求,它们都是完全相同的,一个字节接一个字节。
因此,问题不依赖于TOR或socks5代理。请求按其应该的方式和发送的方式到达,但产生400个错误请求
就像整个服务器世界都知道我在代理背后阻止我一样
另一个更新,可能是最重要的更新:调试错误日志报告中的Apache:AH00566:请求失败:URI中的字符无效
但是,再次查看请求/响应,没有无效字符…确保
sizeof(req)
是您认为的。我打赌你正在发送一些额外的垃圾字节,这些字节有时会损坏动词。socks5服务器会不会在我向Web服务器发送数据之前不回复错误?不会,因为垃圾会被解释为URI的一部分。这很好地解释了你所看到的行为,有时随机垃圾是有效的,有时是无效的。非常感谢你的解释,我最终使用了libcurl,因为它是开箱即用的。。。可悲的是,我无法在那里为自己编写代码,但是的,我现在不想恢复所有更改。考虑到你的建议,我以后可能会试着自己做这件事。
GET / HTTP/1.1
Host: www.host.de
User-Agent: UA
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US;q=0.7,en;q=0.3
Connection: close
----END-----
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>400 Bad Request</title>
</head><body>
<h1>Bad Request</h1>
<p>Your browser sent a request that this server could not understand.<br />
</p>
</body></html>
struct SOCKS5_Greeting{
unsigned char Version;
unsigned char NumberOfMethods;
unsigned char Methods[256];
};
struct SOCKS5_Greeting_Response{
unsigned char Version;
unsigned char Method;
};
struct SOCKS5_Command{
unsigned char Version;
unsigned char Cmd;
unsigned char Reserved = 0x00;
unsigned char AddrType;
union{
in_addr_t IPv4;
} DestAddr;
unsigned short DestPort;
};
struct SOCKS5_Command_Response{
unsigned char Version;
unsigned char Reply;
unsigned char Reserved = 0x00;
unsigned char AddrType;
union{
in_addr_t IPv4;
} BindAddr;
unsigned short BindPort;
};
SOCKS5_Greeting_Response socketWriteSOCKS5Greeting_TOR(int sock){
SOCKS5_Greeting req;
SOCKS5_Greeting_Response resp;
req.Version = 5;
req.NumberOfMethods = 1;
req.Methods[0] = 0x00; //No Auth
send(sock, &req, 2+req.NumberOfMethods, 0);
recv(sock, &resp, sizeof(resp), 0);
return resp;
}
SOCKS5_Command_Response SOCKS5_Connect(int sock, std::string dest_str, unsigned short port){
SOCKS5_Command req;
SOCKS5_Command_Response resp;
in_addr_t dest = inet_addr(dest_str.c_str());
req.Version = 5;
req.Cmd = 1;
req.AddrType = 1;
req.DestAddr.IPv4 = dest;
req.DestPort = htons(port);
send(sock, &req, sizeof(req), 0);
recv(sock, &resp, sizeof(resp), 0);
return resp;
}
int createSocket(){
int sockfd = socket(AF_INET, SOCK_STREAM, 0);
return sockfd;
}
void closeSocket(int sock){
close(sock);
}
int socketConnect(int sock, const char *address, int port){
struct hostent *server;
struct sockaddr_in serv_addr;
server = gethostbyname(address);
if(server == NULL){
return -1;
}
bzero((char *) &serv_addr, sizeof(serv_addr));
serv_addr.sin_family = AF_INET;
bcopy((char *)server->h_addr, (char *)&serv_addr.sin_addr.s_addr, server->h_length);
serv_addr.sin_port = htons(port);
if(connect(sock,(struct sockaddr *) &serv_addr, sizeof(serv_addr)) < 0){
return -1;
}
else{
return 0;
}
}
int socketWrite(int sock, std::string data){
char buffer[512];
int error;
std::string chunk;
if(data.length() > 511){
while(data.length() > 0){
if(data.length() >= 511){
chunk = data.substr(0, 511);
data = data.substr(511, data.length());
}
else{
chunk = data;
data = "";
}
bzero(buffer, 512);
chunk.copy(buffer, chunk.length());
error = write(sock, buffer, strlen(buffer));
if(error < 0){
return error;
}
}
}
else{
bzero(buffer, 512);
data.copy(buffer, 512);
error = write(sock, buffer, strlen(buffer));
}
return error;
}
std::string socketRead(int sock){
std::string response = "";
char buffer[512];
int bytes;
while((bytes = read(sock, buffer, 511)) > 0){
std::string temp(buffer, bytes);
response = response + temp;
bzero(buffer, 512);
}
return response;
}
HTTP/1.1 501 Not Implemented
Date: Sat, 06 Feb 2016 21:43:08 GMT
Server: Apache
Allow: OPTIONS,GET,HEAD,POST
Vary: Accept-Encoding
Content-Length: 240
Content-Type: text/html; charset=iso-8859-1
Connection: close