NetGuard/app/src/main/java/eu/faircode/netguard/ServiceSinkhole.java

2822 lines
118 KiB
Java
Raw Normal View History

2015-10-24 18:01:55 +00:00
package eu.faircode.netguard;
2015-11-03 17:57:29 +00:00
/*
This file is part of NetGuard.
NetGuard is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
NetGuard is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with NetGuard. If not, see <http://www.gnu.org/licenses/>.
2016-12-29 08:27:58 +00:00
Copyright 2015-2017 by Marcel Bokhorst (M66B)
2015-11-03 17:57:29 +00:00
*/
import android.annotation.TargetApi;
2016-01-01 09:06:02 +00:00
import android.app.AlarmManager;
import android.app.Notification;
import android.app.NotificationManager;
2015-10-24 18:01:55 +00:00
import android.app.PendingIntent;
import android.content.BroadcastReceiver;
import android.content.Context;
import android.content.Intent;
import android.content.IntentFilter;
import android.content.SharedPreferences;
import android.content.pm.ApplicationInfo;
import android.content.pm.PackageManager;
2016-03-29 16:30:04 +00:00
import android.content.res.Configuration;
2016-01-30 13:26:30 +00:00
import android.database.Cursor;
import android.graphics.Bitmap;
import android.graphics.Canvas;
import android.graphics.Color;
import android.graphics.Paint;
import android.graphics.Path;
import android.graphics.Typeface;
2015-10-24 18:01:55 +00:00
import android.net.ConnectivityManager;
import android.net.NetworkInfo;
import android.net.TrafficStats;
import android.net.Uri;
2015-10-24 18:01:55 +00:00
import android.net.VpnService;
import android.os.Build;
import android.os.Handler;
import android.os.HandlerThread;
import android.os.Looper;
import android.os.Message;
2015-10-24 18:01:55 +00:00
import android.os.ParcelFileDescriptor;
import android.os.PowerManager;
2016-01-22 15:13:33 +00:00
import android.os.Process;
import android.os.SystemClock;
2015-10-24 19:50:29 +00:00
import android.preference.PreferenceManager;
2015-10-30 09:51:44 +00:00
import android.support.v4.app.NotificationCompat;
2015-11-04 20:15:57 +00:00
import android.support.v4.app.NotificationManagerCompat;
2015-11-04 20:13:17 +00:00
import android.support.v4.content.ContextCompat;
import android.support.v4.content.LocalBroadcastManager;
import android.telephony.PhoneStateListener;
import android.telephony.ServiceState;
import android.telephony.SubscriptionManager;
import android.telephony.TelephonyManager;
import android.text.Spannable;
import android.text.SpannableString;
import android.text.TextUtils;
2016-01-31 08:04:54 +00:00
import android.text.style.ForegroundColorSpan;
import android.text.style.StyleSpan;
2015-10-24 18:01:55 +00:00
import android.util.Log;
2016-01-02 12:22:18 +00:00
import android.util.TypedValue;
import android.widget.RemoteViews;
2015-10-24 18:01:55 +00:00
import org.json.JSONArray;
import org.json.JSONException;
import org.json.JSONObject;
2016-01-28 10:58:39 +00:00
import java.io.BufferedReader;
2016-01-17 09:42:21 +00:00
import java.io.File;
2016-01-28 10:58:39 +00:00
import java.io.FileReader;
2015-10-24 18:01:55 +00:00
import java.io.IOException;
import java.io.InputStreamReader;
import java.math.BigInteger;
2016-03-31 07:51:18 +00:00
import java.net.Inet4Address;
import java.net.InetAddress;
2016-03-31 07:51:18 +00:00
import java.net.InterfaceAddress;
import java.net.NetworkInterface;
import java.net.SocketException;
import java.net.URL;
2016-01-30 09:59:19 +00:00
import java.net.UnknownHostException;
2016-01-30 18:52:31 +00:00
import java.text.DateFormat;
import java.text.SimpleDateFormat;
import java.util.ArrayList;
2016-03-29 16:30:04 +00:00
import java.util.Collections;
2015-12-13 13:49:08 +00:00
import java.util.Comparator;
2016-01-01 09:06:02 +00:00
import java.util.Date;
2016-03-31 07:51:18 +00:00
import java.util.Enumeration;
import java.util.HashMap;
2015-12-10 07:38:45 +00:00
import java.util.HashSet;
import java.util.List;
2016-01-30 13:26:30 +00:00
import java.util.Map;
2015-12-10 07:38:45 +00:00
import java.util.Set;
import java.util.TreeMap;
2016-12-21 13:35:34 +00:00
import java.util.concurrent.locks.ReentrantReadWriteLock;
2015-10-24 18:01:55 +00:00
import javax.net.ssl.HttpsURLConnection;
2016-03-11 06:47:52 +00:00
public class ServiceSinkhole extends VpnService implements SharedPreferences.OnSharedPreferenceChangeListener {
private static final String TAG = "NetGuard.Service";
2015-10-24 18:01:55 +00:00
2016-05-14 16:03:01 +00:00
private boolean registeredInteractiveState = false;
private boolean registeredPowerSave = false;
private boolean registeredUser = false;
private boolean registeredIdleState = false;
private boolean registeredConnectivityChanged = false;
2017-04-02 10:47:59 +00:00
private boolean registeredPackageChanged = false;
2016-05-14 16:03:01 +00:00
private State state = State.none;
2016-01-11 10:38:48 +00:00
private boolean user_foreground = true;
private boolean last_connected = false;
private boolean last_metered = true;
2016-01-01 09:06:02 +00:00
private boolean last_interactive = false;
private boolean powersaving = false;
private boolean phone_state = false;
2015-12-07 11:23:43 +00:00
private Object subscriptionsChangedListener = null;
2016-03-11 06:47:52 +00:00
private ServiceSinkhole.Builder last_builder = null;
private ParcelFileDescriptor vpn = null;
2015-10-29 22:29:01 +00:00
2016-02-15 12:10:35 +00:00
private long last_hosts_modified = 0;
2016-01-30 13:26:30 +00:00
private Map<String, Boolean> mapHostsBlocked = new HashMap<>();
private Map<Integer, Boolean> mapUidAllowed = new HashMap<>();
private Map<Integer, Integer> mapUidKnown = new HashMap<>();
2016-11-11 18:52:50 +00:00
private Map<Long, Map<InetAddress, IPRule>> mapUidIPFilters = new HashMap<>();
2016-02-08 15:34:54 +00:00
private Map<Integer, Forward> mapForward = new HashMap<>();
private Map<Integer, Boolean> mapNoNotify = new HashMap<>();
2016-12-21 13:35:34 +00:00
private ReentrantReadWriteLock lock = new ReentrantReadWriteLock(true);
2016-01-28 10:58:39 +00:00
private volatile Looper commandLooper;
private volatile Looper logLooper;
private volatile Looper statsLooper;
private volatile CommandHandler commandHandler;
private volatile LogHandler logHandler;
private volatile StatsHandler statsHandler;
private static final int NOTIFY_ENFORCING = 1;
private static final int NOTIFY_WAITING = 2;
private static final int NOTIFY_DISABLED = 3;
2016-02-02 07:20:57 +00:00
private static final int NOTIFY_AUTOSTART = 4;
2016-07-03 13:51:04 +00:00
private static final int NOTIFY_ERROR = 5;
private static final int NOTIFY_TRAFFIC = 6;
private static final int NOTIFY_UPDATE = 7;
public static final String EXTRA_COMMAND = "Command";
private static final String EXTRA_REASON = "Reason";
public static final String EXTRA_NETWORK = "Network";
public static final String EXTRA_UID = "UID";
public static final String EXTRA_PACKAGE = "Package";
public static final String EXTRA_BLOCKED = "Blocked";
2017-07-12 07:21:21 +00:00
public static final String EXTRA_CONDITIONAL = "Conditional";
2015-10-24 18:01:55 +00:00
private static final int MSG_SERVICE_INTENT = 0;
private static final int MSG_STATS_START = 1;
private static final int MSG_STATS_STOP = 2;
private static final int MSG_STATS_UPDATE = 3;
2016-01-22 09:54:48 +00:00
private static final int MSG_PACKET = 4;
2016-03-09 16:51:49 +00:00
private static final int MSG_USAGE = 5;
private enum State {none, waiting, enforcing, stats}
2016-07-31 14:01:24 +00:00
public enum Command {run, start, reload, stop, stats, set, householding, watchdog}
2015-10-24 18:01:55 +00:00
private static volatile PowerManager.WakeLock wlInstance = null;
2016-03-01 11:07:06 +00:00
private static final String ACTION_HOUSE_HOLDING = "eu.faircode.netguard.HOUSE_HOLDING";
2016-01-01 09:06:02 +00:00
private static final String ACTION_SCREEN_OFF_DELAYED = "eu.faircode.netguard.SCREEN_OFF_DELAYED";
2016-07-31 14:01:24 +00:00
private static final String ACTION_WATCHDOG = "eu.faircode.netguard.WATCHDOG";
2016-01-01 09:06:02 +00:00
private native void jni_init();
2016-01-14 14:02:32 +00:00
2017-02-10 20:12:04 +00:00
private native void jni_start(int tun, boolean fwd53, int rcode, int loglevel);
2016-01-09 11:10:11 +00:00
2016-06-24 13:21:04 +00:00
private native void jni_stop(int tun, boolean clr);
2016-01-09 15:56:23 +00:00
2016-03-04 13:55:47 +00:00
private native int jni_get_mtu();
private native int[] jni_get_stats();
2016-02-08 17:43:29 +00:00
private static native void jni_pcap(String name, int record_size, int file_size);
2016-07-28 21:27:13 +00:00
private native void jni_socks5(String addr, int port, String username, String password);
2016-07-28 15:46:19 +00:00
private native void jni_done();
public static void setPcap(boolean enabled, Context context) {
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(context);
2017-03-20 12:08:36 +00:00
int record_size = 64;
try {
String r = prefs.getString("pcap_record_size", null);
if (TextUtils.isEmpty(r))
r = "64";
record_size = Integer.parseInt(r);
} catch (Throwable ex) {
Log.e(TAG, ex.toString() + "\n" + Log.getStackTraceString(ex));
}
int file_size = 2 * 1024 * 1024;
try {
String f = prefs.getString("pcap_file_size", null);
if (TextUtils.isEmpty(f))
f = "2";
file_size = Integer.parseInt(f) * 1024 * 1024;
} catch (Throwable ex) {
Log.e(TAG, ex.toString() + "\n" + Log.getStackTraceString(ex));
}
File pcap = (enabled ? new File(context.getDir("data", MODE_PRIVATE), "netguard.pcap") : null);
jni_pcap(pcap == null ? null : pcap.getAbsolutePath(), record_size, file_size);
}
synchronized private static PowerManager.WakeLock getLock(Context context) {
if (wlInstance == null) {
PowerManager pm = (PowerManager) context.getSystemService(Context.POWER_SERVICE);
2015-11-14 11:17:57 +00:00
wlInstance = pm.newWakeLock(PowerManager.PARTIAL_WAKE_LOCK, context.getString(R.string.app_name) + " wakelock");
wlInstance.setReferenceCounted(true);
}
return wlInstance;
}
private final class CommandHandler extends Handler {
public int queue = 0;
public CommandHandler(Looper looper) {
super(looper);
}
private void reportQueueSize() {
Intent ruleset = new Intent(ActivityMain.ACTION_QUEUE_CHANGED);
ruleset.putExtra(ActivityMain.EXTRA_SIZE, queue);
2016-03-11 06:47:52 +00:00
LocalBroadcastManager.getInstance(ServiceSinkhole.this).sendBroadcast(ruleset);
}
public void queue(Intent intent) {
synchronized (this) {
queue++;
reportQueueSize();
}
Message msg = commandHandler.obtainMessage();
msg.obj = intent;
msg.what = MSG_SERVICE_INTENT;
commandHandler.sendMessage(msg);
}
@Override
public void handleMessage(Message msg) {
try {
switch (msg.what) {
case MSG_SERVICE_INTENT:
handleIntent((Intent) msg.obj);
break;
default:
Log.e(TAG, "Unknown command message=" + msg.what);
}
2015-11-23 07:34:47 +00:00
} catch (Throwable ex) {
Log.e(TAG, ex.toString() + "\n" + Log.getStackTraceString(ex));
} finally {
synchronized (this) {
queue--;
reportQueueSize();
}
try {
2016-03-11 06:47:52 +00:00
PowerManager.WakeLock wl = getLock(ServiceSinkhole.this);
if (wl.isHeld())
wl.release();
else
Log.w(TAG, "Wakelock under-locked");
Log.i(TAG, "Messages=" + hasMessages(0) + " wakelock=" + wlInstance.isHeld());
} catch (Throwable ex) {
Log.e(TAG, ex.toString() + "\n" + Log.getStackTraceString(ex));
}
}
}
private void handleIntent(Intent intent) {
2016-03-11 06:47:52 +00:00
final SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(ServiceSinkhole.this);
2015-11-24 09:42:45 +00:00
Command cmd = (Command) intent.getSerializableExtra(EXTRA_COMMAND);
String reason = intent.getStringExtra(EXTRA_REASON);
Log.i(TAG, "Executing intent=" + intent + " command=" + cmd + " reason=" + reason +
2016-01-22 15:13:33 +00:00
" vpn=" + (vpn != null) + " user=" + (Process.myUid() / 100000));
2016-01-11 10:38:48 +00:00
// Check if foreground
if (cmd != Command.stop)
if (!user_foreground) {
Log.i(TAG, "Command " + cmd + "ignored for background user");
2016-01-28 22:07:51 +00:00
return;
2016-01-11 10:38:48 +00:00
}
if (prefs.getBoolean("screen_on", true)) {
Log.i(TAG, "Started listening for interactive state changes");
if (prefs.getBoolean("screen_on", true)) {
last_interactive = Util.isInteractive(ServiceSinkhole.this);
IntentFilter ifInteractive = new IntentFilter();
ifInteractive.addAction(Intent.ACTION_SCREEN_ON);
ifInteractive.addAction(Intent.ACTION_SCREEN_OFF);
ifInteractive.addAction(ACTION_SCREEN_OFF_DELAYED);
registerReceiver(interactiveStateReceiver, ifInteractive);
registeredInteractiveState = true;
}
} else {
Log.i(TAG, "Stopped listening for interactive state changes");
if (registeredInteractiveState) {
unregisterReceiver(interactiveStateReceiver);
registeredInteractiveState = false;
}
}
2015-12-07 09:46:35 +00:00
// Listen for phone state changes
2015-12-01 16:42:38 +00:00
TelephonyManager tm = (TelephonyManager) getSystemService(Context.TELEPHONY_SERVICE);
if (tm != null && !phone_state &&
2016-03-11 06:47:52 +00:00
Util.hasPhoneStatePermission(ServiceSinkhole.this)) {
tm.listen(phoneStateListener, PhoneStateListener.LISTEN_DATA_CONNECTION_STATE | PhoneStateListener.LISTEN_SERVICE_STATE);
2015-12-01 16:42:38 +00:00
phone_state = true;
Log.i(TAG, "Listening to service state changes");
}
2015-12-07 09:46:35 +00:00
// Listen for data SIM changes
2015-12-07 11:23:43 +00:00
if (subscriptionsChangedListener == null &&
2015-12-07 09:46:35 +00:00
Build.VERSION.SDK_INT >= Build.VERSION_CODES.LOLLIPOP_MR1 &&
2016-03-11 06:47:52 +00:00
Util.hasPhoneStatePermission(ServiceSinkhole.this)) {
SubscriptionManager sm = SubscriptionManager.from(ServiceSinkhole.this);
2015-12-15 07:38:07 +00:00
subscriptionsChangedListener = new SubscriptionManager.OnSubscriptionsChangedListener() {
2015-12-07 11:23:43 +00:00
@Override
public void onSubscriptionsChanged() {
Log.i(TAG, "Subscriptions changed");
if (prefs.getBoolean("national_roaming", false))
2016-03-11 06:47:52 +00:00
ServiceSinkhole.reload("Subscriptions changed", ServiceSinkhole.this);
2015-12-07 11:23:43 +00:00
}
};
sm.addOnSubscriptionsChangedListener((SubscriptionManager.OnSubscriptionsChangedListener) subscriptionsChangedListener);
2015-12-07 09:46:35 +00:00
Log.i(TAG, "Listening to subscription changes");
}
2016-07-31 14:01:24 +00:00
// Watchdog
if (cmd == Command.start || cmd == Command.reload) {
Intent watchdogIntent = new Intent(ServiceSinkhole.this, ServiceSinkhole.class);
watchdogIntent.setAction(ACTION_WATCHDOG);
PendingIntent pi = PendingIntent.getService(ServiceSinkhole.this, 1, watchdogIntent, PendingIntent.FLAG_UPDATE_CURRENT);
AlarmManager am = (AlarmManager) getSystemService(Context.ALARM_SERVICE);
am.cancel(pi);
int watchdog = Integer.parseInt(prefs.getString("watchdog", "0"));
2016-07-31 14:01:24 +00:00
if (watchdog > 0) {
Log.i(TAG, "Watchdog " + watchdog + " minutes");
am.setInexactRepeating(AlarmManager.RTC, SystemClock.elapsedRealtime() + watchdog * 60 * 1000, watchdog * 60 * 1000, pi);
}
}
try {
switch (cmd) {
case run:
2016-01-20 10:04:32 +00:00
run();
break;
case start:
2016-01-20 10:04:32 +00:00
start();
break;
case reload:
2017-07-12 07:21:21 +00:00
reload(intent.getBooleanExtra(EXTRA_CONDITIONAL, false));
break;
case stop:
2016-01-20 10:04:32 +00:00
stop();
break;
2015-12-11 09:36:35 +00:00
case stats:
statsHandler.sendEmptyMessage(MSG_STATS_STOP);
statsHandler.sendEmptyMessage(MSG_STATS_START);
2015-12-11 09:36:35 +00:00
break;
case householding:
householding(intent);
break;
2016-07-31 14:01:24 +00:00
case watchdog:
watchdog(intent);
break;
default:
Log.e(TAG, "Unknown command=" + cmd);
}
2015-11-26 07:34:33 +00:00
2016-07-31 14:01:24 +00:00
if (cmd != Command.watchdog) {
// Update main view
Intent ruleset = new Intent(ActivityMain.ACTION_RULES_CHANGED);
ruleset.putExtra(ActivityMain.EXTRA_CONNECTED, cmd == Command.stop ? false : last_connected);
ruleset.putExtra(ActivityMain.EXTRA_METERED, cmd == Command.stop ? false : last_metered);
LocalBroadcastManager.getInstance(ServiceSinkhole.this).sendBroadcast(ruleset);
2015-11-26 07:34:33 +00:00
2016-07-31 14:01:24 +00:00
// Update widgets
2017-03-23 07:29:32 +00:00
WidgetMain.updateWidgets(ServiceSinkhole.this);
2016-07-31 14:01:24 +00:00
}
2015-11-27 12:48:48 +00:00
} catch (Throwable ex) {
Log.e(TAG, ex.toString() + "\n" + Log.getStackTraceString(ex));
if (cmd == Command.start || cmd == Command.reload) {
if (VpnService.prepare(ServiceSinkhole.this) == null) {
Log.w(TAG, "VPN not prepared connected=" + last_connected);
if (last_connected) {
showAutoStartNotification();
2016-07-14 04:16:47 +00:00
if (!Util.isPlayStoreInstall(ServiceSinkhole.this))
showErrorNotification(ex.toString());
}
// Retried on connectivity change
} else {
showErrorNotification(ex.toString());
// Disable firewall
prefs.edit().putBoolean("enabled", false).apply();
2017-03-23 07:29:32 +00:00
WidgetMain.updateWidgets(ServiceSinkhole.this);
}
} else
2016-07-03 13:51:04 +00:00
showErrorNotification(ex.toString());
}
}
2016-01-20 10:04:32 +00:00
private void run() {
if (state == State.none) {
startForeground(NOTIFY_WAITING, getWaitingNotification());
state = State.waiting;
Log.d(TAG, "Start foreground state=" + state.toString());
}
}
2016-01-20 10:04:32 +00:00
private void start() {
if (vpn == null) {
if (state != State.none) {
Log.d(TAG, "Stop foreground state=" + state.toString());
stopForeground(true);
}
2016-02-01 18:43:17 +00:00
startForeground(NOTIFY_ENFORCING, getEnforcingNotification(0, 0, 0));
2016-01-20 10:04:32 +00:00
state = State.enforcing;
Log.d(TAG, "Start foreground state=" + state.toString());
2016-03-11 06:47:52 +00:00
List<Rule> listRule = Rule.getRules(true, ServiceSinkhole.this);
2016-01-20 10:04:32 +00:00
List<Rule> listAllowed = getAllowedRules(listRule);
last_builder = getBuilder(listAllowed, listRule);
vpn = startVPN(last_builder);
2016-01-20 10:04:32 +00:00
if (vpn == null)
2016-10-06 20:13:55 +00:00
throw new IllegalStateException(getString((R.string.msg_start_failed)));
2016-01-20 10:04:32 +00:00
startNative(vpn, listAllowed, listRule);
2016-01-20 10:04:32 +00:00
2016-01-23 18:00:35 +00:00
removeWarningNotifications();
2016-01-20 10:04:32 +00:00
updateEnforcingNotification(listAllowed.size(), listRule.size());
}
}
2017-07-12 07:21:21 +00:00
private void reload(boolean conditional) {
// Check if rules needs to be reloaded
if (conditional) {
boolean process = false;
List<Rule> listRule = Rule.getRules(true, ServiceSinkhole.this);
for (Rule rule : listRule) {
boolean blocked = (last_metered ? rule.other_blocked : rule.wifi_blocked);
boolean screen = (last_metered ? rule.screen_other : rule.screen_wifi);
if (blocked && screen) {
process = true;
break;
}
}
if (!process) {
Log.i(TAG, "No changed rules on interactive state change");
return;
}
}
2016-03-11 06:47:52 +00:00
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(ServiceSinkhole.this);
2017-05-31 05:55:03 +00:00
boolean clear = prefs.getBoolean("clear_onreload", false);
2016-01-20 10:04:32 +00:00
if (state != State.enforcing) {
if (state != State.none) {
Log.d(TAG, "Stop foreground state=" + state.toString());
stopForeground(true);
}
2016-02-01 18:43:17 +00:00
startForeground(NOTIFY_ENFORCING, getEnforcingNotification(0, 0, 0));
2016-01-20 10:04:32 +00:00
state = State.enforcing;
Log.d(TAG, "Start foreground state=" + state.toString());
}
2016-03-11 06:47:52 +00:00
List<Rule> listRule = Rule.getRules(true, ServiceSinkhole.this);
2016-01-20 10:04:32 +00:00
List<Rule> listAllowed = getAllowedRules(listRule);
2016-03-11 06:47:52 +00:00
ServiceSinkhole.Builder builder = getBuilder(listAllowed, listRule);
2016-01-20 10:04:32 +00:00
if (Build.VERSION.SDK_INT < Build.VERSION_CODES.LOLLIPOP_MR1) {
2016-02-29 12:51:46 +00:00
last_builder = builder;
Log.i(TAG, "Legacy restart");
if (vpn != null) {
stopNative(vpn, clear);
stopVPN(vpn);
vpn = null;
try {
2016-03-11 18:27:59 +00:00
Thread.sleep(500);
} catch (InterruptedException ignored) {
}
}
vpn = startVPN(last_builder);
2016-02-11 14:01:23 +00:00
} else {
2016-03-20 19:11:09 +00:00
if (vpn != null && prefs.getBoolean("filter", false) && builder.equals(last_builder)) {
Log.i(TAG, "Native restart");
stopNative(vpn, clear);
} else {
last_builder = builder;
Log.i(TAG, "VPN restart");
// Attempt seamless handover
ParcelFileDescriptor prev = vpn;
vpn = startVPN(builder);
if (prev != null && vpn == null) {
Log.w(TAG, "Handover failed");
stopNative(prev, clear);
stopVPN(prev);
prev = null;
try {
Thread.sleep(3000);
} catch (InterruptedException ignored) {
}
vpn = startVPN(last_builder);
if (vpn == null)
throw new IllegalStateException("Handover failed");
}
if (prev != null) {
stopNative(prev, clear);
stopVPN(prev);
}
}
}
if (vpn == null)
2016-10-06 20:13:55 +00:00
throw new IllegalStateException(getString((R.string.msg_start_failed)));
startNative(vpn, listAllowed, listRule);
2016-01-20 10:04:32 +00:00
2016-02-11 14:03:39 +00:00
removeWarningNotifications();
2016-01-20 10:04:32 +00:00
updateEnforcingNotification(listAllowed.size(), listRule.size());
}
private void stop() {
if (vpn != null) {
2016-06-24 13:21:04 +00:00
stopNative(vpn, true);
2016-01-20 10:04:32 +00:00
stopVPN(vpn);
vpn = null;
unprepare();
2016-01-20 10:04:32 +00:00
}
if (state == State.enforcing) {
Log.d(TAG, "Stop foreground state=" + state.toString());
stopForeground(true);
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(ServiceSinkhole.this);
if (prefs.getBoolean("show_stats", false)) {
startForeground(NOTIFY_WAITING, getWaitingNotification());
state = State.waiting;
Log.d(TAG, "Start foreground state=" + state.toString());
} else
state = State.none;
2016-01-20 10:04:32 +00:00
}
}
private void householding(Intent intent) {
// Keep log records for three days
2016-03-11 06:47:52 +00:00
DatabaseHelper.getInstance(ServiceSinkhole.this).cleanupLog(new Date().getTime() - 3 * 24 * 3600 * 1000L);
// Clear expired DNS records
DatabaseHelper.getInstance(ServiceSinkhole.this).cleanupDns();
// Check for update
2016-03-11 06:47:52 +00:00
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(ServiceSinkhole.this);
if (!Util.isPlayStoreInstall(ServiceSinkhole.this) && prefs.getBoolean("update_check", true))
checkUpdate();
}
2016-07-31 14:01:24 +00:00
private void watchdog(Intent intent) {
if (vpn == null) {
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(ServiceSinkhole.this);
if (prefs.getBoolean("enabled", false)) {
Log.e(TAG, "Service was killed");
start();
}
}
}
private void checkUpdate() {
StringBuilder json = new StringBuilder();
HttpsURLConnection urlConnection = null;
try {
URL url = new URL("https://api.github.com/repos/M66B/NetGuard/releases/latest");
urlConnection = (HttpsURLConnection) url.openConnection();
BufferedReader br = new BufferedReader(new InputStreamReader(urlConnection.getInputStream()));
String line;
while ((line = br.readLine()) != null)
json.append(line);
} catch (Throwable ex) {
Log.e(TAG, ex.toString() + "\n" + Log.getStackTraceString(ex));
} finally {
if (urlConnection != null)
urlConnection.disconnect();
}
try {
JSONObject jroot = new JSONObject(json.toString());
if (jroot.has("tag_name") && jroot.has("assets")) {
JSONArray jassets = jroot.getJSONArray("assets");
if (jassets.length() > 0) {
JSONObject jasset = jassets.getJSONObject(0);
if (jasset.has("name") && jasset.has("browser_download_url")) {
String version = jroot.getString("tag_name");
String name = jasset.getString("name");
String url = jasset.getString("browser_download_url");
Log.i(TAG, "Tag " + version + " name " + name + " url " + url);
2016-03-11 06:47:52 +00:00
Version current = new Version(Util.getSelfVersionName(ServiceSinkhole.this));
Version available = new Version(version);
if (current.compareTo(available) < 0) {
Log.i(TAG, "Update available from " + current + " to " + available);
showUpdateNotification(name, url);
} else
Log.i(TAG, "Up-to-date current version " + current);
}
}
}
} catch (JSONException ex) {
Log.e(TAG, ex.toString() + "\n" + Log.getStackTraceString(ex));
}
}
}
private final class LogHandler extends Handler {
public LogHandler(Looper looper) {
super(looper);
}
@Override
public void handleMessage(Message msg) {
try {
if (powersaving && (msg.what == MSG_PACKET || msg.what == MSG_USAGE))
return;
switch (msg.what) {
case MSG_PACKET:
log((Packet) msg.obj, msg.arg1, msg.arg2 > 0);
break;
2016-02-15 16:48:53 +00:00
case MSG_USAGE:
usage((Usage) msg.obj);
break;
default:
Log.e(TAG, "Unknown log message=" + msg.what);
}
} catch (Throwable ex) {
Log.e(TAG, ex.toString() + "\n" + Log.getStackTraceString(ex));
}
}
private void log(Packet packet, int connection, boolean interactive) {
// Get settings
2016-03-11 06:47:52 +00:00
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(ServiceSinkhole.this);
boolean log = prefs.getBoolean("log", false);
boolean log_app = prefs.getBoolean("log_app", false);
2016-03-11 06:47:52 +00:00
DatabaseHelper dh = DatabaseHelper.getInstance(ServiceSinkhole.this);
// Get real name
2017-02-25 07:52:31 +00:00
String dname = dh.getQName(packet.uid, packet.daddr);
// Traffic log
if (log)
dh.insertLog(packet, dname, connection, interactive);
// Application log
2016-03-05 20:49:18 +00:00
if (log_app && packet.uid >= 0 && !(packet.uid == 0 && packet.protocol == 17 && packet.dport == 53)) {
if (!(packet.protocol == 6 /* TCP */ || packet.protocol == 17 /* UDP */))
packet.dport = 0;
2016-12-21 13:35:34 +00:00
if (dh.updateAccess(packet, dname, -1)) {
lock.readLock().lock();
if (mapNoNotify.containsKey(packet.uid) && mapNoNotify.get(packet.uid))
showAccessNotification(packet.uid);
2016-12-21 13:35:34 +00:00
lock.readLock().unlock();
}
}
}
2016-02-15 16:48:53 +00:00
private void usage(Usage usage) {
2016-03-05 20:49:18 +00:00
if (usage.Uid >= 0 && !(usage.Uid == 0 && usage.Protocol == 17 && usage.DPort == 53)) {
2016-03-11 06:47:52 +00:00
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(ServiceSinkhole.this);
2016-03-05 20:49:18 +00:00
boolean filter = prefs.getBoolean("filter", false);
boolean log_app = prefs.getBoolean("log_app", false);
boolean track_usage = prefs.getBoolean("track_usage", false);
if (filter && log_app && track_usage) {
2016-03-11 06:47:52 +00:00
DatabaseHelper dh = DatabaseHelper.getInstance(ServiceSinkhole.this);
2017-02-25 07:52:31 +00:00
String dname = dh.getQName(usage.Uid, usage.DAddr);
2016-02-15 16:48:53 +00:00
Log.i(TAG, "Usage account " + usage + " dname=" + dname);
dh.updateUsage(usage, dname);
}
}
}
}
private final class StatsHandler extends Handler {
private boolean stats = false;
private long when;
private long t = -1;
private long tx = -1;
private long rx = -1;
private List<Long> gt = new ArrayList<>();
private List<Float> gtx = new ArrayList<>();
private List<Float> grx = new ArrayList<>();
private HashMap<Integer, Long> mapUidBytes = new HashMap<>();
public StatsHandler(Looper looper) {
super(looper);
}
@Override
public void handleMessage(Message msg) {
try {
switch (msg.what) {
case MSG_STATS_START:
startStats();
break;
case MSG_STATS_STOP:
stopStats();
break;
case MSG_STATS_UPDATE:
updateStats();
break;
default:
Log.e(TAG, "Unknown stats message=" + msg.what);
}
} catch (Throwable ex) {
Log.e(TAG, ex.toString() + "\n" + Log.getStackTraceString(ex));
}
}
private void startStats() {
2016-03-11 06:47:52 +00:00
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(ServiceSinkhole.this);
boolean enabled = (!stats && prefs.getBoolean("show_stats", false));
Log.i(TAG, "Stats start enabled=" + enabled);
if (enabled) {
when = new Date().getTime();
t = -1;
tx = -1;
rx = -1;
gt.clear();
gtx.clear();
grx.clear();
mapUidBytes.clear();
stats = true;
updateStats();
}
}
private void stopStats() {
Log.i(TAG, "Stats stop");
stats = false;
this.removeMessages(MSG_STATS_UPDATE);
if (state == State.stats) {
Log.d(TAG, "Stop foreground state=" + state.toString());
stopForeground(true);
state = State.none;
} else
NotificationManagerCompat.from(ServiceSinkhole.this).cancel(NOTIFY_TRAFFIC);
}
private void updateStats() {
RemoteViews remoteViews = new RemoteViews(getPackageName(), R.layout.traffic);
2016-03-11 06:47:52 +00:00
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(ServiceSinkhole.this);
2015-12-15 07:38:07 +00:00
long frequency = Long.parseLong(prefs.getString("stats_frequency", "1000"));
long samples = Long.parseLong(prefs.getString("stats_samples", "90"));
2016-02-08 17:43:29 +00:00
boolean filter = prefs.getBoolean("filter", false);
boolean show_top = prefs.getBoolean("show_top", false);
int loglevel = Integer.parseInt(prefs.getString("loglevel", Integer.toString(Log.WARN)));
// Schedule next update
this.sendEmptyMessageDelayed(MSG_STATS_UPDATE, frequency);
long ct = SystemClock.elapsedRealtime();
// Cleanup
while (gt.size() > 0 && ct - gt.get(0) > samples * 1000) {
gt.remove(0);
gtx.remove(0);
grx.remove(0);
}
// Calculate network speed
float txsec = 0;
float rxsec = 0;
long ttx = TrafficStats.getTotalTxBytes();
long trx = TrafficStats.getTotalRxBytes();
2016-02-08 17:43:29 +00:00
if (filter) {
ttx -= TrafficStats.getUidTxBytes(Process.myUid());
trx -= TrafficStats.getUidRxBytes(Process.myUid());
2016-02-28 11:02:08 +00:00
if (ttx < 0)
ttx = 0;
if (trx < 0)
trx = 0;
}
2015-12-09 16:57:10 +00:00
if (t > 0 && tx > 0 && rx > 0) {
float dt = (ct - t) / 1000f;
txsec = (ttx - tx) / dt;
rxsec = (trx - rx) / dt;
gt.add(ct);
gtx.add(txsec);
grx.add(rxsec);
}
// Calculate application speeds
2016-02-08 17:43:29 +00:00
if (show_top) {
if (mapUidBytes.size() == 0) {
for (ApplicationInfo ainfo : getPackageManager().getInstalledApplications(0))
2016-01-22 15:13:33 +00:00
if (ainfo.uid != Process.myUid())
mapUidBytes.put(ainfo.uid, TrafficStats.getUidTxBytes(ainfo.uid) + TrafficStats.getUidRxBytes(ainfo.uid));
2016-01-21 16:46:31 +00:00
} else if (t > 0) {
TreeMap<Float, Integer> mapSpeedUid = new TreeMap<>(new Comparator<Float>() {
2015-12-13 13:49:08 +00:00
@Override
public int compare(Float value, Float other) {
return -value.compareTo(other);
}
});
float dt = (ct - t) / 1000f;
for (int uid : mapUidBytes.keySet()) {
long bytes = TrafficStats.getUidTxBytes(uid) + TrafficStats.getUidRxBytes(uid);
float speed = (bytes - mapUidBytes.get(uid)) / dt;
if (speed > 0) {
mapSpeedUid.put(speed, uid);
mapUidBytes.put(uid, bytes);
}
}
StringBuilder sb = new StringBuilder();
int i = 0;
for (float speed : mapSpeedUid.keySet()) {
if (i++ >= 3)
break;
if (speed < 1000 * 1000)
sb.append(getString(R.string.msg_kbsec, speed / 1000));
else
sb.append(getString(R.string.msg_mbsec, speed / 1000 / 1000));
sb.append(' ');
2016-03-11 06:47:52 +00:00
List<String> apps = Util.getApplicationNames(mapSpeedUid.get(speed), ServiceSinkhole.this);
sb.append(apps.size() > 0 ? apps.get(0) : "?");
sb.append("\r\n");
}
if (sb.length() > 0)
sb.setLength(sb.length() - 2);
remoteViews.setTextViewText(R.id.tvTop, sb.toString());
}
}
t = ct;
tx = ttx;
rx = trx;
// Create bitmap
2016-03-11 06:47:52 +00:00
int height = Util.dips2pixels(96, ServiceSinkhole.this);
int width = Util.dips2pixels(96 * 5, ServiceSinkhole.this);
Bitmap bitmap = Bitmap.createBitmap(width, height, Bitmap.Config.ARGB_8888);
// Create canvas
Canvas canvas = new Canvas(bitmap);
canvas.drawColor(Color.TRANSPARENT);
// Determine max
float max = 0;
long xmax = 0;
float ymax = 0;
for (int i = 0; i < gt.size(); i++) {
long t = gt.get(i);
float tx = gtx.get(i);
float rx = grx.get(i);
if (t > xmax)
xmax = t;
if (tx > max)
max = tx;
if (rx > max)
max = rx;
if (tx > ymax)
ymax = tx;
if (rx > ymax)
ymax = rx;
}
// Build paths
Path ptx = new Path();
Path prx = new Path();
for (int i = 0; i < gtx.size(); i++) {
float x = width - width * (xmax - gt.get(i)) / 1000f / samples;
float ytx = height - height * gtx.get(i) / ymax;
float yrx = height - height * grx.get(i) / ymax;
if (i == 0) {
ptx.moveTo(x, ytx);
prx.moveTo(x, yrx);
} else {
ptx.lineTo(x, ytx);
prx.lineTo(x, yrx);
}
}
// Build paint
Paint paint = new Paint(Paint.ANTI_ALIAS_FLAG);
paint.setStyle(Paint.Style.STROKE);
2016-03-03 11:17:42 +00:00
// Draw scale line
2016-03-11 06:47:52 +00:00
paint.setStrokeWidth(Util.dips2pixels(1, ServiceSinkhole.this));
paint.setColor(ContextCompat.getColor(ServiceSinkhole.this, R.color.colorGrayed));
float y = height / 2;
canvas.drawLine(0, y, width, y, paint);
2015-12-11 17:59:08 +00:00
// Draw paths
2016-03-11 06:47:52 +00:00
paint.setStrokeWidth(Util.dips2pixels(2, ServiceSinkhole.this));
paint.setColor(ContextCompat.getColor(ServiceSinkhole.this, R.color.colorSend));
2015-12-11 17:59:08 +00:00
canvas.drawPath(ptx, paint);
2016-03-11 06:47:52 +00:00
paint.setColor(ContextCompat.getColor(ServiceSinkhole.this, R.color.colorReceive));
2015-12-11 17:59:08 +00:00
canvas.drawPath(prx, paint);
// Update remote view
remoteViews.setImageViewBitmap(R.id.ivTraffic, bitmap);
2015-12-09 19:05:25 +00:00
if (txsec < 1000 * 1000)
remoteViews.setTextViewText(R.id.tvTx, getString(R.string.msg_kbsec, txsec / 1000));
2015-12-09 16:57:10 +00:00
else
2015-12-09 19:05:25 +00:00
remoteViews.setTextViewText(R.id.tvTx, getString(R.string.msg_mbsec, txsec / 1000 / 1000));
if (rxsec < 1000 * 1000)
remoteViews.setTextViewText(R.id.tvRx, getString(R.string.msg_kbsec, rxsec / 1000));
else
remoteViews.setTextViewText(R.id.tvRx, getString(R.string.msg_mbsec, rxsec / 1000 / 1000));
if (max < 1000 * 1000)
2016-03-03 11:17:42 +00:00
remoteViews.setTextViewText(R.id.tvMax, getString(R.string.msg_kbsec, max / 2 / 1000));
else
2016-03-03 11:17:42 +00:00
remoteViews.setTextViewText(R.id.tvMax, getString(R.string.msg_mbsec, max / 2 / 1000 / 1000));
// Show session/file count
2016-02-08 17:43:29 +00:00
if (filter && loglevel <= Log.WARN) {
int[] count = jni_get_stats();
2016-02-09 14:29:28 +00:00
remoteViews.setTextViewText(R.id.tvSessions, count[0] + "/" + count[1] + "/" + count[2]);
remoteViews.setTextViewText(R.id.tvFiles, count[3] + "/" + count[4]);
2016-02-27 09:47:10 +00:00
} else {
remoteViews.setTextViewText(R.id.tvSessions, "");
remoteViews.setTextViewText(R.id.tvFiles, "");
}
2016-02-08 17:43:29 +00:00
// Show notification
2016-03-11 06:47:52 +00:00
Intent main = new Intent(ServiceSinkhole.this, ActivityMain.class);
PendingIntent pi = PendingIntent.getActivity(ServiceSinkhole.this, 0, main, PendingIntent.FLAG_UPDATE_CURRENT);
2016-01-02 12:22:18 +00:00
TypedValue tv = new TypedValue();
getTheme().resolveAttribute(R.attr.colorPrimary, tv, true);
2016-03-11 06:47:52 +00:00
NotificationCompat.Builder builder = new NotificationCompat.Builder(ServiceSinkhole.this)
.setWhen(when)
.setSmallIcon(R.drawable.ic_equalizer_white_24dp)
.setContent(remoteViews)
.setContentIntent(pi)
2016-01-02 12:22:18 +00:00
.setColor(tv.data)
.setOngoing(true)
.setAutoCancel(false);
2016-01-31 13:07:07 +00:00
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.LOLLIPOP) {
builder.setCategory(Notification.CATEGORY_STATUS)
.setVisibility(Notification.VISIBILITY_PUBLIC);
}
if (state == State.none || state == State.waiting) {
if (state != State.none) {
Log.d(TAG, "Stop foreground state=" + state.toString());
stopForeground(true);
}
startForeground(NOTIFY_TRAFFIC, builder.build());
state = State.stats;
Log.d(TAG, "Start foreground state=" + state.toString());
} else
NotificationManagerCompat.from(ServiceSinkhole.this).notify(NOTIFY_TRAFFIC, builder.build());
}
2015-10-24 18:01:55 +00:00
}
2016-02-21 13:00:17 +00:00
public static List<InetAddress> getDns(Context context) {
List<InetAddress> listDns = new ArrayList<>();
2017-02-26 15:53:01 +00:00
List<String> sysDns = Util.getDefaultDNS(context);
2016-02-21 13:00:17 +00:00
// Get custom DNS servers
2016-01-30 09:59:19 +00:00
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(context);
2017-03-03 11:05:02 +00:00
boolean ip6 = prefs.getBoolean("ip6", true);
2016-10-12 12:59:39 +00:00
String vpnDns1 = prefs.getString("dns", null);
String vpnDns2 = prefs.getString("dns2", null);
Log.i(TAG, "DNS system=" + TextUtils.join(",", sysDns) + " VPN1=" + vpnDns1 + " VPN2=" + vpnDns2);
2016-02-21 13:00:17 +00:00
2016-10-12 12:59:39 +00:00
if (vpnDns1 != null)
try {
2016-10-12 12:59:39 +00:00
InetAddress dns = InetAddress.getByName(vpnDns1);
2017-03-03 11:05:02 +00:00
if (!(dns.isLoopbackAddress() || dns.isAnyLocalAddress()) &&
(ip6 || dns instanceof Inet4Address))
2016-02-21 13:00:17 +00:00
listDns.add(dns);
} catch (Throwable ignored) {
}
2016-02-21 13:00:17 +00:00
2016-10-12 12:59:39 +00:00
if (vpnDns2 != null)
try {
2016-10-12 12:59:39 +00:00
InetAddress dns = InetAddress.getByName(vpnDns2);
2017-03-03 11:05:02 +00:00
if (!(dns.isLoopbackAddress() || dns.isAnyLocalAddress()) &&
(ip6 || dns instanceof Inet4Address))
2016-10-12 12:59:39 +00:00
listDns.add(dns);
} catch (Throwable ex) {
Log.e(TAG, ex.toString() + "\n" + Log.getStackTraceString(ex));
}
2016-02-21 13:00:17 +00:00
// Use system DNS servers only when no two custom DNS servers specified
2016-10-12 12:59:39 +00:00
if (listDns.size() <= 1)
for (String def_dns : sysDns)
try {
InetAddress ddns = InetAddress.getByName(def_dns);
if (!listDns.contains(ddns) &&
2017-03-03 11:05:02 +00:00
!(ddns.isLoopbackAddress() || ddns.isAnyLocalAddress()) &&
(ip6 || ddns instanceof Inet4Address))
2016-10-12 12:59:39 +00:00
listDns.add(ddns);
} catch (Throwable ex) {
Log.e(TAG, ex.toString() + "\n" + Log.getStackTraceString(ex));
2016-10-12 12:59:39 +00:00
}
// Remove local DNS servers when not routing LAN
boolean lan = prefs.getBoolean("lan", false);
boolean use_hosts = prefs.getBoolean("filter", false) && prefs.getBoolean("use_hosts", false);
if (lan && use_hosts) {
List<InetAddress> listLocal = new ArrayList<>();
try {
Enumeration<NetworkInterface> nis = NetworkInterface.getNetworkInterfaces();
if (nis != null)
while (nis.hasMoreElements()) {
NetworkInterface ni = nis.nextElement();
if (ni != null && ni.isUp() && !ni.isLoopback()) {
List<InterfaceAddress> ias = ni.getInterfaceAddresses();
if (ias != null)
for (InterfaceAddress ia : ias) {
InetAddress hostAddress = ia.getAddress();
BigInteger host = new BigInteger(1, hostAddress.getAddress());
int prefix = ia.getNetworkPrefixLength();
BigInteger mask = BigInteger.valueOf(-1).shiftLeft(hostAddress.getAddress().length * 8 - prefix);
for (InetAddress dns : listDns)
if (hostAddress.getAddress().length == dns.getAddress().length) {
BigInteger ip = new BigInteger(1, dns.getAddress());
if (host.and(mask).equals(ip.and(mask))) {
Log.i(TAG, "Local DNS server host=" + hostAddress + "/" + prefix + " dns=" + dns);
listLocal.add(dns);
}
}
}
}
}
} catch (Throwable ex) {
Log.e(TAG, ex.toString() + "\n" + Log.getStackTraceString(ex));
}
List<InetAddress> listDns4 = new ArrayList<>();
List<InetAddress> listDns6 = new ArrayList<>();
try {
listDns4.add(InetAddress.getByName("8.8.8.8"));
listDns4.add(InetAddress.getByName("8.8.4.4"));
2017-03-03 11:05:02 +00:00
if (ip6) {
listDns6.add(InetAddress.getByName("2001:4860:4860::8888"));
listDns6.add(InetAddress.getByName("2001:4860:4860::8844"));
}
} catch (Throwable ex) {
Log.e(TAG, ex.toString() + "\n" + Log.getStackTraceString(ex));
}
for (InetAddress dns : listLocal) {
listDns.remove(dns);
if (dns instanceof Inet4Address) {
if (listDns4.size() > 0) {
listDns.add(listDns4.get(0));
listDns4.remove(0);
}
} else {
if (listDns6.size() > 0) {
listDns.add(listDns6.get(0));
listDns6.remove(0);
}
}
}
}
2016-02-21 13:00:17 +00:00
return listDns;
}
2016-01-22 15:13:33 +00:00
@TargetApi(Build.VERSION_CODES.LOLLIPOP)
private ParcelFileDescriptor startVPN(Builder builder) throws SecurityException {
try {
return builder.establish();
} catch (SecurityException ex) {
throw ex;
} catch (Throwable ex) {
Log.e(TAG, ex.toString() + "\n" + Log.getStackTraceString(ex));
return null;
}
}
private Builder getBuilder(List<Rule> listAllowed, List<Rule> listRule) {
2016-01-19 19:58:51 +00:00
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(this);
2016-05-13 18:32:41 +00:00
boolean subnet = prefs.getBoolean("subnet", false);
boolean tethering = prefs.getBoolean("tethering", false);
2016-03-31 07:51:18 +00:00
boolean lan = prefs.getBoolean("lan", false);
2016-04-08 06:02:52 +00:00
boolean ip6 = prefs.getBoolean("ip6", true);
boolean filter = prefs.getBoolean("filter", false);
boolean system = prefs.getBoolean("manage_system", false);
2016-01-19 19:58:51 +00:00
// Build VPN service
Builder builder = new Builder();
2016-02-11 14:15:18 +00:00
builder.setSession(getString(R.string.app_name));
// VPN address
String vpn4 = prefs.getString("vpn4", "10.1.10.1");
2016-04-08 06:02:52 +00:00
Log.i(TAG, "vpn4=" + vpn4);
builder.addAddress(vpn4, 32);
2016-04-08 06:02:52 +00:00
if (ip6) {
String vpn6 = prefs.getString("vpn6", "fd00:1:fd00:1:fd00:1:fd00:1");
Log.i(TAG, "vpn6=" + vpn6);
builder.addAddress(vpn6, 128);
}
2016-01-23 15:58:25 +00:00
2016-03-16 06:16:45 +00:00
// DNS address
if (filter)
for (InetAddress dns : getDns(ServiceSinkhole.this)) {
if (ip6 || dns instanceof Inet4Address) {
Log.i(TAG, "dns=" + dns);
builder.addDnsServer(dns);
}
2016-02-21 13:00:17 +00:00
}
2016-01-19 19:58:51 +00:00
2016-05-13 18:32:41 +00:00
// Subnet routing
if (subnet) {
// Exclude IP ranges
List<IPUtil.CIDR> listExclude = new ArrayList<>();
listExclude.add(new IPUtil.CIDR("127.0.0.0", 8)); // localhost
2016-03-31 07:51:18 +00:00
2016-05-13 18:32:41 +00:00
if (tethering) {
// USB tethering 192.168.42.x
// Wi-Fi tethering 192.168.43.x
2016-05-13 18:32:41 +00:00
listExclude.add(new IPUtil.CIDR("192.168.42.0", 23));
// Wi-Fi direct 192.168.49.x
listExclude.add(new IPUtil.CIDR("192.168.49.0", 24));
2016-05-13 18:32:41 +00:00
}
2016-03-31 07:51:18 +00:00
2016-05-13 18:32:41 +00:00
if (lan) {
try {
Enumeration<NetworkInterface> nis = NetworkInterface.getNetworkInterfaces();
while (nis.hasMoreElements()) {
NetworkInterface ni = nis.nextElement();
if (ni != null && ni.isUp() && !ni.isLoopback() &&
ni.getName() != null && !ni.getName().startsWith("tun"))
for (InterfaceAddress ia : ni.getInterfaceAddresses())
if (ia.getAddress() instanceof Inet4Address) {
IPUtil.CIDR local = new IPUtil.CIDR(ia.getAddress(), ia.getNetworkPrefixLength());
Log.i(TAG, "Excluding " + ni.getName() + " " + local);
listExclude.add(local);
}
}
} catch (SocketException ex) {
Log.e(TAG, ex.toString() + "\n" + Log.getStackTraceString(ex));
2016-03-31 07:51:18 +00:00
}
}
// https://en.wikipedia.org/wiki/Mobile_country_code
2016-05-13 18:32:41 +00:00
Configuration config = getResources().getConfiguration();
// T-Mobile Wi-Fi calling
if (config.mcc == 310 && (config.mnc == 160 ||
config.mnc == 200 ||
config.mnc == 210 ||
config.mnc == 220 ||
config.mnc == 230 ||
config.mnc == 240 ||
config.mnc == 250 ||
config.mnc == 260 ||
config.mnc == 270 ||
config.mnc == 310 ||
config.mnc == 490 ||
config.mnc == 660 ||
config.mnc == 800)) {
2016-05-13 18:32:41 +00:00
listExclude.add(new IPUtil.CIDR("66.94.2.0", 24));
listExclude.add(new IPUtil.CIDR("66.94.6.0", 23));
listExclude.add(new IPUtil.CIDR("66.94.8.0", 22));
listExclude.add(new IPUtil.CIDR("208.54.0.0", 16));
}
// Verizon wireless calling
if ((config.mcc == 310 &&
(config.mnc == 4 ||
config.mnc == 5 ||
config.mnc == 6 ||
config.mnc == 10 ||
config.mnc == 12 ||
config.mnc == 13 ||
config.mnc == 350 ||
config.mnc == 590 ||
config.mnc == 820 ||
config.mnc == 890 ||
config.mnc == 910)) ||
(config.mcc == 311 && (config.mnc == 12 ||
config.mnc == 110 ||
(config.mnc >= 270 && config.mnc <= 289) ||
config.mnc == 390 ||
(config.mnc >= 480 && config.mnc <= 489) ||
config.mnc == 590)) ||
(config.mcc == 312 && (config.mnc == 770))) {
listExclude.add(new IPUtil.CIDR("66.174.0.0", 16)); // 66.174.0.0 - 66.174.255.255
listExclude.add(new IPUtil.CIDR("66.82.0.0", 15)); // 69.82.0.0 - 69.83.255.255
listExclude.add(new IPUtil.CIDR("69.96.0.0", 13)); // 69.96.0.0 - 69.103.255.255
listExclude.add(new IPUtil.CIDR("70.192.0.0", 11)); // 70.192.0.0 - 70.223.255.255
listExclude.add(new IPUtil.CIDR("97.128.0.0", 9)); // 97.128.0.0 - 97.255.255.255
listExclude.add(new IPUtil.CIDR("174.192.0.0", 9)); // 174.192.0.0 - 174.255.255.255
listExclude.add(new IPUtil.CIDR("72.96.0.0", 9)); // 72.96.0.0 - 72.127.255.255
listExclude.add(new IPUtil.CIDR("75.192.0.0", 9)); // 75.192.0.0 - 75.255.255.255
listExclude.add(new IPUtil.CIDR("97.0.0.0", 10)); // 97.0.0.0 - 97.63.255.255
}
// Broadcast
listExclude.add(new IPUtil.CIDR("224.0.0.0", 3));
2016-03-30 08:46:19 +00:00
2016-05-13 18:32:41 +00:00
Collections.sort(listExclude);
2016-03-30 08:46:19 +00:00
2016-05-13 18:32:41 +00:00
try {
InetAddress start = InetAddress.getByName("0.0.0.0");
for (IPUtil.CIDR exclude : listExclude) {
Log.i(TAG, "Exclude " + exclude.getStart().getHostAddress() + "..." + exclude.getEnd().getHostAddress());
for (IPUtil.CIDR include : IPUtil.toCIDR(start, IPUtil.minus1(exclude.getStart())))
try {
builder.addRoute(include.address, include.prefix);
} catch (Throwable ex) {
Log.e(TAG, ex.toString() + "\n" + Log.getStackTraceString(ex));
}
start = IPUtil.plus1(exclude.getEnd());
}
for (IPUtil.CIDR include : IPUtil.toCIDR("224.0.0.0", "255.255.255.255"))
2016-03-29 16:30:04 +00:00
try {
builder.addRoute(include.address, include.prefix);
} catch (Throwable ex) {
Log.e(TAG, ex.toString() + "\n" + Log.getStackTraceString(ex));
}
2016-05-13 18:32:41 +00:00
} catch (UnknownHostException ex) {
Log.e(TAG, ex.toString() + "\n" + Log.getStackTraceString(ex));
}
2016-05-13 18:32:41 +00:00
} else
builder.addRoute("0.0.0.0", 0);
2016-01-19 19:58:51 +00:00
2016-04-08 06:02:52 +00:00
Log.i(TAG, "IPv6=" + ip6);
if (ip6)
builder.addRoute("0:0:0:0:0:0:0:0", 0);
2016-01-19 19:58:51 +00:00
2016-03-16 06:16:45 +00:00
// MTU
2016-03-11 07:08:54 +00:00
int mtu = jni_get_mtu();
Log.i(TAG, "MTU=" + mtu);
builder.setMtu(mtu);
2016-01-19 19:58:51 +00:00
// Add list of allowed applications
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.LOLLIPOP)
if (last_connected && !filter)
for (Rule rule : listAllowed)
try {
builder.addDisallowedApplication(rule.info.packageName);
} catch (PackageManager.NameNotFoundException ex) {
Log.e(TAG, ex.toString() + "\n" + Log.getStackTraceString(ex));
}
else if (filter)
for (Rule rule : listRule)
if (!rule.apply || (!system && rule.system))
try {
Log.i(TAG, "Not routing " + rule.info.packageName);
builder.addDisallowedApplication(rule.info.packageName);
} catch (PackageManager.NameNotFoundException ex) {
Log.e(TAG, ex.toString() + "\n" + Log.getStackTraceString(ex));
}
2016-01-19 19:58:51 +00:00
// Build configure intent
Intent configure = new Intent(this, ActivityMain.class);
PendingIntent pi = PendingIntent.getActivity(this, 0, configure, PendingIntent.FLAG_UPDATE_CURRENT);
builder.setConfigureIntent(pi);
return builder;
2016-01-19 19:58:51 +00:00
}
private void startNative(ParcelFileDescriptor vpn, List<Rule> listAllowed, List<Rule> listRule) {
2016-03-11 06:47:52 +00:00
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(ServiceSinkhole.this);
boolean log = prefs.getBoolean("log", false);
boolean log_app = prefs.getBoolean("log_app", false);
boolean filter = prefs.getBoolean("filter", false);
2016-01-28 22:07:51 +00:00
Log.i(TAG, "Start native log=" + log + "/" + log_app + " filter=" + filter);
2016-01-30 13:26:30 +00:00
// Prepare rules
2016-01-31 16:16:56 +00:00
if (filter) {
prepareUidAllowed(listAllowed, listRule);
2016-01-31 16:16:56 +00:00
prepareHostsBlocked();
2016-03-09 16:51:49 +00:00
prepareUidIPFilters(null);
2016-02-08 15:34:54 +00:00
prepareForwarding();
} else {
2016-12-21 13:35:34 +00:00
lock.writeLock().lock();
mapUidAllowed.clear();
mapUidKnown.clear();
mapHostsBlocked.clear();
mapUidIPFilters.clear();
mapForward.clear();
2016-12-21 13:35:34 +00:00
lock.writeLock().unlock();
}
if (log_app)
prepareNotify(listRule);
2016-12-21 13:35:34 +00:00
else {
lock.writeLock().lock();
mapNoNotify.clear();
2016-12-21 13:35:34 +00:00
lock.writeLock().unlock();
}
2016-01-28 22:07:51 +00:00
if (log || log_app || filter) {
2016-02-08 17:43:29 +00:00
int prio = Integer.parseInt(prefs.getString("loglevel", Integer.toString(Log.WARN)));
2017-02-10 20:12:04 +00:00
int rcode = Integer.parseInt(prefs.getString("rcode", "3"));
2016-07-28 21:27:13 +00:00
if (prefs.getBoolean("socks5_enabled", false))
jni_socks5(
prefs.getString("socks5_addr", ""),
Integer.parseInt(prefs.getString("socks5_port", "0")),
prefs.getString("socks5_username", ""),
prefs.getString("socks5_password", ""));
else
jni_socks5("", 0, "", "");
2017-02-10 20:12:04 +00:00
jni_start(vpn.getFd(), mapForward.containsKey(53), rcode, prio);
2016-01-28 10:58:39 +00:00
}
}
2016-06-24 13:21:04 +00:00
private void stopNative(ParcelFileDescriptor vpn, boolean clear) {
Log.i(TAG, "Stop native clear=" + clear);
2016-07-03 08:12:31 +00:00
try {
jni_stop(vpn.getFd(), clear);
} catch (Throwable ex) {
// File descriptor might be closed
Log.e(TAG, ex.toString() + "\n" + Log.getStackTraceString(ex));
jni_stop(-1, clear);
}
2016-01-28 22:07:51 +00:00
}
2016-01-31 16:16:56 +00:00
private void unprepare() {
2016-12-21 13:35:34 +00:00
lock.writeLock().lock();
2016-01-31 16:16:56 +00:00
mapUidAllowed.clear();
mapUidKnown.clear();
2016-01-31 16:16:56 +00:00
mapHostsBlocked.clear();
mapUidIPFilters.clear();
2016-02-08 15:34:54 +00:00
mapForward.clear();
mapNoNotify.clear();
2016-12-21 13:35:34 +00:00
lock.writeLock().unlock();
2016-01-31 16:16:56 +00:00
}
private void prepareUidAllowed(List<Rule> listAllowed, List<Rule> listRule) {
2016-12-21 13:35:34 +00:00
lock.writeLock().lock();
2016-01-28 10:58:39 +00:00
mapUidAllowed.clear();
for (Rule rule : listAllowed)
mapUidAllowed.put(rule.info.applicationInfo.uid, true);
mapUidKnown.clear();
for (Rule rule : listRule)
mapUidKnown.put(rule.info.applicationInfo.uid, rule.info.applicationInfo.uid);
2016-12-21 13:35:34 +00:00
lock.writeLock().unlock();
2016-01-30 13:26:30 +00:00
}
private void prepareHostsBlocked() {
2016-03-11 06:47:52 +00:00
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(ServiceSinkhole.this);
boolean use_hosts = prefs.getBoolean("filter", false) && prefs.getBoolean("use_hosts", false);
2016-01-30 16:01:53 +00:00
File hosts = new File(getFilesDir(), "hosts.txt");
2016-02-15 12:10:35 +00:00
if (!use_hosts || !hosts.exists() || !hosts.canRead()) {
Log.i(TAG, "Hosts file use=" + use_hosts + " exists=" + hosts.exists());
2016-12-21 13:35:34 +00:00
lock.writeLock().lock();
2016-02-15 12:10:35 +00:00
mapHostsBlocked.clear();
2016-12-21 13:35:34 +00:00
lock.writeLock().unlock();
2016-02-15 12:10:35 +00:00
return;
}
boolean changed = (hosts.lastModified() != last_hosts_modified);
if (!changed && mapHostsBlocked.size() > 0) {
Log.i(TAG, "Hosts file unchanged");
return;
}
last_hosts_modified = hosts.lastModified();
2016-01-28 10:58:39 +00:00
2016-12-21 13:35:34 +00:00
lock.writeLock().lock();
2016-01-30 13:26:30 +00:00
mapHostsBlocked.clear();
2016-01-30 16:01:53 +00:00
2016-02-15 12:10:35 +00:00
int count = 0;
BufferedReader br = null;
try {
br = new BufferedReader(new FileReader(hosts));
String line;
while ((line = br.readLine()) != null) {
int hash = line.indexOf('#');
if (hash >= 0)
line = line.substring(0, hash);
line = line.trim();
if (line.length() > 0) {
String[] words = line.split("\\s+");
if (words.length == 2) {
count++;
mapHostsBlocked.put(words[1], true);
} else
Log.i(TAG, "Invalid hosts file line: " + line);
2016-01-28 10:58:39 +00:00
}
}
2016-10-12 07:03:01 +00:00
mapHostsBlocked.put("test.netguard.me", true);
2016-02-15 12:10:35 +00:00
Log.i(TAG, count + " hosts read");
} catch (IOException ex) {
Log.e(TAG, ex.toString() + "\n" + Log.getStackTraceString(ex));
} finally {
if (br != null)
try {
br.close();
} catch (IOException exex) {
Log.e(TAG, exex.toString() + "\n" + Log.getStackTraceString(exex));
}
}
2016-12-21 13:35:34 +00:00
lock.writeLock().unlock();
}
2016-03-09 16:51:49 +00:00
private void prepareUidIPFilters(String dname) {
SharedPreferences lockdown = getSharedPreferences("lockdown", Context.MODE_PRIVATE);
2016-12-21 13:35:34 +00:00
lock.writeLock().lock();
2017-01-06 18:20:00 +00:00
if (dname == null) {
2016-03-09 16:51:49 +00:00
mapUidIPFilters.clear();
2017-01-06 18:20:00 +00:00
if (!IAB.isPurchased(ActivityPro.SKU_FILTER, ServiceSinkhole.this)) {
lock.writeLock().unlock();
return;
}
}
2016-01-30 13:26:30 +00:00
2016-03-11 06:47:52 +00:00
Cursor cursor = DatabaseHelper.getInstance(ServiceSinkhole.this).getAccessDns(dname);
2016-01-30 20:35:24 +00:00
int colUid = cursor.getColumnIndex("uid");
int colVersion = cursor.getColumnIndex("version");
int colProtocol = cursor.getColumnIndex("protocol");
2016-02-03 18:50:12 +00:00
int colDAddr = cursor.getColumnIndex("daddr");
2016-02-03 16:59:24 +00:00
int colResource = cursor.getColumnIndex("resource");
2016-01-30 20:35:24 +00:00
int colDPort = cursor.getColumnIndex("dport");
int colBlock = cursor.getColumnIndex("block");
2016-11-11 18:52:50 +00:00
int colTime = cursor.getColumnIndex("time");
int colTTL = cursor.getColumnIndex("ttl");
2016-01-30 20:35:24 +00:00
while (cursor.moveToNext()) {
int uid = cursor.getInt(colUid);
int version = cursor.getInt(colVersion);
int protocol = cursor.getInt(colProtocol);
2016-02-03 18:50:12 +00:00
String daddr = cursor.getString(colDAddr);
2016-02-03 16:59:24 +00:00
String dresource = cursor.getString(colResource);
int dport = cursor.getInt(colDPort);
2016-01-30 20:35:24 +00:00
boolean block = (cursor.getInt(colBlock) > 0);
2016-11-11 18:52:50 +00:00
long time = cursor.getLong(colTime);
long ttl = cursor.getLong(colTTL);
2016-01-30 17:43:20 +00:00
if (isLockedDown(last_metered)) {
String[] pkg = getPackageManager().getPackagesForUid(uid);
if (pkg != null && pkg.length > 0) {
if (!lockdown.getBoolean(pkg[0], false))
continue;
}
}
// long is 64 bits
// 0..15 uid
// 16..31 dport
// 32..39 protocol
// 40..43 version
2016-02-06 09:04:42 +00:00
if (!(protocol == 6 /* TCP */ || protocol == 17 /* UDP */))
dport = 0;
long key = (version << 40) | (protocol << 32) | (dport << 16) | uid;
2016-01-30 20:35:24 +00:00
2016-03-09 16:51:49 +00:00
synchronized (mapUidIPFilters) {
if (!mapUidIPFilters.containsKey(key))
mapUidIPFilters.put(key, new HashMap());
2016-03-09 16:51:49 +00:00
try {
if (dname != null)
Log.i(TAG, "Set filter uid=" + uid + " " + daddr + " " + dresource + "/" + dport + "=" + block);
2016-11-10 07:28:37 +00:00
String name = (dresource == null ? daddr : dresource);
if (Util.isNumericAddress(name)) {
InetAddress iname = InetAddress.getByName(name);
boolean exists = mapUidIPFilters.get(key).containsKey(iname);
2016-12-22 10:48:08 +00:00
if (!exists || !mapUidIPFilters.get(key).get(iname).isBlocked()) {
2016-11-11 18:52:50 +00:00
IPRule rule = new IPRule(block, time + ttl);
mapUidIPFilters.get(key).put(iname, rule);
2016-12-22 10:48:08 +00:00
if (exists)
Log.w(TAG, "Address conflict uid=" + uid + " " + daddr + " " + dresource + "/" + dport);
} else if (exists) {
2016-12-22 10:48:08 +00:00
mapUidIPFilters.get(key).get(iname).updateExpires(time + ttl);
Log.w(TAG, "Address updated uid=" + uid + " " + daddr + " " + dresource + "/" + dport);
}
2016-11-10 07:28:37 +00:00
} else
Log.w(TAG, "Address not numeric " + name);
2016-03-09 16:51:49 +00:00
} catch (UnknownHostException ex) {
Log.e(TAG, ex.toString() + "\n" + Log.getStackTraceString(ex));
}
2016-02-03 16:59:24 +00:00
}
}
cursor.close();
2016-12-21 13:35:34 +00:00
lock.writeLock().unlock();
2016-02-03 16:59:24 +00:00
}
2016-02-08 15:34:54 +00:00
private void prepareForwarding() {
2016-12-21 13:35:34 +00:00
lock.writeLock().lock();
2016-02-08 15:34:54 +00:00
mapForward.clear();
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(this);
if (prefs.getBoolean("filter", false)) {
2016-03-11 06:47:52 +00:00
Cursor cursor = DatabaseHelper.getInstance(ServiceSinkhole.this).getForwarding();
int colProtocol = cursor.getColumnIndex("protocol");
int colDPort = cursor.getColumnIndex("dport");
int colRAddr = cursor.getColumnIndex("raddr");
int colRPort = cursor.getColumnIndex("rport");
int colRUid = cursor.getColumnIndex("ruid");
while (cursor.moveToNext()) {
Forward fwd = new Forward();
fwd.protocol = cursor.getInt(colProtocol);
fwd.dport = cursor.getInt(colDPort);
fwd.raddr = cursor.getString(colRAddr);
fwd.rport = cursor.getInt(colRPort);
fwd.ruid = cursor.getInt(colRUid);
mapForward.put(fwd.dport, fwd);
Log.i(TAG, "Forward " + fwd);
}
cursor.close();
2016-02-08 15:34:54 +00:00
}
2016-12-21 13:35:34 +00:00
lock.writeLock().unlock();
2016-02-08 15:34:54 +00:00
}
private void prepareNotify(List<Rule> listRule) {
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(this);
boolean notify = prefs.getBoolean("notify_access", false);
boolean system = prefs.getBoolean("manage_system", false);
2016-12-21 13:35:34 +00:00
lock.writeLock().lock();
mapNoNotify.clear();
if (notify)
for (Rule rule : listRule)
if (rule.notify && (system || !rule.system))
mapNoNotify.put(rule.info.applicationInfo.uid, true);
2016-12-21 13:35:34 +00:00
lock.writeLock().unlock();
}
private boolean isLockedDown(boolean metered) {
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(ServiceSinkhole.this);
boolean lockdown = prefs.getBoolean("lockdown", false);
boolean lockdown_wifi = prefs.getBoolean("lockdown_wifi", true);
boolean lockdown_other = prefs.getBoolean("lockdown_other", true);
if (metered ? !lockdown_other : !lockdown_wifi)
lockdown = false;
return lockdown;
}
2016-01-19 19:58:51 +00:00
private List<Rule> getAllowedRules(List<Rule> listRule) {
List<Rule> listAllowed = new ArrayList<>();
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(this);
// Check state
2015-11-13 10:05:10 +00:00
boolean wifi = Util.isWifiActive(this);
2015-11-13 07:07:15 +00:00
boolean metered = Util.isMeteredNetwork(this);
boolean useMetered = prefs.getBoolean("use_metered", false);
2015-12-10 07:38:45 +00:00
Set<String> ssidHomes = prefs.getStringSet("wifi_homes", new HashSet<String>());
2015-12-08 13:18:06 +00:00
String ssidNetwork = Util.getWifiSSID(this);
String generation = Util.getNetworkGeneration(this);
2015-12-02 19:11:06 +00:00
boolean unmetered_2g = prefs.getBoolean("unmetered_2g", false);
boolean unmetered_3g = prefs.getBoolean("unmetered_3g", false);
boolean unmetered_4g = prefs.getBoolean("unmetered_4g", false);
2016-03-11 06:47:52 +00:00
boolean roaming = Util.isRoaming(ServiceSinkhole.this);
2017-06-15 17:43:03 +00:00
boolean eu = prefs.getBoolean("eu_roaming", false);
boolean national = prefs.getBoolean("national_roaming", false);
boolean tethering = prefs.getBoolean("tethering", false);
boolean filter = prefs.getBoolean("filter", false);
2015-11-25 20:09:00 +00:00
// Update connected state
2016-03-11 06:47:52 +00:00
last_connected = Util.isConnected(ServiceSinkhole.this);
2015-11-25 20:09:00 +00:00
boolean org_metered = metered;
boolean org_roaming = roaming;
2015-11-25 20:09:00 +00:00
// Update metered state
if (wifi && !useMetered)
2015-11-25 20:09:00 +00:00
metered = false;
if (wifi && ssidHomes.size() > 0 &&
!(ssidHomes.contains(ssidNetwork) || ssidHomes.contains('"' + ssidNetwork + '"'))) {
2015-12-08 13:18:06 +00:00
metered = true;
Log.i(TAG, "!@home");
}
2015-12-02 19:11:06 +00:00
if (unmetered_2g && "2G".equals(generation))
metered = false;
2015-12-02 19:11:06 +00:00
if (unmetered_3g && "3G".equals(generation))
metered = false;
2015-12-02 19:11:06 +00:00
if (unmetered_4g && "4G".equals(generation))
metered = false;
2015-11-25 20:09:00 +00:00
last_metered = metered;
boolean lockdown = isLockedDown(last_metered);
// Update roaming state
2017-06-15 17:43:03 +00:00
if (roaming && eu)
roaming = !Util.isEU(this);
if (roaming && national)
2017-06-15 17:43:03 +00:00
roaming = !Util.isNational(this);
Log.i(TAG, "Get allowed" +
" connected=" + last_connected +
2015-11-25 20:09:00 +00:00
" wifi=" + wifi +
" home=" + TextUtils.join(",", ssidHomes) +
" network=" + ssidNetwork +
" metered=" + metered + "/" + org_metered +
" generation=" + generation +
" roaming=" + roaming + "/" + org_roaming +
" interactive=" + last_interactive +
" tethering=" + tethering +
2017-03-21 08:06:04 +00:00
" filter=" + filter +
" lockdown=" + lockdown);
if (last_connected)
for (Rule rule : listRule) {
boolean blocked = (metered ? rule.other_blocked : rule.wifi_blocked);
boolean screen = (metered ? rule.screen_other : rule.screen_wifi);
2017-03-21 08:06:04 +00:00
if ((!blocked || (screen && last_interactive)) &&
(!metered || !(rule.roaming && roaming)) &&
(!lockdown || rule.lockdown))
listAllowed.add(rule);
}
2016-01-19 19:58:51 +00:00
2016-02-10 18:52:55 +00:00
Log.i(TAG, "Allowed " + listAllowed.size() + " of " + listRule.size());
2016-01-19 19:58:51 +00:00
return listAllowed;
}
2015-10-30 07:57:36 +00:00
private void stopVPN(ParcelFileDescriptor pfd) {
Log.i(TAG, "Stopping");
try {
2015-10-26 13:32:14 +00:00
pfd.close();
2015-10-25 18:02:33 +00:00
} catch (IOException ex) {
Log.e(TAG, ex.toString() + "\n" + Log.getStackTraceString(ex));
}
}
2016-01-21 11:55:08 +00:00
// Called from native code
private void nativeExit(String reason) {
2016-01-24 11:50:40 +00:00
Log.w(TAG, "Native exit reason=" + reason);
if (reason != null) {
2016-07-03 13:51:04 +00:00
showErrorNotification(reason);
2016-01-21 11:55:08 +00:00
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(this);
prefs.edit().putBoolean("enabled", false).apply();
2017-03-23 07:29:32 +00:00
WidgetMain.updateWidgets(this);
2016-01-21 11:55:08 +00:00
}
}
// Called from native code
private void nativeError(int error, String message) {
Log.w(TAG, "Native error " + error + ": " + message);
2016-07-03 13:51:04 +00:00
showErrorNotification(message);
}
2016-01-10 07:35:02 +00:00
// Called from native code
private void logPacket(Packet packet) {
Message msg = logHandler.obtainMessage();
2016-01-30 11:46:00 +00:00
msg.obj = packet;
msg.what = MSG_PACKET;
msg.arg1 = (last_connected ? (last_metered ? 2 : 1) : 0);
msg.arg2 = (last_interactive ? 1 : 0);
logHandler.sendMessage(msg);
2016-01-09 18:53:28 +00:00
}
2016-01-30 08:51:41 +00:00
// Called from native code
private void dnsResolved(ResourceRecord rr) {
2016-03-11 06:47:52 +00:00
if (DatabaseHelper.getInstance(ServiceSinkhole.this).insertDns(rr)) {
2016-03-09 16:51:49 +00:00
Log.i(TAG, "New IP " + rr);
prepareUidIPFilters(rr.QName);
}
2016-01-30 09:59:19 +00:00
}
2016-01-28 10:58:39 +00:00
// Called from native code
private boolean isDomainBlocked(String name) {
2016-12-21 13:35:34 +00:00
lock.readLock().lock();
boolean blocked = (mapHostsBlocked.containsKey(name) && mapHostsBlocked.get(name));
lock.readLock().unlock();
return blocked;
2016-01-28 10:58:39 +00:00
}
private boolean isSupported(int protocol) {
return (protocol == 1 /* ICMPv4 */ ||
protocol == 59 /* ICMPv6 */ ||
protocol == 6 /* TCP */ ||
protocol == 17 /* UDP */);
}
2016-01-28 10:58:39 +00:00
// Called from native code
private Allowed isAddressAllowed(Packet packet) {
2016-01-28 10:58:39 +00:00
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(this);
2016-12-21 13:35:34 +00:00
lock.readLock().lock();
2016-01-30 13:26:30 +00:00
packet.allowed = false;
if (prefs.getBoolean("filter", false)) {
// https://android.googlesource.com/platform/system/core/+/master/include/private/android_filesystem_config.h
if (packet.uid < 2000 &&
!last_connected && isSupported(packet.protocol)) {
// Allow system applications in disconnected state
packet.allowed = true;
Log.w(TAG, "Allowing disconnected system " + packet);
} else if (packet.uid < 2000 &&
!mapUidKnown.containsKey(packet.uid) && isSupported(packet.protocol)) {
// Allow unknown system traffic
packet.allowed = true;
Log.w(TAG, "Allowing unknown system " + packet);
} else {
boolean filtered = false;
2016-02-06 09:04:42 +00:00
// Only TCP (6) and UDP (17) have port numbers
int dport = (packet.protocol == 6 || packet.protocol == 17 ? packet.dport : 0);
long key = (packet.version << 40) | (packet.protocol << 32) | (dport << 16) | packet.uid;
2016-12-21 13:35:34 +00:00
if (mapUidIPFilters.containsKey(key))
try {
InetAddress iaddr = InetAddress.getByName(packet.daddr);
Map<InetAddress, IPRule> map = mapUidIPFilters.get(key);
if (map != null && map.containsKey(iaddr)) {
IPRule rule = map.get(iaddr);
2016-12-22 10:48:08 +00:00
if (rule.isExpired())
Log.i(TAG, "DNS expired " + packet);
else {
2016-12-21 13:35:34 +00:00
filtered = true;
2016-12-22 10:48:08 +00:00
packet.allowed = !rule.isBlocked();
2016-12-21 13:35:34 +00:00
Log.i(TAG, "Filtering " + packet);
2016-12-22 10:48:08 +00:00
}
}
2016-12-21 13:35:34 +00:00
} catch (UnknownHostException ex) {
Log.w(TAG, "Allowed " + ex.toString() + "\n" + Log.getStackTraceString(ex));
}
2016-12-21 13:35:34 +00:00
if (!filtered)
packet.allowed = (mapUidAllowed.containsKey(packet.uid) && mapUidAllowed.get(packet.uid));
2016-01-30 13:26:30 +00:00
}
}
2016-01-28 10:58:39 +00:00
2016-02-08 15:34:54 +00:00
Allowed allowed = null;
if (packet.allowed) {
if (mapForward.containsKey(packet.dport)) {
Forward fwd = mapForward.get(packet.dport);
if (fwd.ruid == packet.uid) {
allowed = new Allowed();
} else {
allowed = new Allowed(fwd.raddr, fwd.rport);
packet.data = "> " + fwd.raddr + "/" + fwd.rport;
2016-02-08 15:34:54 +00:00
}
} else
allowed = new Allowed();
}
2016-12-21 13:35:34 +00:00
lock.readLock().unlock();
2016-02-01 14:44:47 +00:00
if (prefs.getBoolean("log", false) || prefs.getBoolean("log_app", false))
2017-03-11 16:39:57 +00:00
if (packet.protocol != 6 /* TCP */ || !"".equals(packet.flags))
logPacket(packet);
2016-01-28 10:58:39 +00:00
2016-02-08 15:34:54 +00:00
return allowed;
2016-01-28 10:58:39 +00:00
}
2016-02-15 16:48:53 +00:00
// Called from native code
private void accountUsage(Usage usage) {
Message msg = logHandler.obtainMessage();
msg.obj = usage;
msg.what = MSG_USAGE;
logHandler.sendMessage(msg);
}
private BroadcastReceiver interactiveStateReceiver = new BroadcastReceiver() {
@Override
public void onReceive(Context context, Intent intent) {
Log.i(TAG, "Received " + intent);
2015-11-20 10:34:23 +00:00
Util.logExtras(intent);
2016-01-01 09:06:02 +00:00
2016-03-11 06:47:52 +00:00
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(ServiceSinkhole.this);
2016-01-01 09:06:02 +00:00
int delay = Integer.parseInt(prefs.getString("screen_delay", "0"));
boolean interactive = Intent.ACTION_SCREEN_ON.equals(intent.getAction());
AlarmManager am = (AlarmManager) context.getSystemService(Context.ALARM_SERVICE);
PendingIntent pi = PendingIntent.getBroadcast(context, 0, new Intent(ACTION_SCREEN_OFF_DELAYED), PendingIntent.FLAG_UPDATE_CURRENT);
am.cancel(pi);
if (interactive || delay == 0) {
last_interactive = interactive;
2017-07-12 07:21:21 +00:00
reload_conditional("interactive state changed", ServiceSinkhole.this);
2016-01-01 09:06:02 +00:00
} else {
if (ACTION_SCREEN_OFF_DELAYED.equals(intent.getAction())) {
last_interactive = interactive;
2017-07-12 07:21:21 +00:00
reload_conditional("interactive state changed", ServiceSinkhole.this);
2016-01-01 09:06:02 +00:00
} else {
if (Build.VERSION.SDK_INT < Build.VERSION_CODES.M)
am.set(AlarmManager.RTC_WAKEUP, new Date().getTime() + delay * 60 * 1000L, pi);
else
am.setAndAllowWhileIdle(AlarmManager.RTC_WAKEUP, new Date().getTime() + delay * 60 * 1000L, pi);
}
}
// Start/stop stats
statsHandler.sendEmptyMessage(
2016-03-11 06:47:52 +00:00
Util.isInteractive(ServiceSinkhole.this) && !powersaving ? MSG_STATS_START : MSG_STATS_STOP);
}
};
private BroadcastReceiver powerSaveReceiver = new BroadcastReceiver() {
@Override
@TargetApi(Build.VERSION_CODES.LOLLIPOP)
public void onReceive(Context context, Intent intent) {
Log.i(TAG, "Received " + intent);
Util.logExtras(intent);
PowerManager pm = (PowerManager) getSystemService(Context.POWER_SERVICE);
powersaving = pm.isPowerSaveMode();
Log.i(TAG, "Power saving=" + powersaving);
statsHandler.sendEmptyMessage(
2016-03-11 06:47:52 +00:00
Util.isInteractive(ServiceSinkhole.this) && !powersaving ? MSG_STATS_START : MSG_STATS_STOP);
}
};
2016-01-11 09:08:36 +00:00
private BroadcastReceiver userReceiver = new BroadcastReceiver() {
@Override
@TargetApi(Build.VERSION_CODES.JELLY_BEAN_MR1)
2016-01-11 09:08:36 +00:00
public void onReceive(Context context, Intent intent) {
Log.i(TAG, "Received " + intent);
Util.logExtras(intent);
2016-01-11 10:38:48 +00:00
user_foreground = Intent.ACTION_USER_FOREGROUND.equals(intent.getAction());
2016-01-22 15:13:33 +00:00
Log.i(TAG, "User foreground=" + user_foreground + " user=" + (Process.myUid() / 100000));
2016-01-11 10:38:48 +00:00
if (user_foreground) {
2016-03-11 06:47:52 +00:00
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(ServiceSinkhole.this);
if (prefs.getBoolean("enabled", false)) {
// Allow service of background user to stop
try {
Thread.sleep(3000);
} catch (InterruptedException ignored) {
}
2016-03-11 06:47:52 +00:00
start("foreground", ServiceSinkhole.this);
}
2016-01-11 10:38:48 +00:00
} else
2016-03-11 06:47:52 +00:00
stop("background", ServiceSinkhole.this);
2016-01-11 09:08:36 +00:00
}
};
private BroadcastReceiver idleStateReceiver = new BroadcastReceiver() {
@Override
@TargetApi(Build.VERSION_CODES.M)
public void onReceive(Context context, Intent intent) {
Log.i(TAG, "Received " + intent);
Util.logExtras(intent);
PowerManager pm = (PowerManager) context.getSystemService(Context.POWER_SERVICE);
Log.i(TAG, "device idle=" + pm.isDeviceIdleMode());
2015-11-24 09:42:45 +00:00
// Reload rules when coming from idle mode
if (!pm.isDeviceIdleMode())
2016-03-11 06:47:52 +00:00
reload("idle state changed", ServiceSinkhole.this);
}
};
2015-10-24 18:01:55 +00:00
private BroadcastReceiver connectivityChangedReceiver = new BroadcastReceiver() {
@Override
public void onReceive(Context context, Intent intent) {
// Filter VPN connectivity changes
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.JELLY_BEAN_MR1) {
int networkType = intent.getIntExtra(ConnectivityManager.EXTRA_NETWORK_TYPE, ConnectivityManager.TYPE_DUMMY);
if (networkType == ConnectivityManager.TYPE_VPN)
return;
}
2015-11-08 08:40:17 +00:00
// Reload rules
Log.i(TAG, "Received " + intent);
2015-11-20 10:34:23 +00:00
Util.logExtras(intent);
2016-03-11 06:47:52 +00:00
reload("connectivity changed", ServiceSinkhole.this);
2015-10-25 22:31:00 +00:00
}
};
2017-04-02 10:47:59 +00:00
private BroadcastReceiver packageChangedReceiver = new BroadcastReceiver() {
2016-05-14 16:03:01 +00:00
@Override
public void onReceive(Context context, Intent intent) {
Log.i(TAG, "Received " + intent);
Util.logExtras(intent);
2017-04-02 10:47:59 +00:00
2017-07-14 16:38:28 +00:00
try {
if (Intent.ACTION_PACKAGE_ADDED.equals(intent.getAction())) {
// Application added
Rule.clearCache(context);
if (!intent.getBooleanExtra(Intent.EXTRA_REPLACING, false)) {
// Show notification
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(context);
if (IAB.isPurchased(ActivityPro.SKU_NOTIFY, context) && prefs.getBoolean("install", true)) {
int uid = intent.getIntExtra(Intent.EXTRA_UID, -1);
notifyNewApplication(uid);
}
2017-04-02 10:47:59 +00:00
}
2017-07-14 16:38:28 +00:00
reload("package added", context);
} else if (Intent.ACTION_PACKAGE_REMOVED.equals(intent.getAction())) {
// Application removed
Rule.clearCache(context);
if (intent.getBooleanExtra(Intent.EXTRA_DATA_REMOVED, false)) {
// Remove settings
String packageName = intent.getData().getSchemeSpecificPart();
Log.i(TAG, "Deleting settings package=" + packageName);
context.getSharedPreferences("wifi", Context.MODE_PRIVATE).edit().remove(packageName).apply();
context.getSharedPreferences("other", Context.MODE_PRIVATE).edit().remove(packageName).apply();
context.getSharedPreferences("screen_wifi", Context.MODE_PRIVATE).edit().remove(packageName).apply();
context.getSharedPreferences("screen_other", Context.MODE_PRIVATE).edit().remove(packageName).apply();
context.getSharedPreferences("roaming", Context.MODE_PRIVATE).edit().remove(packageName).apply();
context.getSharedPreferences("lockdown", Context.MODE_PRIVATE).edit().remove(packageName).apply();
context.getSharedPreferences("apply", Context.MODE_PRIVATE).edit().remove(packageName).apply();
context.getSharedPreferences("notify", Context.MODE_PRIVATE).edit().remove(packageName).apply();
int uid = intent.getIntExtra(Intent.EXTRA_UID, 0);
if (uid > 0) {
DatabaseHelper dh = DatabaseHelper.getInstance(context);
dh.clearLog(uid);
dh.clearAccess(uid, false);
NotificationManagerCompat.from(context).cancel(uid); // installed notification
NotificationManagerCompat.from(context).cancel(uid + 10000); // access notification
}
2017-04-02 10:47:59 +00:00
}
2017-07-14 16:38:28 +00:00
reload("package deleted", context);
}
} catch (Throwable ex) {
Log.e(TAG, ex.toString() + "\n" + Log.getStackTraceString(ex));
2017-04-02 10:47:59 +00:00
}
2016-05-14 16:03:01 +00:00
}
};
2017-04-02 10:47:59 +00:00
public void notifyNewApplication(int uid) {
if (uid < 0)
return;
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(this);
try {
// Get application name
String name = TextUtils.join(", ", Util.getApplicationNames(uid, this));
// Get application info
PackageManager pm = getPackageManager();
String[] packages = pm.getPackagesForUid(uid);
if (packages == null || packages.length < 1)
throw new PackageManager.NameNotFoundException(Integer.toString(uid));
boolean internet = Util.hasInternet(uid, this);
// Build notification
Intent main = new Intent(this, ActivityMain.class);
main.putExtra(ActivityMain.EXTRA_REFRESH, true);
main.putExtra(ActivityMain.EXTRA_SEARCH, Integer.toString(uid));
PendingIntent pi = PendingIntent.getActivity(this, uid, main, PendingIntent.FLAG_UPDATE_CURRENT);
TypedValue tv = new TypedValue();
getTheme().resolveAttribute(R.attr.colorPrimary, tv, true);
NotificationCompat.Builder builder = new NotificationCompat.Builder(this)
.setSmallIcon(R.drawable.ic_security_white_24dp)
.setContentIntent(pi)
.setColor(tv.data)
.setAutoCancel(true);
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.N)
builder.setContentTitle(name)
.setContentText(getString(R.string.msg_installed_n));
else
builder.setContentTitle(getString(R.string.app_name))
.setContentText(getString(R.string.msg_installed, name));
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.LOLLIPOP)
builder.setCategory(Notification.CATEGORY_STATUS)
.setVisibility(Notification.VISIBILITY_SECRET);
// Get defaults
SharedPreferences prefs_wifi = getSharedPreferences("wifi", Context.MODE_PRIVATE);
SharedPreferences prefs_other = getSharedPreferences("other", Context.MODE_PRIVATE);
boolean wifi = prefs_wifi.getBoolean(packages[0], prefs.getBoolean("whitelist_wifi", true));
boolean other = prefs_other.getBoolean(packages[0], prefs.getBoolean("whitelist_other", true));
// Build Wi-Fi action
Intent riWifi = new Intent(this, ServiceSinkhole.class);
riWifi.putExtra(ServiceSinkhole.EXTRA_COMMAND, ServiceSinkhole.Command.set);
riWifi.putExtra(ServiceSinkhole.EXTRA_NETWORK, "wifi");
riWifi.putExtra(ServiceSinkhole.EXTRA_UID, uid);
riWifi.putExtra(ServiceSinkhole.EXTRA_PACKAGE, packages[0]);
riWifi.putExtra(ServiceSinkhole.EXTRA_BLOCKED, !wifi);
PendingIntent piWifi = PendingIntent.getService(this, uid, riWifi, PendingIntent.FLAG_UPDATE_CURRENT);
2017-04-02 11:11:08 +00:00
NotificationCompat.Action wAction = new NotificationCompat.Action.Builder(
2017-04-02 10:47:59 +00:00
wifi ? R.drawable.wifi_on : R.drawable.wifi_off,
2017-04-02 13:13:44 +00:00
getString(wifi ? R.string.title_allow_wifi : R.string.title_block_wifi),
2017-04-02 10:47:59 +00:00
piWifi
2017-04-02 11:11:08 +00:00
).build();
builder.addAction(wAction);
2017-04-02 10:47:59 +00:00
// Build mobile action
Intent riOther = new Intent(this, ServiceSinkhole.class);
riOther.putExtra(ServiceSinkhole.EXTRA_COMMAND, ServiceSinkhole.Command.set);
riOther.putExtra(ServiceSinkhole.EXTRA_NETWORK, "other");
riOther.putExtra(ServiceSinkhole.EXTRA_UID, uid);
riOther.putExtra(ServiceSinkhole.EXTRA_PACKAGE, packages[0]);
riOther.putExtra(ServiceSinkhole.EXTRA_BLOCKED, !other);
PendingIntent piOther = PendingIntent.getService(this, uid + 10000, riOther, PendingIntent.FLAG_UPDATE_CURRENT);
2017-04-02 11:11:08 +00:00
NotificationCompat.Action oAction = new NotificationCompat.Action.Builder(
2017-04-02 10:47:59 +00:00
other ? R.drawable.other_on : R.drawable.other_off,
2017-04-02 13:13:44 +00:00
getString(other ? R.string.title_allow_other : R.string.title_block_other),
2017-04-02 10:47:59 +00:00
piOther
2017-04-02 11:11:08 +00:00
).build();
builder.addAction(oAction);
2017-04-02 10:47:59 +00:00
// Show notification
if (internet)
NotificationManagerCompat.from(this).notify(uid, builder.build());
else {
NotificationCompat.BigTextStyle expanded = new NotificationCompat.BigTextStyle(builder);
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.N)
expanded.bigText(getString(R.string.msg_installed_n));
else
expanded.bigText(getString(R.string.msg_installed, name));
expanded.setSummaryText(getString(R.string.title_internet));
NotificationManagerCompat.from(this).notify(uid, expanded.build());
}
} catch (PackageManager.NameNotFoundException ex) {
Log.e(TAG, ex.toString() + "\n" + Log.getStackTraceString(ex));
}
}
private PhoneStateListener phoneStateListener = new PhoneStateListener() {
private String last_generation = null;
2017-06-15 17:43:03 +00:00
private int last_eu = -1;
private int last_national = -1;
@Override
public void onDataConnectionStateChanged(int state, int networkType) {
if (state == TelephonyManager.DATA_CONNECTED) {
2016-03-11 06:47:52 +00:00
String current_generation = Util.getNetworkGeneration(ServiceSinkhole.this);
2015-12-06 12:57:02 +00:00
Log.i(TAG, "Data connected generation=" + current_generation);
if (last_generation == null || !last_generation.equals(current_generation)) {
Log.i(TAG, "New network generation=" + current_generation);
last_generation = current_generation;
2016-03-11 06:47:52 +00:00
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(ServiceSinkhole.this);
2015-12-02 19:11:06 +00:00
if (prefs.getBoolean("unmetered_2g", false) ||
prefs.getBoolean("unmetered_3g", false) ||
prefs.getBoolean("unmetered_4g", false))
2016-03-11 06:47:52 +00:00
reload("data connection state changed", ServiceSinkhole.this);
}
}
}
@Override
public void onServiceStateChanged(ServiceState serviceState) {
if (serviceState.getState() == ServiceState.STATE_IN_SERVICE) {
2017-06-15 17:43:03 +00:00
int current_eu = (Util.isEU(ServiceSinkhole.this) ? 1 : 0);
int current_national = (Util.isNational(ServiceSinkhole.this) ? 1 : 0);
Log.i(TAG, "In service eu=" + current_eu + " national=" + current_national);
2017-06-15 17:43:03 +00:00
boolean reload = false;
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(ServiceSinkhole.this);
2017-06-15 17:43:03 +00:00
if (last_eu != current_eu) {
Log.i(TAG, "New eu=" + current_eu);
last_eu = current_eu;
if (prefs.getBoolean("eu_roaming", false))
reload = true;
}
if (last_national != current_national) {
Log.i(TAG, "New national=" + current_national);
last_national = current_national;
if (prefs.getBoolean("national_roaming", false))
2017-06-15 17:43:03 +00:00
reload = true;
}
2017-06-15 17:43:03 +00:00
if (reload)
reload("service state changed", ServiceSinkhole.this);
}
}
};
2015-10-24 18:01:55 +00:00
@Override
public void onCreate() {
2016-03-09 07:24:16 +00:00
Log.i(TAG, "Create version=" + Util.getSelfVersionName(this) + "/" + Util.getSelfVersionCode(this));
2016-01-09 08:00:18 +00:00
2016-01-18 20:07:35 +00:00
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(this);
// Native init
jni_init();
2016-01-22 12:06:50 +00:00
boolean pcap = prefs.getBoolean("pcap", false);
setPcap(pcap, this);
2016-01-14 14:02:32 +00:00
2016-01-09 08:00:18 +00:00
prefs.registerOnSharedPreferenceChangeListener(this);
2016-01-02 15:38:24 +00:00
Util.setTheme(this);
super.onCreate();
2016-01-02 12:22:18 +00:00
2017-02-20 10:29:13 +00:00
HandlerThread commandThread = new HandlerThread(getString(R.string.app_name) + " command", Process.THREAD_PRIORITY_FOREGROUND);
HandlerThread logThread = new HandlerThread(getString(R.string.app_name) + " log", Process.THREAD_PRIORITY_BACKGROUND);
HandlerThread statsThread = new HandlerThread(getString(R.string.app_name) + " stats", Process.THREAD_PRIORITY_BACKGROUND);
commandThread.start();
logThread.start();
statsThread.start();
commandLooper = commandThread.getLooper();
logLooper = logThread.getLooper();
statsLooper = statsThread.getLooper();
commandHandler = new CommandHandler(commandLooper);
logHandler = new LogHandler(logLooper);
statsHandler = new StatsHandler(statsLooper);
// Listen for power save mode
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.LOLLIPOP && !Util.isPlayStoreInstall(this)) {
PowerManager pm = (PowerManager) getSystemService(POWER_SERVICE);
powersaving = pm.isPowerSaveMode();
IntentFilter ifPower = new IntentFilter();
ifPower.addAction(PowerManager.ACTION_POWER_SAVE_MODE_CHANGED);
registerReceiver(powerSaveReceiver, ifPower);
2016-05-14 16:03:01 +00:00
registeredPowerSave = true;
}
2016-01-11 09:08:36 +00:00
// Listen for user switches
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.JELLY_BEAN_MR1) {
IntentFilter ifUser = new IntentFilter();
ifUser.addAction(Intent.ACTION_USER_BACKGROUND);
ifUser.addAction(Intent.ACTION_USER_FOREGROUND);
registerReceiver(userReceiver, ifUser);
2016-05-14 16:03:01 +00:00
registeredUser = true;
}
2016-01-11 09:08:36 +00:00
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.M) {
// Listen for idle mode state changes
IntentFilter ifIdle = new IntentFilter();
ifIdle.addAction(PowerManager.ACTION_DEVICE_IDLE_MODE_CHANGED);
registerReceiver(idleStateReceiver, ifIdle);
2016-05-14 16:03:01 +00:00
registeredIdleState = true;
}
// Listen for connectivity updates
IntentFilter ifConnectivity = new IntentFilter();
ifConnectivity.addAction(ConnectivityManager.CONNECTIVITY_ACTION);
registerReceiver(connectivityChangedReceiver, ifConnectivity);
2016-05-14 16:03:01 +00:00
registeredConnectivityChanged = true;
// Listen for added applications
IntentFilter ifPackage = new IntentFilter();
ifPackage.addAction(Intent.ACTION_PACKAGE_ADDED);
2017-04-02 10:47:59 +00:00
ifPackage.addAction(Intent.ACTION_PACKAGE_REMOVED);
ifPackage.addDataScheme("package");
2017-04-02 10:47:59 +00:00
registerReceiver(packageChangedReceiver, ifPackage);
registeredPackageChanged = true;
// Setup house holding
2016-03-11 06:47:52 +00:00
Intent alarmIntent = new Intent(this, ServiceSinkhole.class);
2016-03-01 11:07:06 +00:00
alarmIntent.setAction(ACTION_HOUSE_HOLDING);
PendingIntent pi = PendingIntent.getService(this, 0, alarmIntent, PendingIntent.FLAG_UPDATE_CURRENT);
AlarmManager am = (AlarmManager) getSystemService(Context.ALARM_SERVICE);
am.setInexactRepeating(AlarmManager.RTC, SystemClock.elapsedRealtime() + 60 * 1000, AlarmManager.INTERVAL_HALF_DAY, pi);
2015-10-24 18:01:55 +00:00
}
2016-01-09 08:00:18 +00:00
@Override
public void onSharedPreferenceChanged(SharedPreferences prefs, String name) {
if ("theme".equals(name)) {
Log.i(TAG, "Theme changed");
Util.setTheme(this);
if (state != State.none) {
Log.d(TAG, "Stop foreground state=" + state.toString());
stopForeground(true);
}
if (state == State.enforcing)
2016-02-01 18:43:17 +00:00
startForeground(NOTIFY_ENFORCING, getEnforcingNotification(0, 0, 0));
2016-01-09 08:00:18 +00:00
else if (state != State.none)
startForeground(NOTIFY_WAITING, getWaitingNotification());
Log.d(TAG, "Start foreground state=" + state.toString());
}
}
@Override
public int onStartCommand(Intent intent, int flags, int startId) {
2016-07-02 11:11:43 +00:00
Log.i(TAG, "Received " + intent);
Util.logExtras(intent);
// Check for set command
if (intent != null && intent.hasExtra(EXTRA_COMMAND) &&
intent.getSerializableExtra(EXTRA_COMMAND) == Command.set) {
set(intent);
return START_STICKY;
}
2015-11-28 15:15:55 +00:00
// Keep awake
getLock(this).acquire();
// Get state
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(this);
boolean enabled = prefs.getBoolean("enabled", false);
2015-11-24 09:42:45 +00:00
// Handle service restart
if (intent == null) {
2015-11-24 09:54:43 +00:00
Log.i(TAG, "Restart");
2015-11-24 09:42:45 +00:00
// Recreate intent
2016-03-11 06:47:52 +00:00
intent = new Intent(this, ServiceSinkhole.class);
2015-11-24 09:42:45 +00:00
intent.putExtra(EXTRA_COMMAND, enabled ? Command.start : Command.stop);
}
2016-03-01 11:07:06 +00:00
if (ACTION_HOUSE_HOLDING.equals(intent.getAction()))
intent.putExtra(EXTRA_COMMAND, Command.householding);
2016-07-31 14:01:24 +00:00
if (ACTION_WATCHDOG.equals(intent.getAction()))
intent.putExtra(EXTRA_COMMAND, Command.watchdog);
2016-03-01 11:07:06 +00:00
2015-11-24 09:42:45 +00:00
Command cmd = (Command) intent.getSerializableExtra(EXTRA_COMMAND);
if (cmd == null)
intent.putExtra(EXTRA_COMMAND, enabled ? Command.start : Command.stop);
String reason = intent.getStringExtra(EXTRA_REASON);
2016-01-11 10:38:48 +00:00
Log.i(TAG, "Start intent=" + intent + " command=" + cmd + " reason=" + reason +
2016-01-22 15:13:33 +00:00
" vpn=" + (vpn != null) + " user=" + (Process.myUid() / 100000));
commandHandler.queue(intent);
2015-11-24 09:42:45 +00:00
return START_STICKY;
}
2016-03-17 20:36:08 +00:00
private void set(Intent intent) {
// Get arguments
int uid = intent.getIntExtra(EXTRA_UID, 0);
String network = intent.getStringExtra(EXTRA_NETWORK);
String pkg = intent.getStringExtra(EXTRA_PACKAGE);
boolean blocked = intent.getBooleanExtra(EXTRA_BLOCKED, false);
Log.i(TAG, "Set " + pkg + " " + network + "=" + blocked);
// Get defaults
SharedPreferences settings = PreferenceManager.getDefaultSharedPreferences(ServiceSinkhole.this);
boolean default_wifi = settings.getBoolean("whitelist_wifi", true);
boolean default_other = settings.getBoolean("whitelist_other", true);
// Update setting
SharedPreferences prefs = getSharedPreferences(network, Context.MODE_PRIVATE);
if (blocked == ("wifi".equals(network) ? default_wifi : default_other))
prefs.edit().remove(pkg).apply();
else
prefs.edit().putBoolean(pkg, blocked).apply();
// Apply rules
ServiceSinkhole.reload("notification", ServiceSinkhole.this);
// Update notification
2017-04-02 10:47:59 +00:00
notifyNewApplication(uid);
2016-03-17 20:36:08 +00:00
// Update UI
Intent ruleset = new Intent(ActivityMain.ACTION_RULES_CHANGED);
LocalBroadcastManager.getInstance(ServiceSinkhole.this).sendBroadcast(ruleset);
}
2015-11-24 09:44:02 +00:00
@Override
public void onRevoke() {
Log.i(TAG, "Revoke");
// Disable firewall (will result in stop command)
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(this);
prefs.edit().putBoolean("enabled", false).apply();
// Feedback
showDisabledNotification();
2017-03-23 07:29:32 +00:00
WidgetMain.updateWidgets(this);
2015-11-24 09:44:02 +00:00
super.onRevoke();
}
2015-10-24 18:01:55 +00:00
@Override
public void onDestroy() {
Log.i(TAG, "Destroy");
2015-10-25 15:28:41 +00:00
commandLooper.quit();
logLooper.quit();
statsLooper.quit();
2015-10-25 15:28:41 +00:00
2016-05-14 16:03:01 +00:00
if (registeredInteractiveState) {
unregisterReceiver(interactiveStateReceiver);
registeredInteractiveState = false;
}
if (registeredPowerSave) {
unregisterReceiver(powerSaveReceiver);
2016-05-14 16:03:01 +00:00
registeredPowerSave = false;
}
if (registeredUser) {
unregisterReceiver(userReceiver);
2016-05-14 16:03:01 +00:00
registeredUser = false;
}
if (registeredIdleState) {
unregisterReceiver(idleStateReceiver);
2016-05-14 16:03:01 +00:00
registeredIdleState = false;
}
if (registeredConnectivityChanged) {
unregisterReceiver(connectivityChangedReceiver);
registeredConnectivityChanged = false;
}
2017-04-02 10:47:59 +00:00
if (registeredPackageChanged) {
unregisterReceiver(packageChangedReceiver);
registeredPackageChanged = false;
2016-05-14 16:03:01 +00:00
}
2015-10-25 15:28:41 +00:00
if (phone_state) {
TelephonyManager tm = (TelephonyManager) getSystemService(Context.TELEPHONY_SERVICE);
if (tm != null) {
tm.listen(phoneStateListener, PhoneStateListener.LISTEN_NONE);
phone_state = false;
}
2015-12-07 09:46:35 +00:00
}
2015-12-07 11:23:43 +00:00
if (subscriptionsChangedListener != null &&
Build.VERSION.SDK_INT >= Build.VERSION_CODES.LOLLIPOP_MR1) {
2015-12-07 09:46:35 +00:00
SubscriptionManager sm = SubscriptionManager.from(this);
2015-12-07 11:23:43 +00:00
sm.removeOnSubscriptionsChangedListener((SubscriptionManager.OnSubscriptionsChangedListener) subscriptionsChangedListener);
subscriptionsChangedListener = null;
}
2016-01-24 07:58:52 +00:00
try {
if (vpn != null) {
2016-06-24 13:21:04 +00:00
stopNative(vpn, true);
2016-01-24 07:58:52 +00:00
stopVPN(vpn);
vpn = null;
unprepare();
2016-01-24 07:58:52 +00:00
}
} catch (Throwable ex) {
Log.e(TAG, ex.toString() + "\n" + Log.getStackTraceString(ex));
2015-11-08 08:40:17 +00:00
}
2016-01-24 07:58:52 +00:00
2016-01-17 09:42:21 +00:00
jni_done();
2016-01-09 08:00:18 +00:00
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(this);
prefs.unregisterOnSharedPreferenceChangeListener(this);
2015-10-24 18:01:55 +00:00
super.onDestroy();
}
2016-02-01 18:43:17 +00:00
private Notification getEnforcingNotification(int allowed, int blocked, int hosts) {
Intent main = new Intent(this, ActivityMain.class);
2015-11-27 07:23:18 +00:00
PendingIntent pi = PendingIntent.getActivity(this, 0, main, PendingIntent.FLAG_UPDATE_CURRENT);
2016-01-02 12:22:18 +00:00
TypedValue tv = new TypedValue();
getTheme().resolveAttribute(R.attr.colorPrimary, tv, true);
NotificationCompat.Builder builder = new NotificationCompat.Builder(this)
.setSmallIcon(isLockedDown(last_metered) ? R.drawable.ic_lock_outline_white_24dp : R.drawable.ic_security_white_24dp)
.setContentIntent(pi)
2016-01-02 12:22:18 +00:00
.setColor(tv.data)
.setOngoing(true)
.setAutoCancel(false);
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.N)
builder.setContentTitle(getString(R.string.msg_started));
else
builder.setContentTitle(getString(R.string.app_name))
.setContentText(getString(R.string.msg_started));
2016-01-31 13:07:07 +00:00
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.LOLLIPOP) {
builder.setCategory(Notification.CATEGORY_STATUS)
.setVisibility(Notification.VISIBILITY_SECRET)
.setPriority(Notification.PRIORITY_MIN);
}
if (allowed > 0 || blocked > 0 || hosts > 0) {
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.N) {
if (Util.isPlayStoreInstall(this))
builder.setContentText(getString(R.string.msg_packages, allowed, blocked));
else
builder.setContentText(getString(R.string.msg_hosts, allowed, blocked, hosts));
return builder.build();
} else {
NotificationCompat.BigTextStyle notification = new NotificationCompat.BigTextStyle(builder);
notification.bigText(getString(R.string.msg_started));
if (Util.isPlayStoreInstall(this))
notification.setSummaryText(getString(R.string.msg_packages, allowed, blocked));
else
notification.setSummaryText(getString(R.string.msg_hosts, allowed, blocked, hosts));
return notification.build();
}
} else
return builder.build();
}
2016-01-19 19:58:51 +00:00
private void updateEnforcingNotification(int allowed, int total) {
// Update notification
2016-02-01 18:43:17 +00:00
Notification notification = getEnforcingNotification(allowed, total - allowed, mapHostsBlocked.size());
2016-01-19 19:58:51 +00:00
NotificationManager nm = (NotificationManager) getSystemService(NOTIFICATION_SERVICE);
nm.notify(NOTIFY_ENFORCING, notification);
}
private Notification getWaitingNotification() {
Intent main = new Intent(this, ActivityMain.class);
PendingIntent pi = PendingIntent.getActivity(this, 0, main, PendingIntent.FLAG_UPDATE_CURRENT);
TypedValue tv = new TypedValue();
getTheme().resolveAttribute(R.attr.colorPrimary, tv, true);
NotificationCompat.Builder builder = new NotificationCompat.Builder(this)
.setSmallIcon(R.drawable.ic_security_white_24dp)
.setContentIntent(pi)
.setColor(tv.data)
.setOngoing(true)
.setAutoCancel(false);
2016-01-31 13:07:07 +00:00
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.N)
builder.setContentTitle(getString(R.string.msg_waiting));
else
builder.setContentTitle(getString(R.string.app_name))
.setContentText(getString(R.string.msg_waiting));
2016-01-31 13:07:07 +00:00
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.LOLLIPOP) {
builder.setCategory(Notification.CATEGORY_STATUS)
.setVisibility(Notification.VISIBILITY_SECRET)
.setPriority(Notification.PRIORITY_MIN);
}
return builder.build();
}
2015-11-01 06:44:48 +00:00
private void showDisabledNotification() {
Intent main = new Intent(this, ActivityMain.class);
2015-11-27 07:23:18 +00:00
PendingIntent pi = PendingIntent.getActivity(this, 0, main, PendingIntent.FLAG_UPDATE_CURRENT);
2016-01-02 12:22:18 +00:00
TypedValue tv = new TypedValue();
2016-02-01 06:37:13 +00:00
getTheme().resolveAttribute(R.attr.colorOff, tv, true);
2016-01-23 18:00:35 +00:00
NotificationCompat.Builder builder = new NotificationCompat.Builder(this)
.setSmallIcon(R.drawable.ic_error_white_24dp)
.setContentTitle(getString(R.string.app_name))
.setContentText(getString(R.string.msg_revoked))
.setContentIntent(pi)
2016-01-02 12:22:18 +00:00
.setColor(tv.data)
.setOngoing(false)
.setAutoCancel(true);
2016-01-31 13:07:07 +00:00
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.LOLLIPOP) {
builder.setCategory(Notification.CATEGORY_STATUS)
.setVisibility(Notification.VISIBILITY_SECRET);
}
2016-01-23 18:00:35 +00:00
NotificationCompat.BigTextStyle notification = new NotificationCompat.BigTextStyle(builder);
notification.bigText(getString(R.string.msg_revoked));
2015-11-04 20:15:57 +00:00
NotificationManagerCompat.from(this).notify(NOTIFY_DISABLED, notification.build());
2015-11-01 06:44:48 +00:00
}
2016-02-02 07:20:57 +00:00
private void showAutoStartNotification() {
Intent main = new Intent(this, ActivityMain.class);
main.putExtra(ActivityMain.EXTRA_APPROVE, true);
PendingIntent pi = PendingIntent.getActivity(this, NOTIFY_AUTOSTART, main, PendingIntent.FLAG_UPDATE_CURRENT);
2016-02-02 07:20:57 +00:00
TypedValue tv = new TypedValue();
getTheme().resolveAttribute(R.attr.colorOff, tv, true);
NotificationCompat.Builder builder = new NotificationCompat.Builder(this)
.setSmallIcon(R.drawable.ic_error_white_24dp)
.setContentTitle(getString(R.string.app_name))
.setContentText(getString(R.string.msg_autostart))
.setContentIntent(pi)
.setColor(tv.data)
.setOngoing(false)
.setAutoCancel(true);
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.LOLLIPOP) {
builder.setCategory(Notification.CATEGORY_STATUS)
.setVisibility(Notification.VISIBILITY_SECRET);
}
NotificationCompat.BigTextStyle notification = new NotificationCompat.BigTextStyle(builder);
notification.bigText(getString(R.string.msg_autostart));
NotificationManagerCompat.from(this).notify(NOTIFY_AUTOSTART, notification.build());
}
2016-07-03 13:51:04 +00:00
private void showErrorNotification(String message) {
2016-01-23 18:00:35 +00:00
Intent main = new Intent(this, ActivityMain.class);
PendingIntent pi = PendingIntent.getActivity(this, 0, main, PendingIntent.FLAG_UPDATE_CURRENT);
TypedValue tv = new TypedValue();
2016-02-01 06:37:13 +00:00
getTheme().resolveAttribute(R.attr.colorOff, tv, true);
2016-01-23 18:00:35 +00:00
NotificationCompat.Builder builder = new NotificationCompat.Builder(this)
.setSmallIcon(R.drawable.ic_error_white_24dp)
.setContentTitle(getString(R.string.app_name))
2016-07-03 13:51:04 +00:00
.setContentText(getString(R.string.msg_error, message))
.setContentIntent(pi)
.setColor(tv.data)
.setOngoing(false)
.setAutoCancel(true);
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.LOLLIPOP) {
builder.setCategory(Notification.CATEGORY_STATUS)
.setVisibility(Notification.VISIBILITY_SECRET);
}
NotificationCompat.BigTextStyle notification = new NotificationCompat.BigTextStyle(builder);
2016-07-03 13:51:04 +00:00
notification.bigText(getString(R.string.msg_error, message));
notification.setSummaryText(message);
2016-07-03 13:51:04 +00:00
NotificationManagerCompat.from(this).notify(NOTIFY_ERROR, notification.build());
2016-01-23 18:00:35 +00:00
}
2016-01-30 18:52:31 +00:00
private void showAccessNotification(int uid) {
2016-03-11 06:47:52 +00:00
String name = TextUtils.join(", ", Util.getApplicationNames(uid, ServiceSinkhole.this));
2016-01-30 18:52:31 +00:00
2016-03-11 06:47:52 +00:00
Intent main = new Intent(ServiceSinkhole.this, ActivityMain.class);
2016-01-30 18:52:31 +00:00
main.putExtra(ActivityMain.EXTRA_SEARCH, Integer.toString(uid));
2016-03-11 06:47:52 +00:00
PendingIntent pi = PendingIntent.getActivity(ServiceSinkhole.this, uid + 10000, main, PendingIntent.FLAG_UPDATE_CURRENT);
2016-01-30 18:52:31 +00:00
TypedValue tv = new TypedValue();
2016-01-31 08:41:09 +00:00
getTheme().resolveAttribute(R.attr.colorOn, tv, true);
int colorOn = tv.data;
getTheme().resolveAttribute(R.attr.colorOff, tv, true);
int colorOff = tv.data;
2016-01-31 08:04:54 +00:00
2016-01-30 18:52:31 +00:00
NotificationCompat.Builder builder = new NotificationCompat.Builder(this)
.setSmallIcon(R.drawable.ic_cloud_upload_white_24dp)
.setGroup("AccessAttempt")
2016-01-30 18:52:31 +00:00
.setContentIntent(pi)
2016-02-01 06:37:13 +00:00
.setColor(colorOff)
2016-01-30 18:52:31 +00:00
.setOngoing(false)
.setAutoCancel(true);
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.N)
builder.setContentTitle(name)
.setContentText(getString(R.string.msg_access_n));
else
builder.setContentTitle(getString(R.string.app_name))
.setContentText(getString(R.string.msg_access, name));
2016-01-31 13:07:07 +00:00
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.LOLLIPOP) {
builder.setCategory(Notification.CATEGORY_STATUS)
2016-01-31 13:07:07 +00:00
.setVisibility(Notification.VISIBILITY_SECRET);
}
2016-01-30 18:52:31 +00:00
DateFormat df = new SimpleDateFormat("dd HH:mm");
NotificationCompat.InboxStyle notification = new NotificationCompat.InboxStyle(builder);
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.N)
notification.addLine(getString(R.string.msg_access_n));
else {
String sname = getString(R.string.msg_access, name);
int pos = sname.indexOf(name);
Spannable sp = new SpannableString(sname);
sp.setSpan(new StyleSpan(Typeface.BOLD), pos, pos + name.length(), Spannable.SPAN_EXCLUSIVE_EXCLUSIVE);
notification.addLine(sp);
}
2016-03-11 06:47:52 +00:00
Cursor cursor = DatabaseHelper.getInstance(ServiceSinkhole.this).getAccessUnset(uid, 7);
2016-01-30 18:52:31 +00:00
int colDAddr = cursor.getColumnIndex("daddr");
2016-01-31 08:04:54 +00:00
int colTime = cursor.getColumnIndex("time");
int colAllowed = cursor.getColumnIndex("allowed");
2016-01-30 18:52:31 +00:00
while (cursor.moveToNext()) {
StringBuilder sb = new StringBuilder();
2016-01-30 18:52:31 +00:00
sb.append(df.format(cursor.getLong(colTime))).append(' ');
String daddr = cursor.getString(colDAddr);
if (Util.isNumericAddress(daddr))
try {
daddr = InetAddress.getByName(daddr).getHostName();
} catch (UnknownHostException ignored) {
}
sb.append(daddr);
2016-01-31 08:04:54 +00:00
int allowed = cursor.getInt(colAllowed);
if (allowed >= 0) {
int pos = sb.indexOf(daddr);
Spannable sp = new SpannableString(sb);
2016-01-31 08:41:09 +00:00
ForegroundColorSpan fgsp = new ForegroundColorSpan(allowed > 0 ? colorOn : colorOff);
2016-01-31 08:04:54 +00:00
sp.setSpan(fgsp, pos, pos + daddr.length(), Spannable.SPAN_EXCLUSIVE_EXCLUSIVE);
notification.addLine(sp);
} else
notification.addLine(sb);
}
2016-01-30 20:35:24 +00:00
cursor.close();
2016-01-30 18:52:31 +00:00
NotificationManagerCompat.from(this).notify(uid + 10000, notification.build());
}
private void showUpdateNotification(String name, String url) {
Intent download = new Intent(Intent.ACTION_VIEW, Uri.parse(url));
PendingIntent pi = PendingIntent.getActivity(this, 0, download, PendingIntent.FLAG_UPDATE_CURRENT);
TypedValue tv = new TypedValue();
getTheme().resolveAttribute(R.attr.colorPrimary, tv, true);
NotificationCompat.Builder builder = new NotificationCompat.Builder(this)
.setSmallIcon(R.drawable.ic_security_white_24dp)
.setContentTitle(getString(R.string.app_name))
.setContentText(getString(R.string.msg_update))
.setContentIntent(pi)
.setColor(tv.data)
.setOngoing(false)
.setAutoCancel(true);
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.LOLLIPOP) {
builder.setCategory(Notification.CATEGORY_STATUS)
.setVisibility(Notification.VISIBILITY_SECRET);
}
NotificationCompat.BigTextStyle notification = new NotificationCompat.BigTextStyle(builder);
notification.bigText(getString(R.string.msg_update));
notification.setSummaryText(name);
NotificationManagerCompat.from(this).notify(NOTIFY_UPDATE, notification.build());
}
2016-01-23 18:00:35 +00:00
private void removeWarningNotifications() {
2015-11-04 20:15:57 +00:00
NotificationManagerCompat.from(this).cancel(NOTIFY_DISABLED);
2016-07-03 13:51:04 +00:00
NotificationManagerCompat.from(this).cancel(NOTIFY_AUTOSTART);
2016-01-23 18:00:35 +00:00
NotificationManagerCompat.from(this).cancel(NOTIFY_ERROR);
2015-10-24 18:01:55 +00:00
}
2015-10-25 22:04:10 +00:00
private class Builder extends VpnService.Builder {
private NetworkInfo networkInfo;
2016-03-11 07:08:54 +00:00
private int mtu;
private List<String> listAddress = new ArrayList<>();
private List<String> listRoute = new ArrayList<>();
private List<InetAddress> listDns = new ArrayList<>();
private List<String> listDisallowed = new ArrayList<>();
private Builder() {
super();
ConnectivityManager cm = (ConnectivityManager) getSystemService(Context.CONNECTIVITY_SERVICE);
networkInfo = cm.getActiveNetworkInfo();
}
2016-03-11 07:08:54 +00:00
@Override
public VpnService.Builder setMtu(int mtu) {
this.mtu = mtu;
super.setMtu(mtu);
return this;
}
@Override
public Builder addAddress(String address, int prefixLength) {
listAddress.add(address + "/" + prefixLength);
super.addAddress(address, prefixLength);
return this;
}
@Override
public Builder addRoute(String address, int prefixLength) {
listRoute.add(address + "/" + prefixLength);
super.addRoute(address, prefixLength);
return this;
}
@Override
public Builder addDnsServer(InetAddress address) {
listDns.add(address);
super.addDnsServer(address);
return this;
}
@Override
public Builder addDisallowedApplication(String packageName) throws PackageManager.NameNotFoundException {
listDisallowed.add(packageName);
super.addDisallowedApplication(packageName);
return this;
}
@Override
public boolean equals(Object obj) {
Builder other = (Builder) obj;
if (other == null)
return false;
if (this.networkInfo == null || other.networkInfo == null ||
this.networkInfo.getType() != other.networkInfo.getType())
return false;
2016-03-11 07:08:54 +00:00
if (this.mtu != other.mtu)
return false;
if (this.listAddress.size() != other.listAddress.size())
return false;
if (this.listRoute.size() != other.listRoute.size())
return false;
if (this.listDns.size() != other.listDns.size())
return false;
if (this.listDisallowed.size() != other.listDisallowed.size())
return false;
for (String address : this.listAddress)
if (!other.listAddress.contains(address))
return false;
for (String route : this.listRoute)
if (!other.listRoute.contains(route))
return false;
for (InetAddress dns : this.listDns)
if (!other.listDns.contains(dns))
return false;
for (String pkg : this.listDisallowed)
if (!other.listDisallowed.contains(pkg))
return false;
return true;
}
}
2016-11-11 18:52:50 +00:00
private class IPRule {
2016-12-22 10:48:08 +00:00
private boolean block;
private long expires;
2016-11-11 18:52:50 +00:00
public IPRule(boolean block, long expires) {
this.block = block;
this.expires = expires;
}
2016-12-22 10:48:08 +00:00
public boolean isBlocked() {
return this.block;
}
public boolean isExpired() {
return System.currentTimeMillis() > this.expires;
}
public void updateExpires(long expires) {
this.expires = Math.max(this.expires, expires);
}
2016-11-11 18:52:50 +00:00
@Override
public boolean equals(Object obj) {
IPRule other = (IPRule) obj;
return (this.block == other.block && this.expires == other.expires);
}
}
public static void run(String reason, Context context) {
2016-03-11 06:47:52 +00:00
Intent intent = new Intent(context, ServiceSinkhole.class);
intent.putExtra(EXTRA_COMMAND, Command.run);
intent.putExtra(EXTRA_REASON, reason);
context.startService(intent);
}
public static void start(String reason, Context context) {
2016-03-11 06:47:52 +00:00
Intent intent = new Intent(context, ServiceSinkhole.class);
2015-10-26 16:23:41 +00:00
intent.putExtra(EXTRA_COMMAND, Command.start);
intent.putExtra(EXTRA_REASON, reason);
2015-10-26 16:23:41 +00:00
context.startService(intent);
}
2016-02-17 12:08:57 +00:00
public static void reload(String reason, Context context) {
2015-11-04 22:45:47 +00:00
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(context);
if (prefs.getBoolean("enabled", false)) {
2016-03-11 06:47:52 +00:00
Intent intent = new Intent(context, ServiceSinkhole.class);
2016-02-17 12:08:57 +00:00
intent.putExtra(EXTRA_COMMAND, Command.reload);
intent.putExtra(EXTRA_REASON, reason);
context.startService(intent);
}
2015-10-25 22:04:10 +00:00
}
2015-10-26 16:23:41 +00:00
2017-07-12 07:21:21 +00:00
public static void reload_conditional(String reason, Context context) {
SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(context);
if (prefs.getBoolean("enabled", false)) {
Intent intent = new Intent(context, ServiceSinkhole.class);
intent.putExtra(EXTRA_COMMAND, Command.reload);
intent.putExtra(EXTRA_REASON, reason);
intent.putExtra(EXTRA_CONDITIONAL, true);
context.startService(intent);
}
}
public static void stop(String reason, Context context) {
2016-03-11 06:47:52 +00:00
Intent intent = new Intent(context, ServiceSinkhole.class);
2015-10-26 16:23:41 +00:00
intent.putExtra(EXTRA_COMMAND, Command.stop);
intent.putExtra(EXTRA_REASON, reason);
2015-10-26 16:23:41 +00:00
context.startService(intent);
}
2015-12-11 09:36:35 +00:00
public static void reloadStats(String reason, Context context) {
2016-03-11 06:47:52 +00:00
Intent intent = new Intent(context, ServiceSinkhole.class);
2015-12-11 09:36:35 +00:00
intent.putExtra(EXTRA_COMMAND, Command.stats);
intent.putExtra(EXTRA_REASON, reason);
context.startService(intent);
}
2015-10-24 18:01:55 +00:00
}