From d01aae7860fd3b390c511be300963b048038d60c Mon Sep 17 00:00:00 2001
From: zzz <zzz@mail.i2p>
Date: Mon, 15 Oct 2012 15:37:13 +0000
Subject: [PATCH] HTTP Proxy:  - Move error page methods to base  - Preliminary
 code for digest auth

---
 .../i2p/i2ptunnel/I2PTunnelConnectClient.java |  53 +++--
 .../i2p/i2ptunnel/I2PTunnelHTTPClient.java    |  93 +++------
 .../i2ptunnel/I2PTunnelHTTPClientBase.java    | 193 ++++++++++++++++--
 3 files changed, 230 insertions(+), 109 deletions(-)

diff --git a/apps/i2ptunnel/java/src/net/i2p/i2ptunnel/I2PTunnelConnectClient.java b/apps/i2ptunnel/java/src/net/i2p/i2ptunnel/I2PTunnelConnectClient.java
index 04ca75e75a..884795ce7f 100644
--- a/apps/i2ptunnel/java/src/net/i2p/i2ptunnel/I2PTunnelConnectClient.java
+++ b/apps/i2ptunnel/java/src/net/i2p/i2ptunnel/I2PTunnelConnectClient.java
@@ -13,6 +13,7 @@ import java.util.Locale;
 import java.util.Properties;
 import java.util.StringTokenizer;
 
+import net.i2p.I2PAppContext;
 import net.i2p.I2PException;
 import net.i2p.client.streaming.I2PSocket;
 import net.i2p.client.streaming.I2PSocketOptions;
@@ -20,7 +21,6 @@ import net.i2p.data.Base64;
 import net.i2p.data.DataHelper;
 import net.i2p.data.Destination;
 import net.i2p.util.EventDispatcher;
-import net.i2p.util.FileUtil;
 import net.i2p.util.Log;
 import net.i2p.util.PortMapper;
 
@@ -58,6 +58,8 @@ import net.i2p.util.PortMapper;
  */
 public class I2PTunnelConnectClient extends I2PTunnelHTTPClientBase implements Runnable {
 
+    private static final String AUTH_REALM = "I2P SSL Proxy";
+
     private final static byte[] ERR_DESTINATION_UNKNOWN =
         ("HTTP/1.1 503 Service Unavailable\r\n"+
          "Content-Type: text/html; charset=iso-8859-1\r\n"+
@@ -94,7 +96,7 @@ public class I2PTunnelConnectClient extends I2PTunnelHTTPClientBase implements R
          "Content-Type: text/html; charset=UTF-8\r\n"+
          "Cache-control: no-cache\r\n"+
          "Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.5\r\n" +         // try to get a UTF-8-encoded response back for the password
-         "Proxy-Authenticate: Basic realm=\"I2P SSL Proxy\"\r\n" +
+         "Proxy-Authenticate: Basic realm=\"" + AUTH_REALM + "\"\r\n" +
          "\r\n"+
          "<html><body><H1>I2P ERROR: PROXY AUTHENTICATION REQUIRED</H1>"+
          "This proxy is configured to require authentication.<BR>")
@@ -165,6 +167,11 @@ public class I2PTunnelConnectClient extends I2PTunnelHTTPClientBase implements R
         return super.close(forced);
     }
 
+    /** @since 0.9.4 */
+    protected String getRealm() {
+        return AUTH_REALM;
+    }
+
     protected void clientConnectionRun(Socket s) {
         InputStream in = null;
         OutputStream out = null;
@@ -237,10 +244,10 @@ public class I2PTunnelConnectClient extends I2PTunnelHTTPClientBase implements R
                         _log.debug(getPrefix(requestId) + "REST  :" + restofline + ":");
                         _log.debug(getPrefix(requestId) + "DEST  :" + destination + ":");
                     }
-                } else if (line.toLowerCase(Locale.US).startsWith("proxy-authorization: basic ")) {
+                } else if (line.toLowerCase(Locale.US).startsWith("proxy-authorization: ")) {
                     // strip Proxy-Authenticate from the response in HTTPResponseOutputStream
                     // save for auth check below
-                    authorization = line.substring(27);  // "proxy-authorization: basic ".length()
+                    authorization = line.substring(21);  // "proxy-authorization: ".length()
                     line = null;
                 } else if (line.length() > 0) {
                     // Additional lines - shouldn't be too many. Firefox sends:
@@ -295,16 +302,11 @@ public class I2PTunnelConnectClient extends I2PTunnelHTTPClientBase implements R
 
             Destination clientDest = _context.namingService().lookup(destination);
             if (clientDest == null) {
-                String str;
                 byte[] header;
                 if (usingWWWProxy)
-                    str = FileUtil.readTextFile((new File(_errorDir, "dnfp-header.ht")).getAbsolutePath(), 100, true);
+                    header = getErrorPage("dnfp-header.ht", ERR_DESTINATION_UNKNOWN);
                 else
-                    str = FileUtil.readTextFile((new File(_errorDir, "dnfh-header.ht")).getAbsolutePath(), 100, true);
-                if (str != null)
-                    header = str.getBytes();
-                else
-                    header = ERR_DESTINATION_UNKNOWN;
+                    header = getErrorPage("dnfh-header.ht", ERR_DESTINATION_UNKNOWN);
                 writeErrorMessage(header, out, targetRequest, usingWWWProxy, destination);
                 s.close();
                 return;
@@ -341,12 +343,13 @@ public class I2PTunnelConnectClient extends I2PTunnelHTTPClientBase implements R
     }
 
     private static class OnTimeout implements Runnable {
-        private Socket _socket;
-        private OutputStream _out;
-        private String _target;
-        private boolean _usingProxy;
-        private String _wwwProxy;
-        private long _requestId;
+        private final Socket _socket;
+        private final OutputStream _out;
+        private final String _target;
+        private final boolean _usingProxy;
+        private final String _wwwProxy;
+        private final long _requestId;
+
         public OnTimeout(Socket s, OutputStream out, String target, boolean usingProxy, String wwwProxy, long id) {
             _socket = s;
             _out = out;
@@ -355,6 +358,7 @@ public class I2PTunnelConnectClient extends I2PTunnelHTTPClientBase implements R
             _wwwProxy = wwwProxy;
             _requestId = id;
         }
+
         public void run() {
             //if (_log.shouldLog(Log.DEBUG))
             //    _log.debug("Timeout occured requesting " + _target);
@@ -391,17 +395,12 @@ public class I2PTunnelConnectClient extends I2PTunnelHTTPClientBase implements R
                                                   boolean usingWWWProxy, String wwwProxy, long requestId) {
         if (out == null)
             return;
+        byte[] header;
+        if (usingWWWProxy)
+            header = getErrorPage(I2PAppContext.getGlobalContext(), "dnfp-header.ht", ERR_DESTINATION_UNKNOWN);
+        else
+            header = getErrorPage(I2PAppContext.getGlobalContext(), "dnf-header.ht", ERR_DESTINATION_UNKNOWN);
         try {
-            String str;
-            byte[] header;
-            if (usingWWWProxy)
-                str = FileUtil.readTextFile((new File(_errorDir, "dnfp-header.ht")).getAbsolutePath(), 100, true);
-            else
-                str = FileUtil.readTextFile((new File(_errorDir, "dnf-header.ht")).getAbsolutePath(), 100, true);
-            if (str != null)
-                header = str.getBytes();
-            else
-                header = ERR_DESTINATION_UNKNOWN;
             writeErrorMessage(header, out, targetRequest, usingWWWProxy, wwwProxy);
         } catch (IOException ioe) {}
     }
diff --git a/apps/i2ptunnel/java/src/net/i2p/i2ptunnel/I2PTunnelHTTPClient.java b/apps/i2ptunnel/java/src/net/i2p/i2ptunnel/I2PTunnelHTTPClient.java
index bc7a474774..e7d7ecea7a 100644
--- a/apps/i2ptunnel/java/src/net/i2p/i2ptunnel/I2PTunnelHTTPClient.java
+++ b/apps/i2ptunnel/java/src/net/i2p/i2ptunnel/I2PTunnelHTTPClient.java
@@ -3,9 +3,7 @@
  */
 package net.i2p.i2ptunnel;
 
-import java.io.ByteArrayOutputStream;
 import java.io.File;
-import java.io.FileInputStream;
 import java.io.IOException;
 import java.io.InputStream;
 import java.io.OutputStream;
@@ -73,10 +71,14 @@ public class I2PTunnelHTTPClient extends I2PTunnelHTTPClientBase implements Runn
      *  via address helper links
      */
     private final ConcurrentHashMap<String, String> addressHelpers = new ConcurrentHashMap(8);
+
     /**
      *  Used to protect actions via http://proxy.i2p/
      */
     private final String _proxyNonce;
+
+    private static final String AUTH_REALM = "I2P HTTP Proxy";
+
     /**
      *  These are backups if the xxx.ht error page is missing.
      */
@@ -167,12 +169,13 @@ public class I2PTunnelHTTPClient extends I2PTunnelHTTPClientBase implements Runn
             "\r\n" +
             "<html><body><H1>I2P ERROR: REQUEST DENIED</H1>" +
             "Your browser is misconfigured. Do not use the proxy to access the router console or other localhost destinations.<BR>").getBytes();
+
     private final static byte[] ERR_AUTH =
                                 ("HTTP/1.1 407 Proxy Authentication Required\r\n" +
             "Content-Type: text/html; charset=UTF-8\r\n" +
             "Cache-control: no-cache\r\n" +
             "Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.5\r\n" + // try to get a UTF-8-encoded response back for the password
-            "Proxy-Authenticate: Basic realm=\"I2P HTTP Proxy\"\r\n" +
+            "Proxy-Authenticate: Basic realm=\"" + AUTH_REALM + "\"\r\n" +
             "\r\n" +
             "<html><body><H1>I2P ERROR: PROXY AUTHENTICATION REQUIRED</H1>" +
             "This proxy is configured to require authentication.<BR>").getBytes();
@@ -300,6 +303,12 @@ public class I2PTunnelHTTPClient extends I2PTunnelHTTPClientBase implements Runn
         }
         return rv;
     }
+
+    /** @since 0.9.4 */
+    protected String getRealm() {
+        return AUTH_REALM;
+    }
+
     private static final String HELPER_PARAM = "i2paddresshelper";
     public static final String LOCAL_SERVER = "proxy.i2p";
     private static final boolean DEFAULT_GZIP = true;
@@ -769,10 +778,7 @@ public class I2PTunnelHTTPClient extends I2PTunnelHTTPClientBase implements Runn
                         // hop-by-hop header, and we definitely want to block Windows NTLM after a far-end 407.
                         // Response to far-end shouldn't happen, as we
                         // strip Proxy-Authenticate from the response in HTTPResponseOutputStream
-                        if(lowercaseLine.startsWith("proxy-authorization: basic ")) // save for auth check below
-                        {
-                            authorization = line.substring(27);  // "proxy-authorization: basic ".length()
-                        }
+                        authorization = line.substring(21);  // "proxy-authorization: ".length()
                         line = null;
                         continue;
                     } else if(lowercaseLine.startsWith("icy")) {
@@ -858,7 +864,11 @@ public class I2PTunnelHTTPClient extends I2PTunnelHTTPClientBase implements Runn
                         _log.warn(getPrefix(requestId) + "Auth required, sending 407");
                     }
                 }
-                out.write(getErrorPage("auth", ERR_AUTH));
+                if (isDigestAuthRequired()) {
+                    // weep
+                } else {
+                    out.write(getErrorPage("auth", ERR_AUTH));
+                }
                 writeFooter(out);
                 s.close();
                 return;
@@ -1095,61 +1105,6 @@ public class I2PTunnelHTTPClient extends I2PTunnelHTTPClientBase implements Runn
         return Base32.encode(_dest.calculateHash().getData()) + ".b32.i2p";
     }
 
-    /**
-     *  foo => errordir/foo-header_xx.ht for lang xx, or errordir/foo-header.ht,
-     *  or the backup byte array on fail.
-     *
-     *  .ht files must be UTF-8 encoded and use \r\n terminators so the
-     *  HTTP headers are conformant.
-     *  We can't use FileUtil.readFile() because it strips \r
-     *
-     *  @return non-null
-     */
-    private byte[] getErrorPage(String base, byte[] backup) {
-        return getErrorPage(_context, base, backup);
-    }
-
-    private static byte[] getErrorPage(I2PAppContext ctx, String base, byte[] backup) {
-        File errorDir = new File(ctx.getBaseDir(), "docs");
-        String lang = ctx.getProperty("routerconsole.lang", Locale.getDefault().getLanguage());
-        if(lang != null && lang.length() > 0 && !lang.equals("en")) {
-            File file = new File(errorDir, base + "-header_" + lang + ".ht");
-            try {
-                return readFile(file);
-            } catch(IOException ioe) {
-                // try the english version now
-            }
-        }
-        File file = new File(errorDir, base + "-header.ht");
-        try {
-            return readFile(file);
-        } catch(IOException ioe) {
-            return backup;
-        }
-    }
-
-    private static byte[] readFile(File file) throws IOException {
-        FileInputStream fis = null;
-        byte[] buf = new byte[512];
-        ByteArrayOutputStream baos = new ByteArrayOutputStream(2048);
-        try {
-            int len = 0;
-            fis = new FileInputStream(file);
-            while((len = fis.read(buf)) > 0) {
-                baos.write(buf, 0, len);
-            }
-            return baos.toByteArray();
-        } finally {
-            try {
-                if(fis != null) {
-                    fis.close();
-                }
-            } catch(IOException foo) {
-            }
-        }
-    // we won't ever get here
-    }
-
     /**
      *  Public only for LocalHTTPServer, not for general use
      */
@@ -1163,12 +1118,12 @@ public class I2PTunnelHTTPClient extends I2PTunnelHTTPClientBase implements Runn
 
     private static class OnTimeout implements Runnable {
 
-        private Socket _socket;
-        private OutputStream _out;
-        private String _target;
-        private boolean _usingProxy;
-        private String _wwwProxy;
-        private long _requestId;
+        private final Socket _socket;
+        private final OutputStream _out;
+        private final String _target;
+        private final boolean _usingProxy;
+        private final String _wwwProxy;
+        private final long _requestId;
 
         public OnTimeout(Socket s, OutputStream out, String target, boolean usingProxy, String wwwProxy, long id) {
             _socket = s;
diff --git a/apps/i2ptunnel/java/src/net/i2p/i2ptunnel/I2PTunnelHTTPClientBase.java b/apps/i2ptunnel/java/src/net/i2p/i2ptunnel/I2PTunnelHTTPClientBase.java
index f14de68b4b..191a68adba 100644
--- a/apps/i2ptunnel/java/src/net/i2p/i2ptunnel/I2PTunnelHTTPClientBase.java
+++ b/apps/i2ptunnel/java/src/net/i2p/i2ptunnel/I2PTunnelHTTPClientBase.java
@@ -3,6 +3,9 @@
  */
 package net.i2p.i2ptunnel;
 
+import java.io.ByteArrayOutputStream;
+import java.io.FileInputStream;
+import java.io.IOException;
 import java.io.UnsupportedEncodingException;
 import java.net.Socket;
 import java.util.ArrayList;
@@ -13,9 +16,11 @@ import java.util.Locale;
 import net.i2p.I2PAppContext;
 import net.i2p.client.streaming.I2PSocketManager;
 import net.i2p.data.Base64;
+import net.i2p.data.DataHelper;
 import net.i2p.util.EventDispatcher;
 import net.i2p.util.InternalSocket;
 import net.i2p.util.Log;
+import net.i2p.util.PasswordManager;
 
 /**
  * Common things for HTTPClient and ConnectClient
@@ -25,6 +30,12 @@ import net.i2p.util.Log;
  */
 public abstract class I2PTunnelHTTPClientBase extends I2PTunnelClientBase implements Runnable {
 
+    private static final int PROXYNONCE_BYTES = 8;
+    private static final int MD5_BYTES = 16;
+    /** 24 */
+    private static final int NONCE_BYTES = DataHelper.DATE_LENGTH + MD5_BYTES;
+    private static final long MAX_NONCE_AGE = 30*24*60*60*1000L;
+
     protected final List<String> _proxyList;
 
     protected final static byte[] ERR_NO_OUTPROXY =
@@ -40,7 +51,7 @@ public abstract class I2PTunnelHTTPClientBase extends I2PTunnelClientBase implem
     /** used to assign unique IDs to the threads / clients.  no logic or functionality */
     protected static volatile long __clientId = 0;
 
-    protected static final File _errorDir = new File(I2PAppContext.getGlobalContext().getBaseDir(), "docs");
+    private final byte[] _proxyNonce;
 
     protected String getPrefix(long requestId) { return "Client[" + _clientId + "/" + requestId + "]: "; }
     
@@ -63,6 +74,8 @@ public abstract class I2PTunnelHTTPClientBase extends I2PTunnelClientBase implem
                                I2PTunnel tunnel) throws IllegalArgumentException {
         super(localPort, ownDest, l, notifyThis, handlerName, tunnel);
         _proxyList = new ArrayList(4);
+        _proxyNonce = new byte[PROXYNONCE_BYTES];
+        _context.random().nextBytes(_proxyNonce);
     }
 
     /**
@@ -76,6 +89,8 @@ public abstract class I2PTunnelHTTPClientBase extends I2PTunnelClientBase implem
             throws IllegalArgumentException {
         super(localPort, l, sktMgr, tunnel, notifyThis, clientId);
         _proxyList = new ArrayList(4);
+        _proxyNonce = new byte[PROXYNONCE_BYTES];
+        _context.random().nextBytes(_proxyNonce);
     }
 
     /** all auth @since 0.8.2 */
@@ -91,22 +106,48 @@ public abstract class I2PTunnelHTTPClientBase extends I2PTunnelClientBase implem
     public static final String PROP_OUTPROXY_USER_PREFIX = PROP_OUTPROXY_USER + '.';
     public static final String PROP_OUTPROXY_PW_PREFIX = PROP_OUTPROXY_PW + '.';
 
+    protected abstract String getRealm();
+
     /**
-     *  @param authorization may be null
+     *  @since 0.9.4
+     */
+    protected boolean isDigestAuthRequired() {
+        String authRequired = getTunnel().getClientOptions().getProperty(PROP_AUTH);
+        if (authRequired == null)
+            return true;
+        return authRequired.toLowerCase(Locale.US).equals("digest");
+    }
+
+    /**
+     *  Authorization
+     *  Ref: RFC 2617
+     *  If the socket is an InternalSocket, no auth required.
+     *
+     *  @param authorization may be null, the full auth line e.g. "Basic lskjlksjf"
      *  @return success
      */
     protected boolean authorize(Socket s, long requestId, String authorization) {
-        // Authorization
-        // Ref: RFC 2617
-        // If the socket is an InternalSocket, no auth required.
         String authRequired = getTunnel().getClientOptions().getProperty(PROP_AUTH);
-        if (Boolean.parseBoolean(authRequired) ||
-            (authRequired != null && "basic".equals(authRequired.toLowerCase(Locale.US)))) {
-            if (s instanceof InternalSocket) {
-                if (_log.shouldLog(Log.INFO))
-                    _log.info(getPrefix(requestId) + "Internal access, no auth required");
-                return true;
-            } else if (authorization != null) {
+        if (authRequired == null)
+            return true;
+        authRequired = authRequired.toLowerCase(Locale.US);
+        if (authRequired.equals("false"))
+            return true;
+        if (s instanceof InternalSocket) {
+            if (_log.shouldLog(Log.INFO))
+                _log.info(getPrefix(requestId) + "Internal access, no auth required");
+            return true;
+        }
+        if (authorization == null)
+            return false;
+        if (_log.shouldLog(Log.INFO))
+            _log.info(getPrefix(requestId) + "Auth: " + authorization);
+        String authLC = authorization.toLowerCase(Locale.US);
+        if (authRequired.equals("true") || authRequired.equals("basic")) {
+            if (!authLC.startsWith("basic "))
+                return false;
+            authorization = authorization.substring(6);
+
                 // hmm safeDecode(foo, true) to use standard alphabet is private in Base64
                 byte[] decoded = Base64.decode(authorization.replace("/", "~").replace("+", "="));
                 if (decoded != null) {
@@ -148,10 +189,136 @@ public abstract class I2PTunnelHTTPClientBase extends I2PTunnelClientBase implem
                     if (_log.shouldLog(Log.WARN))
                         _log.warn(getPrefix(requestId) + "Bad auth B64: " + authorization);
                 }
-            }
+
             return false;
+        } else if (authRequired.equals("digest")) {
+            if (!authLC.startsWith("digest "))
+                return false;
+            authorization = authorization.substring(7);
+            _log.error("Digest unimplemented");
+            return true;
         } else {
+            _log.error("Unknown proxy authorization type configured: " + authRequired);
             return true;
         }
     }
+
+    /**
+     *  The Base 64 of 24 bytes: (now, md5 of (now, proxy nonce))
+     *  @since 0.9.4
+     */
+    private String getNonce() {
+        byte[] b = new byte[DataHelper.DATE_LENGTH + PROXYNONCE_BYTES];
+        byte[] n = new byte[NONCE_BYTES];
+        long now = _context.clock().now();
+        DataHelper.toLong(b, 0, DataHelper.DATE_LENGTH, now);
+        System.arraycopy(_proxyNonce, 0, b, DataHelper.DATE_LENGTH, PROXYNONCE_BYTES);
+        System.arraycopy(b, 0, n, 0, DataHelper.DATE_LENGTH);
+        byte[] md5 = PasswordManager.md5Sum(b);
+        System.arraycopy(md5, 0, n, DataHelper.DATE_LENGTH, MD5_BYTES);
+        return Base64.encode(n);
+    }
+
+    enum AuthResult {AUTH_BAD, AUTH_STALE, AUTH_GOOD}
+
+    /**
+     *  Verify the Base 64 of 24 bytes: (now, md5 of (now, proxy nonce))
+     *  @since 0.9.4
+     */
+    private AuthResult verifyNonce(String b64) {
+        byte[] n = Base64.decode(b64);
+        if (n == null || n.length != NONCE_BYTES)
+            return AuthResult.AUTH_BAD;
+        long now = _context.clock().now();
+        long stamp = DataHelper.fromLong(n, 0, DataHelper.DATE_LENGTH);
+        if (now - stamp > MAX_NONCE_AGE)
+            return AuthResult.AUTH_STALE;
+        byte[] b = new byte[DataHelper.DATE_LENGTH + PROXYNONCE_BYTES];
+        System.arraycopy(n, 0, b, 0, DataHelper.DATE_LENGTH);
+        System.arraycopy(_proxyNonce, 0, b, DataHelper.DATE_LENGTH, PROXYNONCE_BYTES);
+        byte[] md5 = PasswordManager.md5Sum(b);
+        if (!DataHelper.eq(md5, 0, n, DataHelper.DATE_LENGTH, MD5_BYTES))
+            return AuthResult.AUTH_BAD;
+        return AuthResult.AUTH_GOOD;
+    }
+
+    protected String getDigestHeader(boolean isStale) {
+        return
+            "Proxy-Authenticate: Digest realm=\"" + getRealm() + "\"" +
+            " nonce=\"" + getNonce() + "\"" +
+            " algorithm=MD5" +
+            " qop=\"auth\"" +
+            (isStale ? " stale=true" : "") +
+            "\r\n";
+    }
+
+    /**
+     *  foo => errordir/foo-header_xx.ht for lang xx, or errordir/foo-header.ht,
+     *  or the backup byte array on fail.
+     *
+     *  .ht files must be UTF-8 encoded and use \r\n terminators so the
+     *  HTTP headers are conformant.
+     *  We can't use FileUtil.readFile() because it strips \r
+     *
+     *  @return non-null
+     *  @since 0.9.4 moved from I2PTunnelHTTPClient
+     */
+    protected byte[] getErrorPage(String base, byte[] backup) {
+        return getErrorPage(_context, base, backup);
+    }
+
+    /**
+     *  foo => errordir/foo-header_xx.ht for lang xx, or errordir/foo-header.ht,
+     *  or the backup byte array on fail.
+     *
+     *  .ht files must be UTF-8 encoded and use \r\n terminators so the
+     *  HTTP headers are conformant.
+     *  We can't use FileUtil.readFile() because it strips \r
+     *
+     *  @return non-null
+     *  @since 0.9.4 moved from I2PTunnelHTTPClient
+     */
+    protected static byte[] getErrorPage(I2PAppContext ctx, String base, byte[] backup) {
+        File errorDir = new File(ctx.getBaseDir(), "docs");
+        String lang = ctx.getProperty("routerconsole.lang", Locale.getDefault().getLanguage());
+        if(lang != null && lang.length() > 0 && !lang.equals("en")) {
+            File file = new File(errorDir, base + "-header_" + lang + ".ht");
+            try {
+                return readFile(file);
+            } catch(IOException ioe) {
+                // try the english version now
+            }
+        }
+        File file = new File(errorDir, base + "-header.ht");
+        try {
+            return readFile(file);
+        } catch(IOException ioe) {
+            return backup;
+        }
+    }
+
+    /**
+     *  @since 0.9.4 moved from I2PTunnelHTTPClient
+     */
+    private static byte[] readFile(File file) throws IOException {
+        FileInputStream fis = null;
+        byte[] buf = new byte[2048];
+        ByteArrayOutputStream baos = new ByteArrayOutputStream(2048);
+        try {
+            int len = 0;
+            fis = new FileInputStream(file);
+            while((len = fis.read(buf)) > 0) {
+                baos.write(buf, 0, len);
+            }
+            return baos.toByteArray();
+        } finally {
+            try {
+                if(fis != null) {
+                    fis.close();
+                }
+            } catch(IOException foo) {
+            }
+        }
+        // we won't ever get here
+    }
 }
-- 
GitLab