|
|
@@ -12,8 +12,6 @@ import (
|
|
|
"hash"
|
|
|
"hash/fnv"
|
|
|
"io"
|
|
|
- "os"
|
|
|
- vmessaead "v2ray.com/core/proxy/vmess/aead"
|
|
|
|
|
|
"golang.org/x/crypto/chacha20poly1305"
|
|
|
|
|
|
@@ -25,6 +23,7 @@ import (
|
|
|
"v2ray.com/core/common/protocol"
|
|
|
"v2ray.com/core/common/serial"
|
|
|
"v2ray.com/core/proxy/vmess"
|
|
|
+ vmessaead "v2ray.com/core/proxy/vmess/aead"
|
|
|
)
|
|
|
|
|
|
func hashTimestamp(h hash.Hash, t protocol.Timestamp) []byte {
|
|
|
@@ -37,6 +36,7 @@ func hashTimestamp(h hash.Hash, t protocol.Timestamp) []byte {
|
|
|
|
|
|
// ClientSession stores connection session info for VMess client.
|
|
|
type ClientSession struct {
|
|
|
+ isAEAD bool
|
|
|
idHash protocol.IDHash
|
|
|
requestBodyKey [16]byte
|
|
|
requestBodyIV [16]byte
|
|
|
@@ -44,35 +44,23 @@ type ClientSession struct {
|
|
|
responseBodyIV [16]byte
|
|
|
responseReader io.Reader
|
|
|
responseHeader byte
|
|
|
-
|
|
|
- isAEADRequest bool
|
|
|
}
|
|
|
|
|
|
// NewClientSession creates a new ClientSession.
|
|
|
-func NewClientSession(idHash protocol.IDHash, ctx context.Context) *ClientSession {
|
|
|
- randomBytes := make([]byte, 33) // 16 + 16 + 1
|
|
|
- common.Must2(rand.Read(randomBytes))
|
|
|
-
|
|
|
- session := &ClientSession{}
|
|
|
+func NewClientSession(isAEAD bool, idHash protocol.IDHash, ctx context.Context) *ClientSession {
|
|
|
|
|
|
- session.isAEADRequest = false
|
|
|
-
|
|
|
- if ctxValueAlterID := ctx.Value(vmess.AlterID); ctxValueAlterID != nil {
|
|
|
- if ctxValueAlterID == 0 {
|
|
|
- session.isAEADRequest = true
|
|
|
- }
|
|
|
- }
|
|
|
-
|
|
|
- if vmessAeadDisable, vmessAeadDisableFound := os.LookupEnv("V2RAY_VMESS_AEAD_DISABLED"); vmessAeadDisableFound {
|
|
|
- if vmessAeadDisable == "true" {
|
|
|
- session.isAEADRequest = false
|
|
|
- }
|
|
|
+ session := &ClientSession{
|
|
|
+ isAEAD: isAEAD,
|
|
|
+ idHash: idHash,
|
|
|
}
|
|
|
|
|
|
+ randomBytes := make([]byte, 33) // 16 + 16 + 1
|
|
|
+ common.Must2(rand.Read(randomBytes))
|
|
|
copy(session.requestBodyKey[:], randomBytes[:16])
|
|
|
copy(session.requestBodyIV[:], randomBytes[16:32])
|
|
|
session.responseHeader = randomBytes[32]
|
|
|
- if !session.isAEADRequest {
|
|
|
+
|
|
|
+ if !session.isAEAD {
|
|
|
session.responseBodyKey = md5.Sum(session.requestBodyKey[:])
|
|
|
session.responseBodyIV = md5.Sum(session.requestBodyIV[:])
|
|
|
} else {
|
|
|
@@ -82,15 +70,13 @@ func NewClientSession(idHash protocol.IDHash, ctx context.Context) *ClientSessio
|
|
|
copy(session.responseBodyIV[:], BodyIV[:16])
|
|
|
}
|
|
|
|
|
|
- session.idHash = idHash
|
|
|
-
|
|
|
return session
|
|
|
}
|
|
|
|
|
|
func (c *ClientSession) EncodeRequestHeader(header *protocol.RequestHeader, writer io.Writer) error {
|
|
|
timestamp := protocol.NewTimestampGenerator(protocol.NowTime(), 30)()
|
|
|
account := header.User.Account.(*vmess.MemoryAccount)
|
|
|
- if !c.isAEADRequest {
|
|
|
+ if !c.isAEAD {
|
|
|
idHash := c.idHash(account.AnyValidID().Bytes())
|
|
|
common.Must2(serial.WriteUint64(idHash, uint64(timestamp)))
|
|
|
common.Must2(writer.Write(idHash.Sum(nil)))
|
|
|
@@ -126,7 +112,7 @@ func (c *ClientSession) EncodeRequestHeader(header *protocol.RequestHeader, writ
|
|
|
fnv1a.Sum(hashBytes[:0])
|
|
|
}
|
|
|
|
|
|
- if !c.isAEADRequest {
|
|
|
+ if !c.isAEAD {
|
|
|
iv := hashTimestamp(md5.New(), timestamp)
|
|
|
aesStream := crypto.NewAesEncryptionStream(account.ID.CmdKey(), iv[:])
|
|
|
aesStream.XORKeyStream(buffer.Bytes(), buffer.Bytes())
|
|
|
@@ -203,7 +189,7 @@ func (c *ClientSession) EncodeRequestBody(request *protocol.RequestHeader, write
|
|
|
}
|
|
|
|
|
|
func (c *ClientSession) DecodeResponseHeader(reader io.Reader) (*protocol.ResponseHeader, error) {
|
|
|
- if !c.isAEADRequest {
|
|
|
+ if !c.isAEAD {
|
|
|
aesStream := crypto.NewAesDecryptionStream(c.responseBodyKey[:], c.responseBodyIV[:])
|
|
|
c.responseReader = crypto.NewCryptionReader(aesStream, reader)
|
|
|
} else {
|
|
|
@@ -274,7 +260,7 @@ func (c *ClientSession) DecodeResponseHeader(reader io.Reader) (*protocol.Respon
|
|
|
header.Command = command
|
|
|
}
|
|
|
}
|
|
|
- if c.isAEADRequest {
|
|
|
+ if c.isAEAD {
|
|
|
aesStream := crypto.NewAesDecryptionStream(c.responseBodyKey[:], c.responseBodyIV[:])
|
|
|
c.responseReader = crypto.NewCryptionReader(aesStream, reader)
|
|
|
}
|