|  | @@ -4,12 +4,10 @@ package protocol
 | 
	
		
			
				|  |  |  import (
 | 
	
		
			
				|  |  |  	"crypto/aes"
 | 
	
		
			
				|  |  |  	"crypto/cipher"
 | 
	
		
			
				|  |  | -	"crypto/rand"
 | 
	
		
			
				|  |  |  	"encoding/binary"
 | 
	
		
			
				|  |  |  	"errors"
 | 
	
		
			
				|  |  | -	"fmt"
 | 
	
		
			
				|  |  | +	"hash/fnv"
 | 
	
		
			
				|  |  |  	"io"
 | 
	
		
			
				|  |  | -	mrand "math/rand"
 | 
	
		
			
				|  |  |  	"time"
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  	v2io "github.com/v2ray/v2ray-core/common/io"
 | 
	
	
		
			
				|  | @@ -34,6 +32,7 @@ const (
 | 
	
		
			
				|  |  |  var (
 | 
	
		
			
				|  |  |  	ErrorInvalidUser   = errors.New("Invalid User")
 | 
	
		
			
				|  |  |  	ErrorInvalidVerion = errors.New("Invalid Version")
 | 
	
		
			
				|  |  | +	ErrorInvalidHash   = errors.New("Invalid Hash")
 | 
	
		
			
				|  |  |  )
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  // VMessRequest implements the request message of VMess protocol. It only contains the header of a
 | 
	
	
		
			
				|  | @@ -97,24 +96,11 @@ func (r *VMessRequestReader) Read(reader io.Reader) (*VMessRequest, error) {
 | 
	
		
			
				|  |  |  		return nil, err
 | 
	
		
			
				|  |  |  	}
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -	nBytes, err = decryptor.Read(buffer[0:1])
 | 
	
		
			
				|  |  | -	if err != nil {
 | 
	
		
			
				|  |  | -		return nil, err
 | 
	
		
			
				|  |  | -	}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	randomLength := buffer[0]
 | 
	
		
			
				|  |  | -	if randomLength <= 0 || randomLength > 32 {
 | 
	
		
			
				|  |  | -		return nil, fmt.Errorf("Unexpected random length %d", randomLength)
 | 
	
		
			
				|  |  | -	}
 | 
	
		
			
				|  |  | -	_, err = decryptor.Read(buffer[:randomLength])
 | 
	
		
			
				|  |  | -	if err != nil {
 | 
	
		
			
				|  |  | -		return nil, err
 | 
	
		
			
				|  |  | -	}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	nBytes, err = decryptor.Read(buffer[0:1])
 | 
	
		
			
				|  |  | +	nBytes, err = decryptor.Read(buffer[:41])
 | 
	
		
			
				|  |  |  	if err != nil {
 | 
	
		
			
				|  |  |  		return nil, err
 | 
	
		
			
				|  |  |  	}
 | 
	
		
			
				|  |  | +	bufferLen := nBytes
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  	request := &VMessRequest{
 | 
	
		
			
				|  |  |  		UserId:  *userId,
 | 
	
	
		
			
				|  | @@ -126,68 +112,54 @@ func (r *VMessRequestReader) Read(reader io.Reader) (*VMessRequest, error) {
 | 
	
		
			
				|  |  |  		return nil, ErrorInvalidVerion
 | 
	
		
			
				|  |  |  	}
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -	// TODO: check number of bytes returned
 | 
	
		
			
				|  |  | -	_, err = decryptor.Read(request.RequestIV[:])
 | 
	
		
			
				|  |  | -	if err != nil {
 | 
	
		
			
				|  |  | -		return nil, err
 | 
	
		
			
				|  |  | -	}
 | 
	
		
			
				|  |  | -	_, err = decryptor.Read(request.RequestKey[:])
 | 
	
		
			
				|  |  | -	if err != nil {
 | 
	
		
			
				|  |  | -		return nil, err
 | 
	
		
			
				|  |  | -	}
 | 
	
		
			
				|  |  | -	_, err = decryptor.Read(request.ResponseHeader[:])
 | 
	
		
			
				|  |  | -	if err != nil {
 | 
	
		
			
				|  |  | -		return nil, err
 | 
	
		
			
				|  |  | -	}
 | 
	
		
			
				|  |  | -	_, err = decryptor.Read(buffer[0:1])
 | 
	
		
			
				|  |  | -	if err != nil {
 | 
	
		
			
				|  |  | -		return nil, err
 | 
	
		
			
				|  |  | -	}
 | 
	
		
			
				|  |  | -	request.Command = buffer[0]
 | 
	
		
			
				|  |  | +	copy(request.RequestIV[:], buffer[1:17])       // 16 bytes
 | 
	
		
			
				|  |  | +	copy(request.RequestKey[:], buffer[17:33])     // 16 bytes
 | 
	
		
			
				|  |  | +	copy(request.ResponseHeader[:], buffer[33:37]) // 4 bytes
 | 
	
		
			
				|  |  | +	request.Command = buffer[37]
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -	_, err = decryptor.Read(buffer[0:2])
 | 
	
		
			
				|  |  | -	if err != nil {
 | 
	
		
			
				|  |  | -		return nil, err
 | 
	
		
			
				|  |  | -	}
 | 
	
		
			
				|  |  | -	port := binary.BigEndian.Uint16(buffer[0:2])
 | 
	
		
			
				|  |  | +	port := binary.BigEndian.Uint16(buffer[38:40])
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -	_, err = decryptor.Read(buffer[0:1])
 | 
	
		
			
				|  |  | -	if err != nil {
 | 
	
		
			
				|  |  | -		return nil, err
 | 
	
		
			
				|  |  | -	}
 | 
	
		
			
				|  |  | -	switch buffer[0] {
 | 
	
		
			
				|  |  | +	switch buffer[40] {
 | 
	
		
			
				|  |  |  	case addrTypeIPv4:
 | 
	
		
			
				|  |  | -		_, err = decryptor.Read(buffer[1:5])
 | 
	
		
			
				|  |  | +		_, err = decryptor.Read(buffer[41:45]) // 4 bytes
 | 
	
		
			
				|  |  | +		bufferLen += 4
 | 
	
		
			
				|  |  |  		if err != nil {
 | 
	
		
			
				|  |  |  			return nil, err
 | 
	
		
			
				|  |  |  		}
 | 
	
		
			
				|  |  | -		request.Address = v2net.IPAddress(buffer[1:5], port)
 | 
	
		
			
				|  |  | +		request.Address = v2net.IPAddress(buffer[41:45], port)
 | 
	
		
			
				|  |  |  	case addrTypeIPv6:
 | 
	
		
			
				|  |  | -		_, err = decryptor.Read(buffer[1:17])
 | 
	
		
			
				|  |  | +		_, err = decryptor.Read(buffer[41:57]) // 16 bytes
 | 
	
		
			
				|  |  | +		bufferLen += 16
 | 
	
		
			
				|  |  |  		if err != nil {
 | 
	
		
			
				|  |  |  			return nil, err
 | 
	
		
			
				|  |  |  		}
 | 
	
		
			
				|  |  | -		request.Address = v2net.IPAddress(buffer[1:17], port)
 | 
	
		
			
				|  |  | +		request.Address = v2net.IPAddress(buffer[41:57], port)
 | 
	
		
			
				|  |  |  	case addrTypeDomain:
 | 
	
		
			
				|  |  | -		_, err = decryptor.Read(buffer[1:2])
 | 
	
		
			
				|  |  | +		_, err = decryptor.Read(buffer[41:42])
 | 
	
		
			
				|  |  |  		if err != nil {
 | 
	
		
			
				|  |  |  			return nil, err
 | 
	
		
			
				|  |  |  		}
 | 
	
		
			
				|  |  | -		domainLength := buffer[1]
 | 
	
		
			
				|  |  | -		_, err = decryptor.Read(buffer[2 : 2+domainLength])
 | 
	
		
			
				|  |  | +		domainLength := int(buffer[41])
 | 
	
		
			
				|  |  | +		_, err = decryptor.Read(buffer[42 : 42+domainLength])
 | 
	
		
			
				|  |  |  		if err != nil {
 | 
	
		
			
				|  |  |  			return nil, err
 | 
	
		
			
				|  |  |  		}
 | 
	
		
			
				|  |  | -		request.Address = v2net.DomainAddress(string(buffer[2:2+domainLength]), port)
 | 
	
		
			
				|  |  | +		bufferLen += 1 + domainLength
 | 
	
		
			
				|  |  | +		request.Address = v2net.DomainAddress(string(buffer[42:42+domainLength]), port)
 | 
	
		
			
				|  |  |  	}
 | 
	
		
			
				|  |  | -	_, err = decryptor.Read(buffer[0:1])
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +	_, err = decryptor.Read(buffer[bufferLen : bufferLen+4])
 | 
	
		
			
				|  |  |  	if err != nil {
 | 
	
		
			
				|  |  |  		return nil, err
 | 
	
		
			
				|  |  |  	}
 | 
	
		
			
				|  |  | -	randomLength = buffer[0]
 | 
	
		
			
				|  |  | -	_, err = decryptor.Read(buffer[:randomLength])
 | 
	
		
			
				|  |  | -	if err != nil {
 | 
	
		
			
				|  |  | -		return nil, err
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +	fnv1a := fnv.New32a()
 | 
	
		
			
				|  |  | +	fnv1a.Write(buffer[:bufferLen])
 | 
	
		
			
				|  |  | +	actualHash := fnv1a.Sum32()
 | 
	
		
			
				|  |  | +	expectedHash := binary.BigEndian.Uint32(buffer[bufferLen : bufferLen+4])
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +	if actualHash != expectedHash {
 | 
	
		
			
				|  |  | +		return nil, ErrorInvalidHash
 | 
	
		
			
				|  |  |  	}
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  	return request, nil
 | 
	
	
		
			
				|  | @@ -207,15 +179,6 @@ func (request *VMessRequest) ToBytes(idHash user.CounterHash, randomRangeInt64 u
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  	encryptionBegin := len(buffer)
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -	randomLength := mrand.Intn(32) + 1
 | 
	
		
			
				|  |  | -	randomContent := make([]byte, randomLength)
 | 
	
		
			
				|  |  | -	_, err := rand.Read(randomContent)
 | 
	
		
			
				|  |  | -	if err != nil {
 | 
	
		
			
				|  |  | -		return nil, err
 | 
	
		
			
				|  |  | -	}
 | 
	
		
			
				|  |  | -	buffer = append(buffer, byte(randomLength))
 | 
	
		
			
				|  |  | -	buffer = append(buffer, randomContent...)
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  |  	buffer = append(buffer, request.Version)
 | 
	
		
			
				|  |  |  	buffer = append(buffer, request.RequestIV[:]...)
 | 
	
		
			
				|  |  |  	buffer = append(buffer, request.RequestKey[:]...)
 | 
	
	
		
			
				|  | @@ -236,16 +199,18 @@ func (request *VMessRequest) ToBytes(idHash user.CounterHash, randomRangeInt64 u
 | 
	
		
			
				|  |  |  		buffer = append(buffer, []byte(request.Address.Domain())...)
 | 
	
		
			
				|  |  |  	}
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -	paddingLength := mrand.Intn(32) + 1
 | 
	
		
			
				|  |  | -	paddingBuffer := make([]byte, paddingLength)
 | 
	
		
			
				|  |  | -	_, err = rand.Read(paddingBuffer)
 | 
	
		
			
				|  |  | -	if err != nil {
 | 
	
		
			
				|  |  | -		return nil, err
 | 
	
		
			
				|  |  | -	}
 | 
	
		
			
				|  |  | -	buffer = append(buffer, byte(paddingLength))
 | 
	
		
			
				|  |  | -	buffer = append(buffer, paddingBuffer...)
 | 
	
		
			
				|  |  |  	encryptionEnd := len(buffer)
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | +	fnv1a := fnv.New32a()
 | 
	
		
			
				|  |  | +	fnv1a.Write(buffer[encryptionBegin:encryptionEnd])
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +	fnvHash := fnv1a.Sum32()
 | 
	
		
			
				|  |  | +	buffer = append(buffer, byte(fnvHash>>24))
 | 
	
		
			
				|  |  | +	buffer = append(buffer, byte(fnvHash>>16))
 | 
	
		
			
				|  |  | +	buffer = append(buffer, byte(fnvHash>>8))
 | 
	
		
			
				|  |  | +	buffer = append(buffer, byte(fnvHash))
 | 
	
		
			
				|  |  | +	encryptionEnd += 4
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  |  	aesCipher, err := aes.NewCipher(request.UserId.CmdKey())
 | 
	
		
			
				|  |  |  	if err != nil {
 | 
	
		
			
				|  |  |  		return nil, err
 |