outbound.go 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203
  1. package outbound
  2. import (
  3. "crypto/md5"
  4. "crypto/rand"
  5. "io"
  6. "net"
  7. "sync"
  8. "time"
  9. "github.com/v2ray/v2ray-core/app"
  10. "github.com/v2ray/v2ray-core/common/alloc"
  11. v2crypto "github.com/v2ray/v2ray-core/common/crypto"
  12. v2io "github.com/v2ray/v2ray-core/common/io"
  13. "github.com/v2ray/v2ray-core/common/log"
  14. v2net "github.com/v2ray/v2ray-core/common/net"
  15. "github.com/v2ray/v2ray-core/proxy"
  16. "github.com/v2ray/v2ray-core/proxy/internal"
  17. "github.com/v2ray/v2ray-core/proxy/vmess/protocol"
  18. "github.com/v2ray/v2ray-core/transport/ray"
  19. )
  20. type VMessOutboundHandler struct {
  21. receiverManager *ReceiverManager
  22. space app.Space
  23. }
  24. func (this *VMessOutboundHandler) Dispatch(firstPacket v2net.Packet, ray ray.OutboundRay) error {
  25. vNextAddress, vNextUser := this.receiverManager.PickReceiver()
  26. command := protocol.CmdTCP
  27. if firstPacket.Destination().IsUDP() {
  28. command = protocol.CmdUDP
  29. }
  30. request := &protocol.VMessRequest{
  31. Version: protocol.Version,
  32. User: vNextUser,
  33. Command: command,
  34. Address: firstPacket.Destination().Address(),
  35. Port: firstPacket.Destination().Port(),
  36. }
  37. buffer := alloc.NewSmallBuffer()
  38. defer buffer.Release() // Buffer is released after communication finishes.
  39. io.ReadFull(rand.Reader, buffer.Value[:33]) // 16 + 16 + 1
  40. request.RequestIV = buffer.Value[:16]
  41. request.RequestKey = buffer.Value[16:32]
  42. request.ResponseHeader = buffer.Value[32]
  43. return this.startCommunicate(request, vNextAddress, ray, firstPacket)
  44. }
  45. func (this *VMessOutboundHandler) startCommunicate(request *protocol.VMessRequest, dest v2net.Destination, ray ray.OutboundRay, firstPacket v2net.Packet) error {
  46. var destIp net.IP
  47. if dest.Address().IsIPv4() || dest.Address().IsIPv6() {
  48. destIp = dest.Address().IP()
  49. } else {
  50. ips, err := net.LookupIP(dest.Address().Domain())
  51. if err != nil {
  52. return err
  53. }
  54. destIp = ips[0]
  55. }
  56. conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{
  57. IP: destIp,
  58. Port: int(dest.Port()),
  59. })
  60. if err != nil {
  61. log.Error("Failed to open ", dest, ": ", err)
  62. if ray != nil {
  63. close(ray.OutboundOutput())
  64. }
  65. return err
  66. }
  67. log.Info("VMessOut: Tunneling request to ", request.Address, " via ", dest)
  68. defer conn.Close()
  69. input := ray.OutboundInput()
  70. output := ray.OutboundOutput()
  71. var requestFinish, responseFinish sync.Mutex
  72. requestFinish.Lock()
  73. responseFinish.Lock()
  74. go this.handleRequest(conn, request, firstPacket, input, &requestFinish)
  75. go this.handleResponse(conn, request, dest, output, &responseFinish, (request.Command == protocol.CmdUDP))
  76. requestFinish.Lock()
  77. conn.CloseWrite()
  78. responseFinish.Lock()
  79. return nil
  80. }
  81. func (this *VMessOutboundHandler) handleRequest(conn net.Conn, request *protocol.VMessRequest, firstPacket v2net.Packet, input <-chan *alloc.Buffer, finish *sync.Mutex) {
  82. defer finish.Unlock()
  83. aesStream, err := v2crypto.NewAesEncryptionStream(request.RequestKey[:], request.RequestIV[:])
  84. if err != nil {
  85. log.Error("VMessOut: Failed to create AES encryption stream: ", err)
  86. return
  87. }
  88. encryptRequestWriter := v2crypto.NewCryptionWriter(aesStream, conn)
  89. buffer := alloc.NewBuffer().Clear()
  90. defer buffer.Release()
  91. buffer, err = request.ToBytes(protocol.NewRandomTimestampGenerator(protocol.Timestamp(time.Now().Unix()), 30), buffer)
  92. if err != nil {
  93. log.Error("VMessOut: Failed to serialize VMess request: ", err)
  94. return
  95. }
  96. // Send first packet of payload together with request, in favor of small requests.
  97. firstChunk := firstPacket.Chunk()
  98. moreChunks := firstPacket.MoreChunks()
  99. for firstChunk == nil && moreChunks {
  100. firstChunk, moreChunks = <-input
  101. }
  102. if firstChunk == nil && !moreChunks {
  103. log.Warning("VMessOut: Nothing to send. Existing...")
  104. return
  105. }
  106. aesStream.XORKeyStream(firstChunk.Value, firstChunk.Value)
  107. buffer.Append(firstChunk.Value)
  108. firstChunk.Release()
  109. _, err = conn.Write(buffer.Value)
  110. if err != nil {
  111. log.Error("VMessOut: Failed to write VMess request: ", err)
  112. return
  113. }
  114. if moreChunks {
  115. v2io.ChanToWriter(encryptRequestWriter, input)
  116. }
  117. return
  118. }
  119. func headerMatch(request *protocol.VMessRequest, responseHeader byte) bool {
  120. return request.ResponseHeader == responseHeader
  121. }
  122. func (this *VMessOutboundHandler) handleResponse(conn net.Conn, request *protocol.VMessRequest, dest v2net.Destination, output chan<- *alloc.Buffer, finish *sync.Mutex, isUDP bool) {
  123. defer finish.Unlock()
  124. defer close(output)
  125. responseKey := md5.Sum(request.RequestKey[:])
  126. responseIV := md5.Sum(request.RequestIV[:])
  127. aesStream, err := v2crypto.NewAesDecryptionStream(responseKey[:], responseIV[:])
  128. if err != nil {
  129. log.Error("VMessOut: Failed to create AES encryption stream: ", err)
  130. return
  131. }
  132. decryptResponseReader := v2crypto.NewCryptionReader(aesStream, conn)
  133. buffer, err := v2io.ReadFrom(decryptResponseReader, nil)
  134. if err != nil {
  135. log.Error("VMessOut: Failed to read VMess response (", buffer.Len(), " bytes): ", err)
  136. buffer.Release()
  137. return
  138. }
  139. if buffer.Len() < 4 || !headerMatch(request, buffer.Value[0]) {
  140. log.Warning("VMessOut: unexepcted response header. The connection is probably hijacked.")
  141. return
  142. }
  143. log.Info("VMessOut received ", buffer.Len()-4, " bytes from ", conn.RemoteAddr())
  144. responseBegin := 4
  145. if buffer.Value[2] != 0 {
  146. dataLen := int(buffer.Value[3])
  147. if buffer.Len() < dataLen+4 { // Rare case
  148. diffBuffer := make([]byte, dataLen+4-buffer.Len())
  149. io.ReadFull(decryptResponseReader, diffBuffer)
  150. buffer.Append(diffBuffer)
  151. }
  152. command := buffer.Value[2]
  153. data := buffer.Value[4 : 4+dataLen]
  154. go this.handleCommand(dest, command, data)
  155. responseBegin = 4 + dataLen
  156. }
  157. buffer.SliceFrom(responseBegin)
  158. output <- buffer
  159. if !isUDP {
  160. v2io.RawReaderToChan(output, decryptResponseReader)
  161. }
  162. return
  163. }
  164. func init() {
  165. internal.MustRegisterOutboundHandlerCreator("vmess",
  166. func(space app.Space, rawConfig interface{}) (proxy.OutboundHandler, error) {
  167. vOutConfig := rawConfig.(*Config)
  168. return &VMessOutboundHandler{
  169. space: space,
  170. receiverManager: NewReceiverManager(vOutConfig.Receivers),
  171. }, nil
  172. })
  173. }