| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227 | 
							- // Package vmess contains protocol definition, io lib for VMess.
 
- package protocol
 
- import (
 
- 	"crypto/md5"
 
- 	"encoding/binary"
 
- 	"hash/fnv"
 
- 	"io"
 
- 	"github.com/v2ray/v2ray-core/common/alloc"
 
- 	v2crypto "github.com/v2ray/v2ray-core/common/crypto"
 
- 	"github.com/v2ray/v2ray-core/common/log"
 
- 	v2net "github.com/v2ray/v2ray-core/common/net"
 
- 	"github.com/v2ray/v2ray-core/proxy"
 
- 	"github.com/v2ray/v2ray-core/proxy/vmess"
 
- 	"github.com/v2ray/v2ray-core/transport"
 
- )
 
- const (
 
- 	addrTypeIPv4   = byte(0x01)
 
- 	addrTypeIPv6   = byte(0x03)
 
- 	addrTypeDomain = byte(0x02)
 
- 	CmdTCP = byte(0x01)
 
- 	CmdUDP = byte(0x02)
 
- 	Version = byte(0x01)
 
- 	blockSize = 16
 
- )
 
- // VMessRequest implements the request message of VMess protocol. It only contains the header of a
 
- // request message. The data part will be handled by conection handler directly, in favor of data
 
- // streaming.
 
- type VMessRequest struct {
 
- 	Version        byte
 
- 	User           *vmess.User
 
- 	RequestIV      []byte
 
- 	RequestKey     []byte
 
- 	ResponseHeader byte
 
- 	Command        byte
 
- 	Address        v2net.Address
 
- 	Port           v2net.Port
 
- }
 
- // Destination is the final destination of this request.
 
- func (this *VMessRequest) Destination() v2net.Destination {
 
- 	if this.Command == CmdTCP {
 
- 		return v2net.TCPDestination(this.Address, this.Port)
 
- 	} else {
 
- 		return v2net.UDPDestination(this.Address, this.Port)
 
- 	}
 
- }
 
- // VMessRequestReader is a parser to read VMessRequest from a byte stream.
 
- type VMessRequestReader struct {
 
- 	vUserSet UserSet
 
- }
 
- // NewVMessRequestReader creates a new VMessRequestReader with a given UserSet
 
- func NewVMessRequestReader(vUserSet UserSet) *VMessRequestReader {
 
- 	return &VMessRequestReader{
 
- 		vUserSet: vUserSet,
 
- 	}
 
- }
 
- // Read reads a VMessRequest from a byte stream.
 
- func (this *VMessRequestReader) Read(reader io.Reader) (*VMessRequest, error) {
 
- 	buffer := alloc.NewSmallBuffer()
 
- 	defer buffer.Release()
 
- 	nBytes, err := io.ReadFull(reader, buffer.Value[:vmess.IDBytesLen])
 
- 	if err != nil {
 
- 		log.Debug("VMess: Failed to read request ID (", nBytes, " bytes): ", err)
 
- 		return nil, err
 
- 	}
 
- 	userObj, timeSec, valid := this.vUserSet.GetUser(buffer.Value[:nBytes])
 
- 	if !valid {
 
- 		return nil, proxy.InvalidAuthentication
 
- 	}
 
- 	timestampHash := TimestampHash()
 
- 	timestampHash.Write(timeSec.HashBytes())
 
- 	iv := timestampHash.Sum(nil)
 
- 	aesStream, err := v2crypto.NewAesDecryptionStream(userObj.ID.CmdKey(), iv)
 
- 	if err != nil {
 
- 		log.Debug("VMess: Failed to create AES stream: ", err)
 
- 		return nil, err
 
- 	}
 
- 	decryptor := v2crypto.NewCryptionReader(aesStream, reader)
 
- 	nBytes, err = io.ReadFull(decryptor, buffer.Value[:41])
 
- 	if err != nil {
 
- 		log.Debug("VMess: Failed to read request header (", nBytes, " bytes): ", err)
 
- 		return nil, err
 
- 	}
 
- 	bufferLen := nBytes
 
- 	request := &VMessRequest{
 
- 		User:    userObj,
 
- 		Version: buffer.Value[0],
 
- 	}
 
- 	if request.Version != Version {
 
- 		log.Warning("VMess: Invalid protocol version ", request.Version)
 
- 		return nil, proxy.InvalidProtocolVersion
 
- 	}
 
- 	request.RequestIV = append([]byte(nil), buffer.Value[1:17]...)   // 16 bytes
 
- 	request.RequestKey = append([]byte(nil), buffer.Value[17:33]...) // 16 bytes
 
- 	request.ResponseHeader = buffer.Value[33]                        // 1 byte + 3 bytes reserved.
 
- 	request.Command = buffer.Value[37]
 
- 	request.Port = v2net.PortFromBytes(buffer.Value[38:40])
 
- 	switch buffer.Value[40] {
 
- 	case addrTypeIPv4:
 
- 		nBytes, err = io.ReadFull(decryptor, buffer.Value[41:45]) // 4 bytes
 
- 		bufferLen += 4
 
- 		if err != nil {
 
- 			log.Debug("VMess: Failed to read target IPv4 (", nBytes, " bytes): ", err)
 
- 			return nil, err
 
- 		}
 
- 		request.Address = v2net.IPAddress(buffer.Value[41:45])
 
- 	case addrTypeIPv6:
 
- 		nBytes, err = io.ReadFull(decryptor, buffer.Value[41:57]) // 16 bytes
 
- 		bufferLen += 16
 
- 		if err != nil {
 
- 			log.Debug("VMess: Failed to read target IPv6 (", nBytes, " bytes): ", nBytes, err)
 
- 			return nil, err
 
- 		}
 
- 		request.Address = v2net.IPAddress(buffer.Value[41:57])
 
- 	case addrTypeDomain:
 
- 		nBytes, err = io.ReadFull(decryptor, buffer.Value[41:42])
 
- 		if err != nil {
 
- 			log.Debug("VMess: Failed to read target domain (", nBytes, " bytes): ", nBytes, err)
 
- 			return nil, err
 
- 		}
 
- 		domainLength := int(buffer.Value[41])
 
- 		if domainLength == 0 {
 
- 			return nil, transport.CorruptedPacket
 
- 		}
 
- 		nBytes, err = io.ReadFull(decryptor, buffer.Value[42:42+domainLength])
 
- 		if err != nil {
 
- 			log.Debug("VMess: Failed to read target domain (", nBytes, " bytes): ", nBytes, err)
 
- 			return nil, err
 
- 		}
 
- 		bufferLen += 1 + domainLength
 
- 		domainBytes := append([]byte(nil), buffer.Value[42:42+domainLength]...)
 
- 		request.Address = v2net.DomainAddress(string(domainBytes))
 
- 	}
 
- 	nBytes, err = io.ReadFull(decryptor, buffer.Value[bufferLen:bufferLen+4])
 
- 	if err != nil {
 
- 		log.Debug("VMess: Failed to read checksum (", nBytes, " bytes): ", nBytes, err)
 
- 		return nil, err
 
- 	}
 
- 	fnv1a := fnv.New32a()
 
- 	fnv1a.Write(buffer.Value[:bufferLen])
 
- 	actualHash := fnv1a.Sum32()
 
- 	expectedHash := binary.BigEndian.Uint32(buffer.Value[bufferLen : bufferLen+4])
 
- 	if actualHash != expectedHash {
 
- 		return nil, transport.CorruptedPacket
 
- 	}
 
- 	return request, nil
 
- }
 
- // ToBytes returns a VMessRequest in the form of byte array.
 
- func (this *VMessRequest) ToBytes(timestampGenerator RandomTimestampGenerator, buffer *alloc.Buffer) (*alloc.Buffer, error) {
 
- 	if buffer == nil {
 
- 		buffer = alloc.NewSmallBuffer().Clear()
 
- 	}
 
- 	timestamp := timestampGenerator.Next()
 
- 	idHash := IDHash(this.User.AnyValidID().Bytes())
 
- 	idHash.Write(timestamp.Bytes())
 
- 	hashStart := buffer.Len()
 
- 	buffer.Slice(0, hashStart+16)
 
- 	idHash.Sum(buffer.Value[hashStart:hashStart])
 
- 	encryptionBegin := buffer.Len()
 
- 	buffer.AppendBytes(this.Version)
 
- 	buffer.Append(this.RequestIV)
 
- 	buffer.Append(this.RequestKey)
 
- 	buffer.AppendBytes(this.ResponseHeader, byte(0), byte(0), byte(0))
 
- 	buffer.AppendBytes(this.Command)
 
- 	buffer.Append(this.Port.Bytes())
 
- 	switch {
 
- 	case this.Address.IsIPv4():
 
- 		buffer.AppendBytes(addrTypeIPv4)
 
- 		buffer.Append(this.Address.IP())
 
- 	case this.Address.IsIPv6():
 
- 		buffer.AppendBytes(addrTypeIPv6)
 
- 		buffer.Append(this.Address.IP())
 
- 	case this.Address.IsDomain():
 
- 		buffer.AppendBytes(addrTypeDomain, byte(len(this.Address.Domain())))
 
- 		buffer.Append([]byte(this.Address.Domain()))
 
- 	}
 
- 	encryptionEnd := buffer.Len()
 
- 	fnv1a := fnv.New32a()
 
- 	fnv1a.Write(buffer.Value[encryptionBegin:encryptionEnd])
 
- 	fnvHash := fnv1a.Sum32()
 
- 	buffer.AppendBytes(byte(fnvHash>>24), byte(fnvHash>>16), byte(fnvHash>>8), byte(fnvHash))
 
- 	encryptionEnd += 4
 
- 	timestampHash := md5.New()
 
- 	timestampHash.Write(timestamp.HashBytes())
 
- 	iv := timestampHash.Sum(nil)
 
- 	aesStream, err := v2crypto.NewAesEncryptionStream(this.User.ID.CmdKey(), iv)
 
- 	if err != nil {
 
- 		return nil, err
 
- 	}
 
- 	aesStream.XORKeyStream(buffer.Value[encryptionBegin:encryptionEnd], buffer.Value[encryptionBegin:encryptionEnd])
 
- 	return buffer, nil
 
- }
 
 
  |