protocol.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398
  1. package shadowsocks
  2. import (
  3. "bytes"
  4. "crypto/rand"
  5. "io"
  6. "v2ray.com/core/common/buf"
  7. "v2ray.com/core/common/crypto"
  8. "v2ray.com/core/common/errors"
  9. v2io "v2ray.com/core/common/io"
  10. v2net "v2ray.com/core/common/net"
  11. "v2ray.com/core/common/protocol"
  12. "v2ray.com/core/common/serial"
  13. )
  14. const (
  15. Version = 1
  16. RequestOptionOneTimeAuth = protocol.RequestOption(101)
  17. AddrTypeIPv4 = 1
  18. AddrTypeIPv6 = 4
  19. AddrTypeDomain = 3
  20. )
  21. func ReadTCPSession(user *protocol.User, reader io.Reader) (*protocol.RequestHeader, v2io.Reader, error) {
  22. rawAccount, err := user.GetTypedAccount()
  23. if err != nil {
  24. return nil, nil, errors.Base(err).Message("Shadowsocks|TCP: Failed to parse account.")
  25. }
  26. account := rawAccount.(*ShadowsocksAccount)
  27. buffer := buf.NewLocal(512)
  28. defer buffer.Release()
  29. ivLen := account.Cipher.IVSize()
  30. err = buffer.AppendSupplier(buf.ReadFullFrom(reader, ivLen))
  31. if err != nil {
  32. return nil, nil, errors.Base(err).Message("Shadowsocks|TCP: Failed to read IV.")
  33. }
  34. iv := append([]byte(nil), buffer.BytesTo(ivLen)...)
  35. stream, err := account.Cipher.NewDecodingStream(account.Key, iv)
  36. if err != nil {
  37. return nil, nil, errors.Base(err).Message("Shadowsocks|TCP: Failed to initialize decoding stream.")
  38. }
  39. reader = crypto.NewCryptionReader(stream, reader)
  40. authenticator := NewAuthenticator(HeaderKeyGenerator(account.Key, iv))
  41. request := &protocol.RequestHeader{
  42. Version: Version,
  43. User: user,
  44. Command: protocol.RequestCommandTCP,
  45. }
  46. buffer.Clear()
  47. err = buffer.AppendSupplier(buf.ReadFullFrom(reader, 1))
  48. if err != nil {
  49. return nil, nil, errors.Base(err).Message("Shadowsocks|TCP: Failed to read address type.")
  50. }
  51. addrType := (buffer.Byte(0) & 0x0F)
  52. if (buffer.Byte(0) & 0x10) == 0x10 {
  53. request.Option |= RequestOptionOneTimeAuth
  54. }
  55. if request.Option.Has(RequestOptionOneTimeAuth) && account.OneTimeAuth == Account_Disabled {
  56. return nil, nil, errors.New("Shadowsocks|TCP: Rejecting connection with OTA enabled, while server disables OTA.")
  57. }
  58. if !request.Option.Has(RequestOptionOneTimeAuth) && account.OneTimeAuth == Account_Enabled {
  59. return nil, nil, errors.New("Shadowsocks|TCP: Rejecting connection with OTA disabled, while server enables OTA.")
  60. }
  61. switch addrType {
  62. case AddrTypeIPv4:
  63. err := buffer.AppendSupplier(buf.ReadFullFrom(reader, 4))
  64. if err != nil {
  65. return nil, nil, errors.Base(err).Message("Shadowsocks|TCP: Failed to read IPv4 address.")
  66. }
  67. request.Address = v2net.IPAddress(buffer.BytesFrom(-4))
  68. case AddrTypeIPv6:
  69. err := buffer.AppendSupplier(buf.ReadFullFrom(reader, 16))
  70. if err != nil {
  71. return nil, nil, errors.Base(err).Message("Shadowsocks|TCP: Failed to read IPv6 address.")
  72. }
  73. request.Address = v2net.IPAddress(buffer.BytesFrom(-16))
  74. case AddrTypeDomain:
  75. err := buffer.AppendSupplier(buf.ReadFullFrom(reader, 1))
  76. if err != nil {
  77. return nil, nil, errors.Base(err).Message("Shadowsocks|TCP: Failed to read domain lenth.")
  78. }
  79. domainLength := int(buffer.BytesFrom(-1)[0])
  80. err = buffer.AppendSupplier(buf.ReadFullFrom(reader, domainLength))
  81. if err != nil {
  82. return nil, nil, errors.Base(err).Message("Shadowsocks|TCP: Failed to read domain.")
  83. }
  84. request.Address = v2net.DomainAddress(string(buffer.BytesFrom(-domainLength)))
  85. default:
  86. return nil, nil, errors.New("Shadowsocks|TCP: Unknown address type: ", addrType)
  87. }
  88. err = buffer.AppendSupplier(buf.ReadFullFrom(reader, 2))
  89. if err != nil {
  90. return nil, nil, errors.Base(err).Message("Shadowsocks|TCP: Failed to read port.")
  91. }
  92. request.Port = v2net.PortFromBytes(buffer.BytesFrom(-2))
  93. if request.Option.Has(RequestOptionOneTimeAuth) {
  94. actualAuth := make([]byte, AuthSize)
  95. authenticator.Authenticate(buffer.Bytes())(actualAuth)
  96. err := buffer.AppendSupplier(buf.ReadFullFrom(reader, AuthSize))
  97. if err != nil {
  98. return nil, nil, errors.Base(err).Message("Shadowsocks|TCP: Failed to read OTA.")
  99. }
  100. if !bytes.Equal(actualAuth, buffer.BytesFrom(-AuthSize)) {
  101. return nil, nil, errors.New("Shadowsocks|TCP: Invalid OTA")
  102. }
  103. }
  104. var chunkReader v2io.Reader
  105. if request.Option.Has(RequestOptionOneTimeAuth) {
  106. chunkReader = NewChunkReader(reader, NewAuthenticator(ChunkKeyGenerator(iv)))
  107. } else {
  108. chunkReader = v2io.NewAdaptiveReader(reader)
  109. }
  110. return request, chunkReader, nil
  111. }
  112. func WriteTCPRequest(request *protocol.RequestHeader, writer io.Writer) (v2io.Writer, error) {
  113. user := request.User
  114. rawAccount, err := user.GetTypedAccount()
  115. if err != nil {
  116. return nil, errors.Base(err).Message("Shadowsocks|TCP: Failed to parse account.")
  117. }
  118. account := rawAccount.(*ShadowsocksAccount)
  119. iv := make([]byte, account.Cipher.IVSize())
  120. rand.Read(iv)
  121. _, err = writer.Write(iv)
  122. if err != nil {
  123. return nil, errors.Base(err).Message("Shadowsocks|TCP: Failed to write IV.")
  124. }
  125. stream, err := account.Cipher.NewEncodingStream(account.Key, iv)
  126. if err != nil {
  127. return nil, errors.Base(err).Message("Shadowsocks|TCP: Failed to create encoding stream.")
  128. }
  129. writer = crypto.NewCryptionWriter(stream, writer)
  130. header := buf.NewLocal(512)
  131. switch request.Address.Family() {
  132. case v2net.AddressFamilyIPv4:
  133. header.AppendBytes(AddrTypeIPv4)
  134. header.Append([]byte(request.Address.IP()))
  135. case v2net.AddressFamilyIPv6:
  136. header.AppendBytes(AddrTypeIPv6)
  137. header.Append([]byte(request.Address.IP()))
  138. case v2net.AddressFamilyDomain:
  139. header.AppendBytes(AddrTypeDomain, byte(len(request.Address.Domain())))
  140. header.Append([]byte(request.Address.Domain()))
  141. default:
  142. return nil, errors.New("Shadowsocks|TCP: Unsupported address type: ", request.Address.Family())
  143. }
  144. header.AppendSupplier(serial.WriteUint16(uint16(request.Port)))
  145. if request.Option.Has(RequestOptionOneTimeAuth) {
  146. header.SetByte(0, header.Byte(0)|0x10)
  147. authenticator := NewAuthenticator(HeaderKeyGenerator(account.Key, iv))
  148. header.AppendSupplier(authenticator.Authenticate(header.Bytes()))
  149. }
  150. _, err = writer.Write(header.Bytes())
  151. if err != nil {
  152. return nil, errors.Base(err).Message("Shadowsocks|TCP: Failed to write header.")
  153. }
  154. var chunkWriter v2io.Writer
  155. if request.Option.Has(RequestOptionOneTimeAuth) {
  156. chunkWriter = NewChunkWriter(writer, NewAuthenticator(ChunkKeyGenerator(iv)))
  157. } else {
  158. chunkWriter = v2io.NewAdaptiveWriter(writer)
  159. }
  160. return chunkWriter, nil
  161. }
  162. func ReadTCPResponse(user *protocol.User, reader io.Reader) (v2io.Reader, error) {
  163. rawAccount, err := user.GetTypedAccount()
  164. if err != nil {
  165. return nil, errors.Base(err).Message("Shadowsocks|TCP: Failed to parse account.")
  166. }
  167. account := rawAccount.(*ShadowsocksAccount)
  168. iv := make([]byte, account.Cipher.IVSize())
  169. _, err = io.ReadFull(reader, iv)
  170. if err != nil {
  171. return nil, errors.Base(err).Message("Shadowsocks|TCP: Failed to read IV.")
  172. }
  173. stream, err := account.Cipher.NewDecodingStream(account.Key, iv)
  174. if err != nil {
  175. return nil, errors.Base(err).Message("Shadowsocks|TCP: Failed to initialize decoding stream.")
  176. }
  177. return v2io.NewAdaptiveReader(crypto.NewCryptionReader(stream, reader)), nil
  178. }
  179. func WriteTCPResponse(request *protocol.RequestHeader, writer io.Writer) (v2io.Writer, error) {
  180. user := request.User
  181. rawAccount, err := user.GetTypedAccount()
  182. if err != nil {
  183. return nil, errors.Base(err).Message("Shadowsocks|TCP: Failed to parse account.")
  184. }
  185. account := rawAccount.(*ShadowsocksAccount)
  186. iv := make([]byte, account.Cipher.IVSize())
  187. rand.Read(iv)
  188. _, err = writer.Write(iv)
  189. if err != nil {
  190. return nil, errors.Base(err).Message("Shadowsocks|TCP: Failed to write IV.")
  191. }
  192. stream, err := account.Cipher.NewEncodingStream(account.Key, iv)
  193. if err != nil {
  194. return nil, errors.Base(err).Message("Shadowsocks|TCP: Failed to create encoding stream.")
  195. }
  196. return v2io.NewAdaptiveWriter(crypto.NewCryptionWriter(stream, writer)), nil
  197. }
  198. func EncodeUDPPacket(request *protocol.RequestHeader, payload *buf.Buffer) (*buf.Buffer, error) {
  199. user := request.User
  200. rawAccount, err := user.GetTypedAccount()
  201. if err != nil {
  202. return nil, errors.Base(err).Message("Shadowsocks|UDP: Failed to parse account.")
  203. }
  204. account := rawAccount.(*ShadowsocksAccount)
  205. buffer := buf.NewSmall()
  206. ivLen := account.Cipher.IVSize()
  207. buffer.AppendSupplier(buf.ReadFullFrom(rand.Reader, ivLen))
  208. iv := buffer.Bytes()
  209. switch request.Address.Family() {
  210. case v2net.AddressFamilyIPv4:
  211. buffer.AppendBytes(AddrTypeIPv4)
  212. buffer.Append([]byte(request.Address.IP()))
  213. case v2net.AddressFamilyIPv6:
  214. buffer.AppendBytes(AddrTypeIPv6)
  215. buffer.Append([]byte(request.Address.IP()))
  216. case v2net.AddressFamilyDomain:
  217. buffer.AppendBytes(AddrTypeDomain, byte(len(request.Address.Domain())))
  218. buffer.Append([]byte(request.Address.Domain()))
  219. default:
  220. return nil, errors.New("Shadowsocks|UDP: Unsupported address type: ", request.Address.Family())
  221. }
  222. buffer.AppendSupplier(serial.WriteUint16(uint16(request.Port)))
  223. buffer.Append(payload.Bytes())
  224. if request.Option.Has(RequestOptionOneTimeAuth) {
  225. authenticator := NewAuthenticator(HeaderKeyGenerator(account.Key, iv))
  226. buffer.SetByte(ivLen, buffer.Byte(ivLen)|0x10)
  227. buffer.AppendSupplier(authenticator.Authenticate(buffer.BytesFrom(ivLen)))
  228. }
  229. stream, err := account.Cipher.NewEncodingStream(account.Key, iv)
  230. if err != nil {
  231. return nil, errors.Base(err).Message("Shadowsocks|TCP: Failed to create encoding stream.")
  232. }
  233. stream.XORKeyStream(buffer.BytesFrom(ivLen), buffer.BytesFrom(ivLen))
  234. return buffer, nil
  235. }
  236. func DecodeUDPPacket(user *protocol.User, payload *buf.Buffer) (*protocol.RequestHeader, *buf.Buffer, error) {
  237. rawAccount, err := user.GetTypedAccount()
  238. if err != nil {
  239. return nil, nil, errors.Base(err).Message("Shadowsocks|UDP: Failed to parse account.")
  240. }
  241. account := rawAccount.(*ShadowsocksAccount)
  242. ivLen := account.Cipher.IVSize()
  243. iv := payload.BytesTo(ivLen)
  244. payload.SliceFrom(ivLen)
  245. stream, err := account.Cipher.NewDecodingStream(account.Key, iv)
  246. if err != nil {
  247. return nil, nil, errors.Base(err).Message("Shadowsocks|UDP: Failed to initialize decoding stream.")
  248. }
  249. stream.XORKeyStream(payload.Bytes(), payload.Bytes())
  250. authenticator := NewAuthenticator(HeaderKeyGenerator(account.Key, iv))
  251. request := &protocol.RequestHeader{
  252. Version: Version,
  253. User: user,
  254. Command: protocol.RequestCommandUDP,
  255. }
  256. addrType := (payload.Byte(0) & 0x0F)
  257. if (payload.Byte(0) & 0x10) == 0x10 {
  258. request.Option |= RequestOptionOneTimeAuth
  259. }
  260. if request.Option.Has(RequestOptionOneTimeAuth) && account.OneTimeAuth == Account_Disabled {
  261. return nil, nil, errors.New("Shadowsocks|UDP: Rejecting packet with OTA enabled, while server disables OTA.")
  262. }
  263. if !request.Option.Has(RequestOptionOneTimeAuth) && account.OneTimeAuth == Account_Enabled {
  264. return nil, nil, errors.New("Shadowsocks|UDP: Rejecting packet with OTA disabled, while server enables OTA.")
  265. }
  266. if request.Option.Has(RequestOptionOneTimeAuth) {
  267. payloadLen := payload.Len() - AuthSize
  268. authBytes := payload.BytesFrom(payloadLen)
  269. actualAuth := make([]byte, AuthSize)
  270. authenticator.Authenticate(payload.BytesTo(payloadLen))(actualAuth)
  271. if !bytes.Equal(actualAuth, authBytes) {
  272. return nil, nil, errors.New("Shadowsocks|UDP: Invalid OTA.")
  273. }
  274. payload.Slice(0, payloadLen)
  275. }
  276. payload.SliceFrom(1)
  277. switch addrType {
  278. case AddrTypeIPv4:
  279. request.Address = v2net.IPAddress(payload.BytesTo(4))
  280. payload.SliceFrom(4)
  281. case AddrTypeIPv6:
  282. request.Address = v2net.IPAddress(payload.BytesTo(16))
  283. payload.SliceFrom(16)
  284. case AddrTypeDomain:
  285. domainLength := int(payload.Byte(0))
  286. request.Address = v2net.DomainAddress(string(payload.BytesRange(1, 1+domainLength)))
  287. payload.SliceFrom(1 + domainLength)
  288. default:
  289. return nil, nil, errors.New("Shadowsocks|UDP: Unknown address type: ", addrType)
  290. }
  291. request.Port = v2net.PortFromBytes(payload.BytesTo(2))
  292. payload.SliceFrom(2)
  293. return request, payload, nil
  294. }
  295. type UDPReader struct {
  296. Reader io.Reader
  297. User *protocol.User
  298. }
  299. func (v *UDPReader) Read() (*buf.Buffer, error) {
  300. buffer := buf.NewSmall()
  301. err := buffer.AppendSupplier(buf.ReadFrom(v.Reader))
  302. if err != nil {
  303. buffer.Release()
  304. return nil, err
  305. }
  306. _, payload, err := DecodeUDPPacket(v.User, buffer)
  307. if err != nil {
  308. buffer.Release()
  309. return nil, err
  310. }
  311. return payload, nil
  312. }
  313. func (v *UDPReader) Release() {
  314. }
  315. type UDPWriter struct {
  316. Writer io.Writer
  317. Request *protocol.RequestHeader
  318. }
  319. func (v *UDPWriter) Write(buffer *buf.Buffer) error {
  320. payload, err := EncodeUDPPacket(v.Request, buffer)
  321. if err != nil {
  322. return err
  323. }
  324. _, err = v.Writer.Write(payload.Bytes())
  325. payload.Release()
  326. return err
  327. }
  328. func (v *UDPWriter) Release() {
  329. }