outbound.go 5.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186
  1. package outbound
  2. import (
  3. "crypto/md5"
  4. "crypto/rand"
  5. "net"
  6. "sync"
  7. "github.com/v2ray/v2ray-core/common/alloc"
  8. v2crypto "github.com/v2ray/v2ray-core/common/crypto"
  9. "github.com/v2ray/v2ray-core/common/log"
  10. v2net "github.com/v2ray/v2ray-core/common/net"
  11. "github.com/v2ray/v2ray-core/proxy/common/connhandler"
  12. "github.com/v2ray/v2ray-core/proxy/vmess/config"
  13. "github.com/v2ray/v2ray-core/proxy/vmess/protocol"
  14. "github.com/v2ray/v2ray-core/proxy/vmess/protocol/user"
  15. "github.com/v2ray/v2ray-core/transport/ray"
  16. )
  17. type VMessOutboundHandler struct {
  18. receiverManager *ReceiverManager
  19. }
  20. func (this *VMessOutboundHandler) Dispatch(firstPacket v2net.Packet, ray ray.OutboundRay) error {
  21. vNextAddress, vNextUser := this.receiverManager.PickReceiver()
  22. command := protocol.CmdTCP
  23. if firstPacket.Destination().IsUDP() {
  24. command = protocol.CmdUDP
  25. }
  26. request := &protocol.VMessRequest{
  27. Version: protocol.Version,
  28. User: vNextUser,
  29. Command: command,
  30. Address: firstPacket.Destination().Address(),
  31. }
  32. buffer := alloc.NewSmallBuffer()
  33. defer buffer.Release()
  34. v2net.ReadAllBytes(rand.Reader, buffer.Value[:36]) // 16 + 16 + 4
  35. request.RequestIV = buffer.Value[:16]
  36. request.RequestKey = buffer.Value[16:32]
  37. request.ResponseHeader = buffer.Value[32:36]
  38. return startCommunicate(request, vNextAddress, ray, firstPacket)
  39. }
  40. func startCommunicate(request *protocol.VMessRequest, dest v2net.Address, ray ray.OutboundRay, firstPacket v2net.Packet) error {
  41. conn, err := net.Dial("tcp", dest.String())
  42. if err != nil {
  43. log.Error("Failed to open %s: %v", dest.String(), err)
  44. if ray != nil {
  45. close(ray.OutboundOutput())
  46. }
  47. return err
  48. }
  49. log.Info("VMessOut: Tunneling request to %s via %s", request.Address.String(), dest.String())
  50. defer conn.Close()
  51. input := ray.OutboundInput()
  52. output := ray.OutboundOutput()
  53. var requestFinish, responseFinish sync.Mutex
  54. requestFinish.Lock()
  55. responseFinish.Lock()
  56. go handleRequest(conn, request, firstPacket, input, &requestFinish)
  57. go handleResponse(conn, request, output, &responseFinish, (request.Command == protocol.CmdUDP))
  58. requestFinish.Lock()
  59. if tcpConn, ok := conn.(*net.TCPConn); ok {
  60. tcpConn.CloseWrite()
  61. }
  62. responseFinish.Lock()
  63. return nil
  64. }
  65. func handleRequest(conn net.Conn, request *protocol.VMessRequest, firstPacket v2net.Packet, input <-chan *alloc.Buffer, finish *sync.Mutex) {
  66. defer finish.Unlock()
  67. aesStream, err := v2crypto.NewAesEncryptionStream(request.RequestKey[:], request.RequestIV[:])
  68. if err != nil {
  69. log.Error("VMessOut: Failed to create AES encryption stream: %v", err)
  70. return
  71. }
  72. encryptRequestWriter := v2crypto.NewCryptionWriter(aesStream, conn)
  73. buffer := alloc.NewBuffer().Clear()
  74. buffer, err = request.ToBytes(user.NewTimeHash(user.HMACHash{}), user.GenerateRandomInt64InRange, buffer)
  75. if err != nil {
  76. log.Error("VMessOut: Failed to serialize VMess request: %v", err)
  77. return
  78. }
  79. // Send first packet of payload together with request, in favor of small requests.
  80. firstChunk := firstPacket.Chunk()
  81. moreChunks := firstPacket.MoreChunks()
  82. if firstChunk == nil && moreChunks {
  83. firstChunk, moreChunks = <-input
  84. }
  85. if firstChunk != nil {
  86. aesStream.XORKeyStream(firstChunk.Value, firstChunk.Value)
  87. buffer.Append(firstChunk.Value)
  88. firstChunk.Release()
  89. _, err = conn.Write(buffer.Value)
  90. buffer.Release()
  91. if err != nil {
  92. log.Error("VMessOut: Failed to write VMess request: %v", err)
  93. return
  94. }
  95. }
  96. if moreChunks {
  97. v2net.ChanToWriter(encryptRequestWriter, input)
  98. }
  99. return
  100. }
  101. func headerMatch(request *protocol.VMessRequest, responseHeader []byte) bool {
  102. return ((request.ResponseHeader[0] ^ request.ResponseHeader[1]) == responseHeader[0]) &&
  103. ((request.ResponseHeader[2] ^ request.ResponseHeader[3]) == responseHeader[1])
  104. }
  105. func handleResponse(conn net.Conn, request *protocol.VMessRequest, output chan<- *alloc.Buffer, finish *sync.Mutex, isUDP bool) {
  106. defer finish.Unlock()
  107. defer close(output)
  108. responseKey := md5.Sum(request.RequestKey[:])
  109. responseIV := md5.Sum(request.RequestIV[:])
  110. aesStream, err := v2crypto.NewAesDecryptionStream(responseKey[:], responseIV[:])
  111. if err != nil {
  112. log.Error("VMessOut: Failed to create AES encryption stream: %v", err)
  113. return
  114. }
  115. decryptResponseReader := v2crypto.NewCryptionReader(aesStream, conn)
  116. buffer, err := v2net.ReadFrom(decryptResponseReader, nil)
  117. if err != nil {
  118. log.Error("VMessOut: Failed to read VMess response (%d bytes): %v", buffer.Len(), err)
  119. return
  120. }
  121. if buffer.Len() < 4 || !headerMatch(request, buffer.Value[:2]) {
  122. log.Warning("VMessOut: unexepcted response header. The connection is probably hijacked.")
  123. return
  124. }
  125. log.Info("VMessOut received %d bytes from %s", buffer.Len()-4, conn.RemoteAddr().String())
  126. responseBegin := 4
  127. if buffer.Value[2] != 0 {
  128. dataLen := int(buffer.Value[3])
  129. if buffer.Len() < dataLen+4 { // Rare case
  130. diffBuffer := make([]byte, dataLen+4-buffer.Len())
  131. v2net.ReadAllBytes(decryptResponseReader, diffBuffer)
  132. buffer.Append(diffBuffer)
  133. }
  134. command := buffer.Value[2]
  135. data := buffer.Value[4 : 4+dataLen]
  136. go handleCommand(command, data)
  137. responseBegin = 4 + dataLen
  138. }
  139. buffer.SliceFrom(responseBegin)
  140. output <- buffer
  141. if !isUDP {
  142. v2net.ReaderToChan(output, decryptResponseReader)
  143. }
  144. return
  145. }
  146. type VMessOutboundHandlerFactory struct {
  147. }
  148. func (this *VMessOutboundHandlerFactory) Create(rawConfig interface{}) (connhandler.OutboundConnectionHandler, error) {
  149. vOutConfig := rawConfig.(config.Outbound)
  150. return &VMessOutboundHandler{
  151. receiverManager: NewReceiverManager(vOutConfig.Receivers()),
  152. }, nil
  153. }
  154. func init() {
  155. connhandler.RegisterOutboundConnectionHandlerFactory("vmess", &VMessOutboundHandlerFactory{})
  156. }