vmess.go 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250
  1. // Package vmess contains protocol definition, io lib for VMess.
  2. package protocol
  3. import (
  4. "crypto/aes"
  5. "crypto/cipher"
  6. "crypto/rand"
  7. "encoding/binary"
  8. "errors"
  9. "fmt"
  10. "io"
  11. mrand "math/rand"
  12. "time"
  13. v2io "github.com/v2ray/v2ray-core/common/io"
  14. v2net "github.com/v2ray/v2ray-core/common/net"
  15. "github.com/v2ray/v2ray-core/log"
  16. )
  17. const (
  18. addrTypeIPv4 = byte(0x01)
  19. addrTypeIPv6 = byte(0x03)
  20. addrTypeDomain = byte(0x02)
  21. Version = byte(0x01)
  22. blockSize = 16
  23. )
  24. var (
  25. ErrorInvalidUser = errors.New("Invalid User")
  26. ErrorInvalidVerion = errors.New("Invalid Version")
  27. )
  28. // VMessRequest implements the request message of VMess protocol. It only contains
  29. // the header of a request message. The data part will be handled by conection
  30. // handler directly, in favor of data streaming.
  31. type VMessRequest struct {
  32. Version byte
  33. UserId ID
  34. RequestIV [16]byte
  35. RequestKey [16]byte
  36. ResponseHeader [4]byte
  37. Command byte
  38. Address v2net.Address
  39. }
  40. type VMessRequestReader struct {
  41. vUserSet UserSet
  42. }
  43. func NewVMessRequestReader(vUserSet UserSet) *VMessRequestReader {
  44. return &VMessRequestReader{
  45. vUserSet: vUserSet,
  46. }
  47. }
  48. func (r *VMessRequestReader) Read(reader io.Reader) (*VMessRequest, error) {
  49. buffer := make([]byte, 256)
  50. nBytes, err := reader.Read(buffer[:IDBytesLen])
  51. if err != nil {
  52. return nil, err
  53. }
  54. log.Debug("Read user hash: %v", buffer[:nBytes])
  55. userId, timeSec, valid := r.vUserSet.GetUser(buffer[:nBytes])
  56. if !valid {
  57. return nil, ErrorInvalidUser
  58. }
  59. aesCipher, err := aes.NewCipher(userId.CmdKey())
  60. if err != nil {
  61. return nil, err
  62. }
  63. aesStream := cipher.NewCFBDecrypter(aesCipher, Int64Hash(timeSec))
  64. decryptor := v2io.NewCryptionReader(aesStream, reader)
  65. if err != nil {
  66. return nil, err
  67. }
  68. nBytes, err = decryptor.Read(buffer[0:1])
  69. if err != nil {
  70. return nil, err
  71. }
  72. randomLength := buffer[0]
  73. if randomLength <= 0 || randomLength > 32 {
  74. return nil, fmt.Errorf("Unexpected random length %d", randomLength)
  75. }
  76. _, err = decryptor.Read(buffer[:randomLength])
  77. if err != nil {
  78. return nil, err
  79. }
  80. nBytes, err = decryptor.Read(buffer[0:1])
  81. if err != nil {
  82. return nil, err
  83. }
  84. request := &VMessRequest{
  85. UserId: *userId,
  86. Version: buffer[0],
  87. }
  88. if request.Version != Version {
  89. log.Error("Unknown VMess version %d", request.Version)
  90. return nil, ErrorInvalidVerion
  91. }
  92. // TODO: check number of bytes returned
  93. _, err = decryptor.Read(request.RequestIV[:])
  94. if err != nil {
  95. return nil, err
  96. }
  97. _, err = decryptor.Read(request.RequestKey[:])
  98. if err != nil {
  99. return nil, err
  100. }
  101. _, err = decryptor.Read(request.ResponseHeader[:])
  102. if err != nil {
  103. return nil, err
  104. }
  105. _, err = decryptor.Read(buffer[0:1])
  106. if err != nil {
  107. return nil, err
  108. }
  109. request.Command = buffer[0]
  110. _, err = decryptor.Read(buffer[0:2])
  111. if err != nil {
  112. return nil, err
  113. }
  114. port := binary.BigEndian.Uint16(buffer[0:2])
  115. _, err = decryptor.Read(buffer[0:1])
  116. if err != nil {
  117. return nil, err
  118. }
  119. switch buffer[0] {
  120. case addrTypeIPv4:
  121. _, err = decryptor.Read(buffer[1:5])
  122. if err != nil {
  123. return nil, err
  124. }
  125. request.Address = v2net.IPAddress(buffer[1:5], port)
  126. case addrTypeIPv6:
  127. _, err = decryptor.Read(buffer[1:17])
  128. if err != nil {
  129. return nil, err
  130. }
  131. request.Address = v2net.IPAddress(buffer[1:17], port)
  132. case addrTypeDomain:
  133. _, err = decryptor.Read(buffer[1:2])
  134. if err != nil {
  135. return nil, err
  136. }
  137. domainLength := buffer[1]
  138. _, err = decryptor.Read(buffer[2 : 2+domainLength])
  139. if err != nil {
  140. return nil, err
  141. }
  142. request.Address = v2net.DomainAddress(string(buffer[2:2+domainLength]), port)
  143. }
  144. _, err = decryptor.Read(buffer[0:1])
  145. if err != nil {
  146. return nil, err
  147. }
  148. randomLength = buffer[0]
  149. _, err = decryptor.Read(buffer[:randomLength])
  150. if err != nil {
  151. return nil, err
  152. }
  153. return request, nil
  154. }
  155. func (request *VMessRequest) ToBytes(idHash CounterHash, randomRangeInt64 RandomInt64InRange) ([]byte, error) {
  156. buffer := make([]byte, 0, 300)
  157. counter := randomRangeInt64(time.Now().UTC().Unix(), 30)
  158. hash := idHash.Hash(request.UserId.Bytes, counter)
  159. log.Debug("Writing userhash: %v", hash)
  160. buffer = append(buffer, hash...)
  161. encryptionBegin := len(buffer)
  162. randomLength := mrand.Intn(32) + 1
  163. randomContent := make([]byte, randomLength)
  164. _, err := rand.Read(randomContent)
  165. if err != nil {
  166. return nil, err
  167. }
  168. buffer = append(buffer, byte(randomLength))
  169. buffer = append(buffer, randomContent...)
  170. buffer = append(buffer, request.Version)
  171. buffer = append(buffer, request.RequestIV[:]...)
  172. buffer = append(buffer, request.RequestKey[:]...)
  173. buffer = append(buffer, request.ResponseHeader[:]...)
  174. buffer = append(buffer, request.Command)
  175. portBytes := make([]byte, 2)
  176. binary.BigEndian.PutUint16(portBytes, request.Address.Port)
  177. buffer = append(buffer, portBytes...)
  178. switch {
  179. case request.Address.IsIPv4():
  180. buffer = append(buffer, addrTypeIPv4)
  181. buffer = append(buffer, request.Address.IP...)
  182. case request.Address.IsIPv6():
  183. buffer = append(buffer, addrTypeIPv6)
  184. buffer = append(buffer, request.Address.IP...)
  185. case request.Address.IsDomain():
  186. buffer = append(buffer, addrTypeDomain)
  187. buffer = append(buffer, byte(len(request.Address.Domain)))
  188. buffer = append(buffer, []byte(request.Address.Domain)...)
  189. }
  190. paddingLength := mrand.Intn(32) + 1
  191. paddingBuffer := make([]byte, paddingLength)
  192. _, err = rand.Read(paddingBuffer)
  193. if err != nil {
  194. return nil, err
  195. }
  196. buffer = append(buffer, byte(paddingLength))
  197. buffer = append(buffer, paddingBuffer...)
  198. encryptionEnd := len(buffer)
  199. aesCipher, err := aes.NewCipher(request.UserId.CmdKey())
  200. if err != nil {
  201. return nil, err
  202. }
  203. aesStream := cipher.NewCFBEncrypter(aesCipher, Int64Hash(counter))
  204. aesStream.XORKeyStream(buffer[encryptionBegin:encryptionEnd], buffer[encryptionBegin:encryptionEnd])
  205. return buffer, nil
  206. }
  207. type VMessResponse [4]byte
  208. func NewVMessResponse(request *VMessRequest) *VMessResponse {
  209. response := new(VMessResponse)
  210. copy(response[:], request.ResponseHeader[:])
  211. return response
  212. }