vmessout.go 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171
  1. package vmess
  2. import (
  3. "bytes"
  4. "crypto/md5"
  5. "crypto/rand"
  6. mrand "math/rand"
  7. "net"
  8. "github.com/v2ray/v2ray-core"
  9. v2io "github.com/v2ray/v2ray-core/common/io"
  10. v2net "github.com/v2ray/v2ray-core/common/net"
  11. "github.com/v2ray/v2ray-core/log"
  12. protocol "github.com/v2ray/v2ray-core/proxy/vmess/protocol"
  13. )
  14. // VNext is the next Point server in the connection chain.
  15. type VNextServer struct {
  16. Address v2net.Address // Address of VNext server
  17. Users []protocol.User // User accounts for accessing VNext.
  18. }
  19. type VMessOutboundHandler struct {
  20. vPoint *core.Point
  21. dest v2net.Address
  22. vNextList []VNextServer
  23. }
  24. func NewVMessOutboundHandler(vp *core.Point, vNextList []VNextServer, dest v2net.Address) *VMessOutboundHandler {
  25. return &VMessOutboundHandler{
  26. vPoint: vp,
  27. dest: dest,
  28. vNextList: vNextList,
  29. }
  30. }
  31. func (handler *VMessOutboundHandler) pickVNext() (v2net.Address, protocol.User) {
  32. vNextLen := len(handler.vNextList)
  33. if vNextLen == 0 {
  34. panic("VMessOut: Zero vNext is configured.")
  35. }
  36. vNextIndex := mrand.Intn(vNextLen)
  37. vNext := handler.vNextList[vNextIndex]
  38. vNextUserLen := len(vNext.Users)
  39. if vNextUserLen == 0 {
  40. panic("VMessOut: Zero User account.")
  41. }
  42. vNextUserIndex := mrand.Intn(vNextUserLen)
  43. vNextUser := vNext.Users[vNextUserIndex]
  44. return vNext.Address, vNextUser
  45. }
  46. func (handler *VMessOutboundHandler) Start(ray core.OutboundRay) error {
  47. vNextAddress, vNextUser := handler.pickVNext()
  48. request := &protocol.VMessRequest{
  49. Version: protocol.Version,
  50. UserId: vNextUser.Id,
  51. Command: byte(0x01),
  52. Address: handler.dest,
  53. }
  54. rand.Read(request.RequestIV[:])
  55. rand.Read(request.RequestKey[:])
  56. rand.Read(request.ResponseHeader[:])
  57. go startCommunicate(request, vNextAddress, ray)
  58. return nil
  59. }
  60. func startCommunicate(request *protocol.VMessRequest, dest v2net.Address, ray core.OutboundRay) error {
  61. input := ray.OutboundInput()
  62. output := ray.OutboundOutput()
  63. conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{dest.IP, int(dest.Port), ""})
  64. if err != nil {
  65. log.Error("Failed to open tcp (%s): %v", dest.String(), err)
  66. close(output)
  67. return err
  68. }
  69. log.Info("VMessOut: Tunneling request for %s", request.Address.String())
  70. defer conn.Close()
  71. requestFinish := make(chan bool)
  72. responseFinish := make(chan bool)
  73. go handleRequest(conn, request, input, requestFinish)
  74. go handleResponse(conn, request, output, responseFinish)
  75. <-requestFinish
  76. conn.CloseWrite()
  77. <-responseFinish
  78. return nil
  79. }
  80. func handleRequest(conn *net.TCPConn, request *protocol.VMessRequest, input <-chan []byte, finish chan<- bool) {
  81. defer close(finish)
  82. encryptRequestWriter, err := v2io.NewAesEncryptWriter(request.RequestKey[:], request.RequestIV[:], conn)
  83. if err != nil {
  84. log.Error("VMessOut: Failed to create encrypt writer: %v", err)
  85. return
  86. }
  87. buffer, err := request.ToBytes(protocol.NewTimeHash(protocol.HMACHash{}), protocol.GenerateRandomInt64InRange)
  88. if err != nil {
  89. log.Error("VMessOut: Failed to serialize VMess request: %v", err)
  90. return
  91. }
  92. // Send first packet of payload together with request, in favor of small requests.
  93. payload, open := <-input
  94. if open {
  95. encryptRequestWriter.Crypt(payload)
  96. buffer = append(buffer, payload...)
  97. _, err = conn.Write(buffer)
  98. if err != nil {
  99. log.Error("VMessOut: Failed to write VMess request: %v", err)
  100. return
  101. }
  102. v2net.ChanToWriter(encryptRequestWriter, input)
  103. }
  104. return
  105. }
  106. func handleResponse(conn *net.TCPConn, request *protocol.VMessRequest, output chan<- []byte, finish chan<- bool) {
  107. defer close(finish)
  108. defer close(output)
  109. responseKey := md5.Sum(request.RequestKey[:])
  110. responseIV := md5.Sum(request.RequestIV[:])
  111. decryptResponseReader, err := v2io.NewAesDecryptReader(responseKey[:], responseIV[:], conn)
  112. if err != nil {
  113. log.Error("VMessOut: Failed to create decrypt reader: %v", err)
  114. return
  115. }
  116. response := protocol.VMessResponse{}
  117. nBytes, err := decryptResponseReader.Read(response[:])
  118. if err != nil {
  119. log.Error("VMessOut: Failed to read VMess response (%d bytes): %v", nBytes, err)
  120. return
  121. }
  122. if !bytes.Equal(response[:], request.ResponseHeader[:]) {
  123. log.Warning("VMessOut: unexepcted response header. The connection is probably hijacked.")
  124. return
  125. }
  126. v2net.ReaderToChan(output, decryptResponseReader)
  127. return
  128. }
  129. type VMessOutboundHandlerFactory struct {
  130. }
  131. func (factory *VMessOutboundHandlerFactory) Create(vp *core.Point, rawConfig []byte, destination v2net.Address) (core.OutboundConnectionHandler, error) {
  132. config, err := loadOutboundConfig(rawConfig)
  133. if err != nil {
  134. panic(log.Error("Failed to load VMess outbound config: %v", err))
  135. }
  136. servers := make([]VNextServer, 0, len(config.VNextList))
  137. for _, server := range config.VNextList {
  138. servers = append(servers, server.ToVNextServer())
  139. }
  140. return NewVMessOutboundHandler(vp, servers, destination), nil
  141. }
  142. func init() {
  143. core.RegisterOutboundConnectionHandlerFactory("vmess", &VMessOutboundHandlerFactory{})
  144. }