vmess.go 6.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267
  1. // Package vmess contains protocol definition, io lib for VMess.
  2. package protocol
  3. import (
  4. "crypto/aes"
  5. "crypto/cipher"
  6. "crypto/rand"
  7. "encoding/binary"
  8. "errors"
  9. "fmt"
  10. "io"
  11. mrand "math/rand"
  12. "time"
  13. v2io "github.com/v2ray/v2ray-core/common/io"
  14. "github.com/v2ray/v2ray-core/common/log"
  15. v2net "github.com/v2ray/v2ray-core/common/net"
  16. "github.com/v2ray/v2ray-core/proxy/vmess/protocol/user"
  17. )
  18. const (
  19. addrTypeIPv4 = byte(0x01)
  20. addrTypeIPv6 = byte(0x03)
  21. addrTypeDomain = byte(0x02)
  22. CmdTCP = byte(0x01)
  23. CmdUDP = byte(0x02)
  24. Version = byte(0x01)
  25. blockSize = 16
  26. )
  27. var (
  28. ErrorInvalidUser = errors.New("Invalid User")
  29. ErrorInvalidVerion = errors.New("Invalid Version")
  30. )
  31. // VMessRequest implements the request message of VMess protocol. It only contains the header of a
  32. // request message. The data part will be handled by conection handler directly, in favor of data
  33. // streaming.
  34. type VMessRequest struct {
  35. Version byte
  36. UserId user.ID
  37. RequestIV [16]byte
  38. RequestKey [16]byte
  39. ResponseHeader [4]byte
  40. Command byte
  41. Address v2net.Address
  42. }
  43. // Destination is the final destination of this request.
  44. func (request *VMessRequest) Destination() v2net.Destination {
  45. if request.Command == CmdTCP {
  46. return v2net.NewTCPDestination(request.Address)
  47. } else {
  48. return v2net.NewUDPDestination(request.Address)
  49. }
  50. }
  51. // VMessRequestReader is a parser to read VMessRequest from a byte stream.
  52. type VMessRequestReader struct {
  53. vUserSet user.UserSet
  54. }
  55. // NewVMessRequestReader creates a new VMessRequestReader with a given UserSet
  56. func NewVMessRequestReader(vUserSet user.UserSet) *VMessRequestReader {
  57. return &VMessRequestReader{
  58. vUserSet: vUserSet,
  59. }
  60. }
  61. // Read reads a VMessRequest from a byte stream.
  62. func (r *VMessRequestReader) Read(reader io.Reader) (*VMessRequest, error) {
  63. buffer := make([]byte, 256)
  64. nBytes, err := reader.Read(buffer[:user.IDBytesLen])
  65. if err != nil {
  66. return nil, err
  67. }
  68. log.Debug("Read user hash: %v", buffer[:nBytes])
  69. userId, timeSec, valid := r.vUserSet.GetUser(buffer[:nBytes])
  70. if !valid {
  71. return nil, ErrorInvalidUser
  72. }
  73. aesCipher, err := aes.NewCipher(userId.CmdKey())
  74. if err != nil {
  75. return nil, err
  76. }
  77. aesStream := cipher.NewCFBDecrypter(aesCipher, user.Int64Hash(timeSec))
  78. decryptor := v2io.NewCryptionReader(aesStream, reader)
  79. if err != nil {
  80. return nil, err
  81. }
  82. nBytes, err = decryptor.Read(buffer[0:1])
  83. if err != nil {
  84. return nil, err
  85. }
  86. randomLength := buffer[0]
  87. if randomLength <= 0 || randomLength > 32 {
  88. return nil, fmt.Errorf("Unexpected random length %d", randomLength)
  89. }
  90. _, err = decryptor.Read(buffer[:randomLength])
  91. if err != nil {
  92. return nil, err
  93. }
  94. nBytes, err = decryptor.Read(buffer[0:1])
  95. if err != nil {
  96. return nil, err
  97. }
  98. request := &VMessRequest{
  99. UserId: *userId,
  100. Version: buffer[0],
  101. }
  102. if request.Version != Version {
  103. log.Error("Unknown VMess version %d", request.Version)
  104. return nil, ErrorInvalidVerion
  105. }
  106. // TODO: check number of bytes returned
  107. _, err = decryptor.Read(request.RequestIV[:])
  108. if err != nil {
  109. return nil, err
  110. }
  111. _, err = decryptor.Read(request.RequestKey[:])
  112. if err != nil {
  113. return nil, err
  114. }
  115. _, err = decryptor.Read(request.ResponseHeader[:])
  116. if err != nil {
  117. return nil, err
  118. }
  119. _, err = decryptor.Read(buffer[0:1])
  120. if err != nil {
  121. return nil, err
  122. }
  123. request.Command = buffer[0]
  124. _, err = decryptor.Read(buffer[0:2])
  125. if err != nil {
  126. return nil, err
  127. }
  128. port := binary.BigEndian.Uint16(buffer[0:2])
  129. _, err = decryptor.Read(buffer[0:1])
  130. if err != nil {
  131. return nil, err
  132. }
  133. switch buffer[0] {
  134. case addrTypeIPv4:
  135. _, err = decryptor.Read(buffer[1:5])
  136. if err != nil {
  137. return nil, err
  138. }
  139. request.Address = v2net.IPAddress(buffer[1:5], port)
  140. case addrTypeIPv6:
  141. _, err = decryptor.Read(buffer[1:17])
  142. if err != nil {
  143. return nil, err
  144. }
  145. request.Address = v2net.IPAddress(buffer[1:17], port)
  146. case addrTypeDomain:
  147. _, err = decryptor.Read(buffer[1:2])
  148. if err != nil {
  149. return nil, err
  150. }
  151. domainLength := buffer[1]
  152. _, err = decryptor.Read(buffer[2 : 2+domainLength])
  153. if err != nil {
  154. return nil, err
  155. }
  156. request.Address = v2net.DomainAddress(string(buffer[2:2+domainLength]), port)
  157. }
  158. _, err = decryptor.Read(buffer[0:1])
  159. if err != nil {
  160. return nil, err
  161. }
  162. randomLength = buffer[0]
  163. _, err = decryptor.Read(buffer[:randomLength])
  164. if err != nil {
  165. return nil, err
  166. }
  167. return request, nil
  168. }
  169. // ToBytes returns a VMessRequest in the form of byte array.
  170. func (request *VMessRequest) ToBytes(idHash user.CounterHash, randomRangeInt64 user.RandomInt64InRange) ([]byte, error) {
  171. buffer := make([]byte, 0, 300)
  172. counter := randomRangeInt64(time.Now().UTC().Unix(), 30)
  173. hash := idHash.Hash(request.UserId.Bytes, counter)
  174. log.Debug("Writing userhash: %v", hash)
  175. buffer = append(buffer, hash...)
  176. encryptionBegin := len(buffer)
  177. randomLength := mrand.Intn(32) + 1
  178. randomContent := make([]byte, randomLength)
  179. _, err := rand.Read(randomContent)
  180. if err != nil {
  181. return nil, err
  182. }
  183. buffer = append(buffer, byte(randomLength))
  184. buffer = append(buffer, randomContent...)
  185. buffer = append(buffer, request.Version)
  186. buffer = append(buffer, request.RequestIV[:]...)
  187. buffer = append(buffer, request.RequestKey[:]...)
  188. buffer = append(buffer, request.ResponseHeader[:]...)
  189. buffer = append(buffer, request.Command)
  190. buffer = append(buffer, request.Address.PortBytes()...)
  191. switch {
  192. case request.Address.IsIPv4():
  193. buffer = append(buffer, addrTypeIPv4)
  194. buffer = append(buffer, request.Address.IP()...)
  195. case request.Address.IsIPv6():
  196. buffer = append(buffer, addrTypeIPv6)
  197. buffer = append(buffer, request.Address.IP()...)
  198. case request.Address.IsDomain():
  199. buffer = append(buffer, addrTypeDomain)
  200. buffer = append(buffer, byte(len(request.Address.Domain())))
  201. buffer = append(buffer, []byte(request.Address.Domain())...)
  202. }
  203. paddingLength := mrand.Intn(32) + 1
  204. paddingBuffer := make([]byte, paddingLength)
  205. _, err = rand.Read(paddingBuffer)
  206. if err != nil {
  207. return nil, err
  208. }
  209. buffer = append(buffer, byte(paddingLength))
  210. buffer = append(buffer, paddingBuffer...)
  211. encryptionEnd := len(buffer)
  212. aesCipher, err := aes.NewCipher(request.UserId.CmdKey())
  213. if err != nil {
  214. return nil, err
  215. }
  216. aesStream := cipher.NewCFBEncrypter(aesCipher, user.Int64Hash(counter))
  217. aesStream.XORKeyStream(buffer[encryptionBegin:encryptionEnd], buffer[encryptionBegin:encryptionEnd])
  218. return buffer, nil
  219. }
  220. // VMessResponse is the header of a TCP response in VMess format.
  221. type VMessResponse [4]byte
  222. // NewVMessResponse creates a VMessResponse from a given VMessRequest.
  223. func NewVMessResponse(request *VMessRequest) *VMessResponse {
  224. return &VMessResponse{
  225. request.ResponseHeader[0],
  226. request.ResponseHeader[1],
  227. request.ResponseHeader[2],
  228. request.ResponseHeader[3]}
  229. }