inbound.go 4.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157
  1. package vmess
  2. import (
  3. "crypto/md5"
  4. "io"
  5. "net"
  6. "sync"
  7. "github.com/v2ray/v2ray-core/app"
  8. "github.com/v2ray/v2ray-core/common/alloc"
  9. v2crypto "github.com/v2ray/v2ray-core/common/crypto"
  10. "github.com/v2ray/v2ray-core/common/log"
  11. v2net "github.com/v2ray/v2ray-core/common/net"
  12. "github.com/v2ray/v2ray-core/common/retry"
  13. "github.com/v2ray/v2ray-core/proxy/common/connhandler"
  14. "github.com/v2ray/v2ray-core/proxy/vmess/config"
  15. "github.com/v2ray/v2ray-core/proxy/vmess/protocol"
  16. "github.com/v2ray/v2ray-core/proxy/vmess/protocol/user"
  17. )
  18. type VMessInboundHandler struct {
  19. dispatcher app.PacketDispatcher
  20. clients user.UserSet
  21. accepting bool
  22. }
  23. func NewVMessInboundHandler(dispatcher app.PacketDispatcher, clients user.UserSet) *VMessInboundHandler {
  24. return &VMessInboundHandler{
  25. dispatcher: dispatcher,
  26. clients: clients,
  27. }
  28. }
  29. func (this *VMessInboundHandler) Listen(port uint16) error {
  30. listener, err := net.ListenTCP("tcp", &net.TCPAddr{
  31. IP: []byte{0, 0, 0, 0},
  32. Port: int(port),
  33. Zone: "",
  34. })
  35. if err != nil {
  36. log.Error("Unable to listen tcp port %d: %v", port, err)
  37. return err
  38. }
  39. this.accepting = true
  40. go this.AcceptConnections(listener)
  41. return nil
  42. }
  43. func (this *VMessInboundHandler) AcceptConnections(listener *net.TCPListener) error {
  44. for this.accepting {
  45. retry.Timed(100 /* times */, 100 /* ms */).On(func() error {
  46. connection, err := listener.AcceptTCP()
  47. if err != nil {
  48. log.Error("Failed to accpet connection: %s", err.Error())
  49. return err
  50. }
  51. go this.HandleConnection(connection)
  52. return nil
  53. })
  54. }
  55. return nil
  56. }
  57. func (this *VMessInboundHandler) HandleConnection(connection *net.TCPConn) error {
  58. defer connection.Close()
  59. connReader := v2net.NewTimeOutReader(16, connection)
  60. requestReader := protocol.NewVMessRequestReader(this.clients)
  61. request, err := requestReader.Read(connReader)
  62. if err != nil {
  63. log.Access(connection.RemoteAddr().String(), "", log.AccessRejected, err.Error())
  64. log.Warning("VMessIn: Invalid request from (%s): %v", connection.RemoteAddr().String(), err)
  65. return err
  66. }
  67. log.Access(connection.RemoteAddr().String(), request.Address.String(), log.AccessAccepted, "")
  68. log.Debug("VMessIn: Received request for %s", request.Address.String())
  69. ray := this.dispatcher.DispatchToOutbound(v2net.NewPacket(request.Destination(), nil, true))
  70. input := ray.InboundInput()
  71. output := ray.InboundOutput()
  72. var readFinish, writeFinish sync.Mutex
  73. readFinish.Lock()
  74. writeFinish.Lock()
  75. userSettings := config.GetUserSettings(request.User.Level())
  76. connReader.SetTimeOut(userSettings.PayloadReadTimeout)
  77. go handleInput(request, connReader, input, &readFinish)
  78. responseKey := md5.Sum(request.RequestKey)
  79. responseIV := md5.Sum(request.RequestIV)
  80. aesStream, err := v2crypto.NewAesEncryptionStream(responseKey[:], responseIV[:])
  81. if err != nil {
  82. log.Error("VMessIn: Failed to create AES decryption stream: %v", err)
  83. return err
  84. }
  85. responseWriter := v2crypto.NewCryptionWriter(aesStream, connection)
  86. // Optimize for small response packet
  87. buffer := alloc.NewLargeBuffer().Clear()
  88. buffer.AppendBytes(request.ResponseHeader[0] | request.ResponseHeader[1])
  89. buffer.AppendBytes(request.ResponseHeader[2] | request.ResponseHeader[3])
  90. buffer.AppendBytes(byte(0), byte(0))
  91. if data, open := <-output; open {
  92. buffer.Append(data.Value)
  93. data.Release()
  94. responseWriter.Write(buffer.Value)
  95. buffer.Release()
  96. go handleOutput(request, responseWriter, output, &writeFinish)
  97. writeFinish.Lock()
  98. }
  99. connection.CloseWrite()
  100. readFinish.Lock()
  101. return nil
  102. }
  103. func handleInput(request *protocol.VMessRequest, reader io.Reader, input chan<- *alloc.Buffer, finish *sync.Mutex) {
  104. defer close(input)
  105. defer finish.Unlock()
  106. aesStream, err := v2crypto.NewAesDecryptionStream(request.RequestKey, request.RequestIV)
  107. if err != nil {
  108. log.Error("VMessIn: Failed to create AES decryption stream: %v", err)
  109. return
  110. }
  111. requestReader := v2crypto.NewCryptionReader(aesStream, reader)
  112. v2net.ReaderToChan(input, requestReader)
  113. }
  114. func handleOutput(request *protocol.VMessRequest, writer io.Writer, output <-chan *alloc.Buffer, finish *sync.Mutex) {
  115. v2net.ChanToWriter(writer, output)
  116. finish.Unlock()
  117. }
  118. type VMessInboundHandlerFactory struct {
  119. }
  120. func (this *VMessInboundHandlerFactory) Create(dispatcher app.PacketDispatcher, rawConfig interface{}) (connhandler.InboundConnectionHandler, error) {
  121. config := rawConfig.(config.Inbound)
  122. allowedClients := user.NewTimedUserSet()
  123. for _, user := range config.AllowedUsers() {
  124. allowedClients.AddUser(user)
  125. }
  126. return NewVMessInboundHandler(dispatcher, allowedClients), nil
  127. }
  128. func init() {
  129. connhandler.RegisterInboundConnectionHandlerFactory("vmess", &VMessInboundHandlerFactory{})
  130. }