inbound.go 4.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158
  1. package inbound
  2. import (
  3. "crypto/md5"
  4. "io"
  5. "net"
  6. "sync"
  7. "github.com/v2ray/v2ray-core/app"
  8. "github.com/v2ray/v2ray-core/common/alloc"
  9. v2crypto "github.com/v2ray/v2ray-core/common/crypto"
  10. "github.com/v2ray/v2ray-core/common/log"
  11. v2net "github.com/v2ray/v2ray-core/common/net"
  12. "github.com/v2ray/v2ray-core/common/retry"
  13. "github.com/v2ray/v2ray-core/proxy/common/connhandler"
  14. "github.com/v2ray/v2ray-core/proxy/vmess/config"
  15. "github.com/v2ray/v2ray-core/proxy/vmess/protocol"
  16. "github.com/v2ray/v2ray-core/proxy/vmess/protocol/user"
  17. )
  18. // Inbound connection handler that handles messages in VMess format.
  19. type VMessInboundHandler struct {
  20. space *app.Space
  21. clients user.UserSet
  22. accepting bool
  23. }
  24. func NewVMessInboundHandler(space *app.Space, clients user.UserSet) *VMessInboundHandler {
  25. return &VMessInboundHandler{
  26. space: space,
  27. clients: clients,
  28. }
  29. }
  30. func (this *VMessInboundHandler) Listen(port v2net.Port) error {
  31. listener, err := net.ListenTCP("tcp", &net.TCPAddr{
  32. IP: []byte{0, 0, 0, 0},
  33. Port: int(port),
  34. Zone: "",
  35. })
  36. if err != nil {
  37. log.Error("Unable to listen tcp port %d: %v", port, err)
  38. return err
  39. }
  40. this.accepting = true
  41. go this.AcceptConnections(listener)
  42. return nil
  43. }
  44. func (this *VMessInboundHandler) AcceptConnections(listener *net.TCPListener) error {
  45. for this.accepting {
  46. retry.Timed(100 /* times */, 100 /* ms */).On(func() error {
  47. connection, err := listener.AcceptTCP()
  48. if err != nil {
  49. log.Error("Failed to accpet connection: %s", err.Error())
  50. return err
  51. }
  52. go this.HandleConnection(connection)
  53. return nil
  54. })
  55. }
  56. return nil
  57. }
  58. func (this *VMessInboundHandler) HandleConnection(connection *net.TCPConn) error {
  59. defer connection.Close()
  60. connReader := v2net.NewTimeOutReader(16, connection)
  61. requestReader := protocol.NewVMessRequestReader(this.clients)
  62. request, err := requestReader.Read(connReader)
  63. if err != nil {
  64. log.Access(connection.RemoteAddr().String(), "", log.AccessRejected, err.Error())
  65. log.Warning("VMessIn: Invalid request from (%s): %v", connection.RemoteAddr().String(), err)
  66. return err
  67. }
  68. log.Access(connection.RemoteAddr().String(), request.Address.String(), log.AccessAccepted, "")
  69. log.Debug("VMessIn: Received request for %s", request.Address.String())
  70. ray := this.space.PacketDispatcher().DispatchToOutbound(v2net.NewPacket(request.Destination(), nil, true))
  71. input := ray.InboundInput()
  72. output := ray.InboundOutput()
  73. var readFinish, writeFinish sync.Mutex
  74. readFinish.Lock()
  75. writeFinish.Lock()
  76. userSettings := config.GetUserSettings(request.User.Level())
  77. connReader.SetTimeOut(userSettings.PayloadReadTimeout)
  78. go handleInput(request, connReader, input, &readFinish)
  79. responseKey := md5.Sum(request.RequestKey)
  80. responseIV := md5.Sum(request.RequestIV)
  81. aesStream, err := v2crypto.NewAesEncryptionStream(responseKey[:], responseIV[:])
  82. if err != nil {
  83. log.Error("VMessIn: Failed to create AES decryption stream: %v", err)
  84. return err
  85. }
  86. responseWriter := v2crypto.NewCryptionWriter(aesStream, connection)
  87. // Optimize for small response packet
  88. buffer := alloc.NewLargeBuffer().Clear()
  89. buffer.AppendBytes(request.ResponseHeader[0] ^ request.ResponseHeader[1])
  90. buffer.AppendBytes(request.ResponseHeader[2] ^ request.ResponseHeader[3])
  91. buffer.AppendBytes(byte(0), byte(0))
  92. if data, open := <-output; open {
  93. buffer.Append(data.Value)
  94. data.Release()
  95. responseWriter.Write(buffer.Value)
  96. buffer.Release()
  97. go handleOutput(request, responseWriter, output, &writeFinish)
  98. writeFinish.Lock()
  99. }
  100. connection.CloseWrite()
  101. readFinish.Lock()
  102. return nil
  103. }
  104. func handleInput(request *protocol.VMessRequest, reader io.Reader, input chan<- *alloc.Buffer, finish *sync.Mutex) {
  105. defer close(input)
  106. defer finish.Unlock()
  107. aesStream, err := v2crypto.NewAesDecryptionStream(request.RequestKey, request.RequestIV)
  108. if err != nil {
  109. log.Error("VMessIn: Failed to create AES decryption stream: %v", err)
  110. return
  111. }
  112. requestReader := v2crypto.NewCryptionReader(aesStream, reader)
  113. v2net.ReaderToChan(input, requestReader)
  114. }
  115. func handleOutput(request *protocol.VMessRequest, writer io.Writer, output <-chan *alloc.Buffer, finish *sync.Mutex) {
  116. v2net.ChanToWriter(writer, output)
  117. finish.Unlock()
  118. }
  119. type VMessInboundHandlerFactory struct {
  120. }
  121. func (this *VMessInboundHandlerFactory) Create(space *app.Space, rawConfig interface{}) (connhandler.InboundConnectionHandler, error) {
  122. config := rawConfig.(config.Inbound)
  123. allowedClients := user.NewTimedUserSet()
  124. for _, user := range config.AllowedUsers() {
  125. allowedClients.AddUser(user)
  126. }
  127. return NewVMessInboundHandler(space, allowedClients), nil
  128. }
  129. func init() {
  130. connhandler.RegisterInboundConnectionHandlerFactory("vmess", &VMessInboundHandlerFactory{})
  131. }