inbound.go 5.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190
  1. package inbound
  2. import (
  3. "crypto/md5"
  4. "io"
  5. "sync"
  6. "github.com/v2ray/v2ray-core/app"
  7. "github.com/v2ray/v2ray-core/app/dispatcher"
  8. "github.com/v2ray/v2ray-core/app/proxyman"
  9. "github.com/v2ray/v2ray-core/common/alloc"
  10. v2crypto "github.com/v2ray/v2ray-core/common/crypto"
  11. v2io "github.com/v2ray/v2ray-core/common/io"
  12. "github.com/v2ray/v2ray-core/common/log"
  13. v2net "github.com/v2ray/v2ray-core/common/net"
  14. proto "github.com/v2ray/v2ray-core/common/protocol"
  15. "github.com/v2ray/v2ray-core/common/serial"
  16. "github.com/v2ray/v2ray-core/proxy"
  17. "github.com/v2ray/v2ray-core/proxy/internal"
  18. vmessio "github.com/v2ray/v2ray-core/proxy/vmess/io"
  19. "github.com/v2ray/v2ray-core/proxy/vmess/protocol"
  20. "github.com/v2ray/v2ray-core/transport/hub"
  21. )
  22. // Inbound connection handler that handles messages in VMess format.
  23. type VMessInboundHandler struct {
  24. sync.Mutex
  25. packetDispatcher dispatcher.PacketDispatcher
  26. inboundHandlerManager proxyman.InboundHandlerManager
  27. clients protocol.UserSet
  28. user *proto.User
  29. accepting bool
  30. listener *hub.TCPHub
  31. features *FeaturesConfig
  32. listeningPort v2net.Port
  33. }
  34. func (this *VMessInboundHandler) Port() v2net.Port {
  35. return this.listeningPort
  36. }
  37. func (this *VMessInboundHandler) Close() {
  38. this.accepting = false
  39. if this.listener != nil {
  40. this.Lock()
  41. this.listener.Close()
  42. this.listener = nil
  43. this.Unlock()
  44. }
  45. }
  46. func (this *VMessInboundHandler) GetUser() *proto.User {
  47. return this.user
  48. }
  49. func (this *VMessInboundHandler) Listen(port v2net.Port) error {
  50. if this.accepting {
  51. if this.listeningPort == port {
  52. return nil
  53. } else {
  54. return proxy.ErrorAlreadyListening
  55. }
  56. }
  57. this.listeningPort = port
  58. tcpListener, err := hub.ListenTCP(port, this.HandleConnection)
  59. if err != nil {
  60. log.Error("Unable to listen tcp port ", port, ": ", err)
  61. return err
  62. }
  63. this.accepting = true
  64. this.Lock()
  65. this.listener = tcpListener
  66. this.Unlock()
  67. return nil
  68. }
  69. func (this *VMessInboundHandler) HandleConnection(connection *hub.TCPConn) {
  70. defer connection.Close()
  71. connReader := v2net.NewTimeOutReader(16, connection)
  72. requestReader := protocol.NewVMessRequestReader(this.clients)
  73. request, err := requestReader.Read(connReader)
  74. if err != nil {
  75. log.Access(connection.RemoteAddr(), serial.StringLiteral(""), log.AccessRejected, serial.StringLiteral(err.Error()))
  76. log.Warning("VMessIn: Invalid request from ", connection.RemoteAddr(), ": ", err)
  77. return
  78. }
  79. log.Access(connection.RemoteAddr(), request.Address, log.AccessAccepted, serial.StringLiteral(""))
  80. log.Debug("VMessIn: Received request for ", request.Address)
  81. ray := this.packetDispatcher.DispatchToOutbound(v2net.NewPacket(request.Destination(), nil, true))
  82. input := ray.InboundInput()
  83. output := ray.InboundOutput()
  84. var readFinish, writeFinish sync.Mutex
  85. readFinish.Lock()
  86. writeFinish.Lock()
  87. userSettings := proto.GetUserSettings(request.User.Level)
  88. connReader.SetTimeOut(userSettings.PayloadReadTimeout)
  89. go handleInput(request, connReader, input, &readFinish)
  90. responseKey := md5.Sum(request.RequestKey)
  91. responseIV := md5.Sum(request.RequestIV)
  92. aesStream, err := v2crypto.NewAesEncryptionStream(responseKey[:], responseIV[:])
  93. if err != nil {
  94. log.Error("VMessIn: Failed to create AES decryption stream: ", err)
  95. close(input)
  96. return
  97. }
  98. responseWriter := v2crypto.NewCryptionWriter(aesStream, connection)
  99. // Optimize for small response packet
  100. buffer := alloc.NewLargeBuffer().Clear()
  101. defer buffer.Release()
  102. buffer.AppendBytes(request.ResponseHeader, byte(0))
  103. this.generateCommand(buffer)
  104. if data, open := <-output; open {
  105. if request.IsChunkStream() {
  106. vmessio.Authenticate(data)
  107. }
  108. buffer.Append(data.Value)
  109. data.Release()
  110. responseWriter.Write(buffer.Value)
  111. go func(finish *sync.Mutex) {
  112. var writer v2io.Writer
  113. writer = v2io.NewAdaptiveWriter(responseWriter)
  114. if request.IsChunkStream() {
  115. writer = vmessio.NewAuthChunkWriter(writer)
  116. }
  117. v2io.ChanToWriter(writer, output)
  118. finish.Unlock()
  119. }(&writeFinish)
  120. writeFinish.Lock()
  121. }
  122. connection.CloseWrite()
  123. readFinish.Lock()
  124. }
  125. func handleInput(request *protocol.VMessRequest, reader io.Reader, input chan<- *alloc.Buffer, finish *sync.Mutex) {
  126. defer close(input)
  127. defer finish.Unlock()
  128. aesStream, err := v2crypto.NewAesDecryptionStream(request.RequestKey, request.RequestIV)
  129. if err != nil {
  130. log.Error("VMessIn: Failed to create AES decryption stream: ", err)
  131. return
  132. }
  133. descriptionReader := v2crypto.NewCryptionReader(aesStream, reader)
  134. var requestReader v2io.Reader
  135. if request.IsChunkStream() {
  136. requestReader = vmessio.NewAuthChunkReader(descriptionReader)
  137. } else {
  138. requestReader = v2io.NewAdaptiveReader(descriptionReader)
  139. }
  140. v2io.ReaderToChan(input, requestReader)
  141. }
  142. func init() {
  143. internal.MustRegisterInboundHandlerCreator("vmess",
  144. func(space app.Space, rawConfig interface{}) (proxy.InboundHandler, error) {
  145. if !space.HasApp(dispatcher.APP_ID) {
  146. return nil, internal.ErrorBadConfiguration
  147. }
  148. config := rawConfig.(*Config)
  149. allowedClients := protocol.NewTimedUserSet()
  150. for _, user := range config.AllowedUsers {
  151. allowedClients.AddUser(user)
  152. }
  153. handler := &VMessInboundHandler{
  154. packetDispatcher: space.GetApp(dispatcher.APP_ID).(dispatcher.PacketDispatcher),
  155. clients: allowedClients,
  156. features: config.Features,
  157. user: config.AllowedUsers[0],
  158. }
  159. if space.HasApp(proxyman.APP_ID_INBOUND_MANAGER) {
  160. handler.inboundHandlerManager = space.GetApp(proxyman.APP_ID_INBOUND_MANAGER).(proxyman.InboundHandlerManager)
  161. }
  162. return handler, nil
  163. })
  164. }