vmessout.go 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157
  1. package vmess
  2. import (
  3. "crypto/md5"
  4. "crypto/rand"
  5. mrand "math/rand"
  6. "net"
  7. "github.com/v2ray/v2ray-core"
  8. v2hash "github.com/v2ray/v2ray-core/hash"
  9. v2io "github.com/v2ray/v2ray-core/io"
  10. vmessio "github.com/v2ray/v2ray-core/io/vmess"
  11. "github.com/v2ray/v2ray-core/log"
  12. v2math "github.com/v2ray/v2ray-core/math"
  13. v2net "github.com/v2ray/v2ray-core/net"
  14. )
  15. // VNext is the next Point server in the connection chain.
  16. type VNextServer struct {
  17. Address v2net.Address // Address of VNext server
  18. Users []core.User // User accounts for accessing VNext.
  19. }
  20. type VMessOutboundHandler struct {
  21. vPoint *core.Point
  22. dest v2net.Address
  23. vNextList []VNextServer
  24. }
  25. func NewVMessOutboundHandler(vp *core.Point, vNextList []VNextServer, dest v2net.Address) *VMessOutboundHandler {
  26. return &VMessOutboundHandler{
  27. vPoint: vp,
  28. dest: dest,
  29. vNextList: vNextList,
  30. }
  31. }
  32. func (handler *VMessOutboundHandler) pickVNext() (v2net.Address, core.User) {
  33. vNextLen := len(handler.vNextList)
  34. if vNextLen == 0 {
  35. panic("Zero vNext is configured.")
  36. }
  37. vNextIndex := mrand.Intn(vNextLen)
  38. vNext := handler.vNextList[vNextIndex]
  39. vNextUserLen := len(vNext.Users)
  40. if vNextUserLen == 0 {
  41. panic("Zero User account.")
  42. }
  43. vNextUserIndex := mrand.Intn(vNextUserLen)
  44. vNextUser := vNext.Users[vNextUserIndex]
  45. return vNext.Address, vNextUser
  46. }
  47. func (handler *VMessOutboundHandler) Start(ray core.OutboundRay) error {
  48. vNextAddress, vNextUser := handler.pickVNext()
  49. request := &vmessio.VMessRequest{
  50. Version: vmessio.Version,
  51. UserId: vNextUser.Id,
  52. Command: byte(0x01),
  53. Address: handler.dest,
  54. }
  55. rand.Read(request.RequestIV[:])
  56. rand.Read(request.RequestKey[:])
  57. rand.Read(request.ResponseHeader[:])
  58. go startCommunicate(request, vNextAddress, ray)
  59. return nil
  60. }
  61. func startCommunicate(request *vmessio.VMessRequest, dest v2net.Address, ray core.OutboundRay) error {
  62. input := ray.OutboundInput()
  63. output := ray.OutboundOutput()
  64. conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{dest.IP, int(dest.Port), ""})
  65. log.Debug("VMessOutbound dialing tcp: %s", dest.String())
  66. if err != nil {
  67. log.Error("Failed to open tcp (%s): %v", dest.String(), err)
  68. close(output)
  69. return err
  70. }
  71. defer conn.Close()
  72. defer close(output)
  73. requestFinish := make(chan bool)
  74. responseFinish := make(chan bool)
  75. go handleRequest(conn, request, input, requestFinish)
  76. go handleResponse(conn, request, output, responseFinish)
  77. <-requestFinish
  78. conn.CloseWrite()
  79. <-responseFinish
  80. return nil
  81. }
  82. func handleRequest(conn *net.TCPConn, request *vmessio.VMessRequest, input <-chan []byte, finish chan<- bool) error {
  83. defer close(finish)
  84. requestWriter := vmessio.NewVMessRequestWriter(v2hash.NewTimeHash(v2hash.HMACHash{}), v2math.GenerateRandomInt64InRange)
  85. err := requestWriter.Write(conn, request)
  86. if err != nil {
  87. log.Error("Failed to write VMess request: %v", err)
  88. return err
  89. }
  90. encryptRequestWriter, err := v2io.NewAesEncryptWriter(request.RequestKey[:], request.RequestIV[:], conn)
  91. if err != nil {
  92. log.Error("Failed to create encrypt writer: %v", err)
  93. return err
  94. }
  95. v2net.ChanToWriter(encryptRequestWriter, input)
  96. return nil
  97. }
  98. func handleResponse(conn *net.TCPConn, request *vmessio.VMessRequest, output chan<- []byte, finish chan<- bool) error {
  99. defer close(finish)
  100. responseKey := md5.Sum(request.RequestKey[:])
  101. responseIV := md5.Sum(request.RequestIV[:])
  102. response := vmessio.VMessResponse{}
  103. nBytes, err := conn.Read(response[:])
  104. if err != nil {
  105. log.Error("Failed to read VMess response (%d bytes): %v", nBytes, err)
  106. return err
  107. }
  108. log.Debug("Got response %v", response)
  109. // TODO: check response
  110. decryptResponseReader, err := v2io.NewAesDecryptReader(responseKey[:], responseIV[:], conn)
  111. if err != nil {
  112. log.Error("Failed to create decrypt reader: %v", err)
  113. return err
  114. }
  115. v2net.ReaderToChan(output, decryptResponseReader)
  116. return nil
  117. }
  118. type VMessOutboundHandlerFactory struct {
  119. }
  120. func (factory *VMessOutboundHandlerFactory) Create(vp *core.Point, rawConfig []byte, destination v2net.Address) (core.OutboundConnectionHandler, error) {
  121. config, err := loadOutboundConfig(rawConfig)
  122. if err != nil {
  123. panic(log.Error("Failed to load VMess outbound config: %v", err))
  124. }
  125. servers := make([]VNextServer, 0, len(config.VNextList))
  126. for _, server := range config.VNextList {
  127. servers = append(servers, server.ToVNextServer())
  128. }
  129. return NewVMessOutboundHandler(vp, servers, destination), nil
  130. }
  131. func init() {
  132. core.RegisterOutboundConnectionHandlerFactory("vmess", &VMessOutboundHandlerFactory{})
  133. }