sniffer.go 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215
  1. package dispatcher
  2. import (
  3. "bytes"
  4. "strings"
  5. "v2ray.com/core/app/proxyman"
  6. "v2ray.com/core/common/serial"
  7. )
  8. var (
  9. ErrMoreData = newError("need more data")
  10. ErrInvalidData = newError("invalid data")
  11. )
  12. func ContainsValidHTTPMethod(b []byte) bool {
  13. if len(b) == 0 {
  14. return false
  15. }
  16. parts := bytes.Split(b, []byte{' '})
  17. part0Trimed := strings.ToLower(string(bytes.Trim(parts[0], " ")))
  18. return part0Trimed == "get" || part0Trimed == "post" ||
  19. part0Trimed == "head" || part0Trimed == "put" ||
  20. part0Trimed == "delete" || part0Trimed == "options" || part0Trimed == "connect"
  21. }
  22. func SniffHTTP(b []byte) (string, error) {
  23. if len(b) == 0 {
  24. return "", ErrMoreData
  25. }
  26. headers := bytes.Split(b, []byte{'\n'})
  27. if !ContainsValidHTTPMethod(headers[0]) {
  28. return "", ErrInvalidData
  29. }
  30. for i := 1; i < len(headers); i++ {
  31. header := headers[i]
  32. if len(header) == 0 {
  33. return "", ErrInvalidData
  34. }
  35. parts := bytes.SplitN(header, []byte{':'}, 2)
  36. if len(parts) != 2 {
  37. return "", ErrInvalidData
  38. }
  39. key := strings.ToLower(string(parts[0]))
  40. value := strings.ToLower(string(bytes.Trim(parts[1], " ")))
  41. if key == "host" {
  42. domain := strings.Split(value, ":")
  43. return strings.TrimSpace(domain[0]), nil
  44. }
  45. }
  46. return "", ErrMoreData
  47. }
  48. func IsValidTLSVersion(major, minor byte) bool {
  49. return major == 3
  50. }
  51. // ReadClientHello returns server name (if any) from TLS client hello message.
  52. // https://github.com/golang/go/blob/master/src/crypto/tls/handshake_messages.go#L300
  53. func ReadClientHello(data []byte) (string, error) {
  54. if len(data) < 42 {
  55. return "", ErrMoreData
  56. }
  57. sessionIDLen := int(data[38])
  58. if sessionIDLen > 32 || len(data) < 39+sessionIDLen {
  59. return "", ErrInvalidData
  60. }
  61. data = data[39+sessionIDLen:]
  62. if len(data) < 2 {
  63. return "", ErrMoreData
  64. }
  65. // cipherSuiteLen is the number of bytes of cipher suite numbers. Since
  66. // they are uint16s, the number must be even.
  67. cipherSuiteLen := int(data[0])<<8 | int(data[1])
  68. if cipherSuiteLen%2 == 1 || len(data) < 2+cipherSuiteLen {
  69. return "", ErrInvalidData
  70. }
  71. data = data[2+cipherSuiteLen:]
  72. if len(data) < 1 {
  73. return "", ErrMoreData
  74. }
  75. compressionMethodsLen := int(data[0])
  76. if len(data) < 1+compressionMethodsLen {
  77. return "", ErrMoreData
  78. }
  79. data = data[1+compressionMethodsLen:]
  80. if len(data) == 0 {
  81. return "", ErrInvalidData
  82. }
  83. if len(data) < 2 {
  84. return "", ErrInvalidData
  85. }
  86. extensionsLength := int(data[0])<<8 | int(data[1])
  87. data = data[2:]
  88. if extensionsLength != len(data) {
  89. return "", ErrInvalidData
  90. }
  91. for len(data) != 0 {
  92. if len(data) < 4 {
  93. return "", ErrInvalidData
  94. }
  95. extension := uint16(data[0])<<8 | uint16(data[1])
  96. length := int(data[2])<<8 | int(data[3])
  97. data = data[4:]
  98. if len(data) < length {
  99. return "", ErrInvalidData
  100. }
  101. switch extension {
  102. case 0x00: /* extensionServerName */
  103. d := data[:length]
  104. if len(d) < 2 {
  105. return "", ErrInvalidData
  106. }
  107. namesLen := int(d[0])<<8 | int(d[1])
  108. d = d[2:]
  109. if len(d) != namesLen {
  110. return "", ErrInvalidData
  111. }
  112. for len(d) > 0 {
  113. if len(d) < 3 {
  114. return "", ErrInvalidData
  115. }
  116. nameType := d[0]
  117. nameLen := int(d[1])<<8 | int(d[2])
  118. d = d[3:]
  119. if len(d) < nameLen {
  120. return "", ErrInvalidData
  121. }
  122. if nameType == 0 {
  123. serverName := string(d[:nameLen])
  124. // An SNI value may not include a
  125. // trailing dot. See
  126. // https://tools.ietf.org/html/rfc6066#section-3.
  127. if strings.HasSuffix(serverName, ".") {
  128. return "", ErrInvalidData
  129. }
  130. return serverName, nil
  131. }
  132. d = d[nameLen:]
  133. }
  134. }
  135. data = data[length:]
  136. }
  137. return "", ErrInvalidData
  138. }
  139. func SniffTLS(b []byte) (string, error) {
  140. if len(b) < 5 {
  141. return "", ErrMoreData
  142. }
  143. if b[0] != 0x16 /* TLS Handshake */ {
  144. return "", ErrInvalidData
  145. }
  146. if !IsValidTLSVersion(b[1], b[2]) {
  147. return "", ErrInvalidData
  148. }
  149. headerLen := int(serial.BytesToUint16(b[3:5]))
  150. if 5+headerLen > len(b) {
  151. return "", ErrMoreData
  152. }
  153. return ReadClientHello(b[5 : 5+headerLen])
  154. }
  155. type Sniffer struct {
  156. slist []func([]byte) (string, error)
  157. err []error
  158. }
  159. func NewSniffer(sniferList []proxyman.KnownProtocols) *Sniffer {
  160. s := new(Sniffer)
  161. for _, protocol := range sniferList {
  162. var f func([]byte) (string, error)
  163. switch protocol {
  164. case proxyman.KnownProtocols_HTTP:
  165. f = SniffHTTP
  166. case proxyman.KnownProtocols_TLS:
  167. f = SniffTLS
  168. default:
  169. panic("Unsupported protocol")
  170. }
  171. s.slist = append(s.slist, f)
  172. }
  173. s.err = make([]error, len(s.slist))
  174. return s
  175. }
  176. func (s *Sniffer) Sniff(payload []byte) (string, error) {
  177. sniffed := false
  178. for idx, sniffer := range s.slist {
  179. if s.err[idx] != nil {
  180. continue
  181. }
  182. sniffed = true
  183. domain, err := sniffer(payload)
  184. if err == nil {
  185. return domain, nil
  186. }
  187. if err != ErrMoreData {
  188. s.err[idx] = err
  189. }
  190. }
  191. if sniffed {
  192. return "", ErrMoreData
  193. }
  194. return "", s.err[0]
  195. }