protocol.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378
  1. package shadowsocks
  2. import (
  3. "bytes"
  4. "crypto/rand"
  5. "io"
  6. "v2ray.com/core/common"
  7. "v2ray.com/core/common/bitmask"
  8. "v2ray.com/core/common/buf"
  9. "v2ray.com/core/common/net"
  10. "v2ray.com/core/common/protocol"
  11. "v2ray.com/core/proxy/socks"
  12. )
  13. const (
  14. Version = 1
  15. RequestOptionOneTimeAuth bitmask.Byte = 0x01
  16. AddrTypeIPv4 = 1
  17. AddrTypeIPv6 = 4
  18. AddrTypeDomain = 3
  19. )
  20. // ReadTCPSession reads a Shadowsocks TCP session from the given reader, returns its header and remaining parts.
  21. func ReadTCPSession(user *protocol.User, reader io.Reader) (*protocol.RequestHeader, buf.Reader, error) {
  22. rawAccount, err := user.GetTypedAccount()
  23. if err != nil {
  24. return nil, nil, newError("failed to parse account").Base(err).AtError()
  25. }
  26. account := rawAccount.(*MemoryAccount)
  27. buffer := buf.NewLocal(512)
  28. defer buffer.Release()
  29. ivLen := account.Cipher.IVSize()
  30. var iv []byte
  31. if ivLen > 0 {
  32. if err := buffer.AppendSupplier(buf.ReadFullFrom(reader, ivLen)); err != nil {
  33. return nil, nil, newError("failed to read IV").Base(err)
  34. }
  35. iv = append([]byte(nil), buffer.BytesTo(ivLen)...)
  36. }
  37. r, err := account.Cipher.NewDecryptionReader(account.Key, iv, reader)
  38. if err != nil {
  39. return nil, nil, newError("failed to initialize decoding stream").Base(err).AtError()
  40. }
  41. br := buf.NewBufferedReader(r)
  42. reader = nil
  43. authenticator := NewAuthenticator(HeaderKeyGenerator(account.Key, iv))
  44. request := &protocol.RequestHeader{
  45. Version: Version,
  46. User: user,
  47. Command: protocol.RequestCommandTCP,
  48. }
  49. if err := buffer.Reset(buf.ReadFullFrom(br, 1)); err != nil {
  50. return nil, nil, newError("failed to read address type").Base(err)
  51. }
  52. if !account.Cipher.IsAEAD() {
  53. if (buffer.Byte(0) & 0x10) == 0x10 {
  54. request.Option.Set(RequestOptionOneTimeAuth)
  55. }
  56. if request.Option.Has(RequestOptionOneTimeAuth) && account.OneTimeAuth == Account_Disabled {
  57. return nil, nil, newError("rejecting connection with OTA enabled, while server disables OTA")
  58. }
  59. if !request.Option.Has(RequestOptionOneTimeAuth) && account.OneTimeAuth == Account_Enabled {
  60. return nil, nil, newError("rejecting connection with OTA disabled, while server enables OTA")
  61. }
  62. }
  63. addrType := (buffer.Byte(0) & 0x0F)
  64. switch addrType {
  65. case AddrTypeIPv4:
  66. if err := buffer.AppendSupplier(buf.ReadFullFrom(br, 4)); err != nil {
  67. return nil, nil, newError("failed to read IPv4 address").Base(err)
  68. }
  69. request.Address = net.IPAddress(buffer.BytesFrom(-4))
  70. case AddrTypeIPv6:
  71. if err := buffer.AppendSupplier(buf.ReadFullFrom(br, 16)); err != nil {
  72. return nil, nil, newError("failed to read IPv6 address").Base(err)
  73. }
  74. request.Address = net.IPAddress(buffer.BytesFrom(-16))
  75. case AddrTypeDomain:
  76. if err := buffer.AppendSupplier(buf.ReadFullFrom(br, 1)); err != nil {
  77. return nil, nil, newError("failed to read domain lenth.").Base(err)
  78. }
  79. domainLength := int(buffer.BytesFrom(-1)[0])
  80. err = buffer.AppendSupplier(buf.ReadFullFrom(br, domainLength))
  81. if err != nil {
  82. return nil, nil, newError("failed to read domain").Base(err)
  83. }
  84. request.Address = net.DomainAddress(string(buffer.BytesFrom(-domainLength)))
  85. default:
  86. // Check address validity after OTA verification.
  87. }
  88. err = buffer.AppendSupplier(buf.ReadFullFrom(br, 2))
  89. if err != nil {
  90. return nil, nil, newError("failed to read port").Base(err)
  91. }
  92. request.Port = net.PortFromBytes(buffer.BytesFrom(-2))
  93. if request.Option.Has(RequestOptionOneTimeAuth) {
  94. actualAuth := make([]byte, AuthSize)
  95. authenticator.Authenticate(buffer.Bytes())(actualAuth)
  96. err := buffer.AppendSupplier(buf.ReadFullFrom(br, AuthSize))
  97. if err != nil {
  98. return nil, nil, newError("Failed to read OTA").Base(err)
  99. }
  100. if !bytes.Equal(actualAuth, buffer.BytesFrom(-AuthSize)) {
  101. return nil, nil, newError("invalid OTA")
  102. }
  103. }
  104. if request.Address == nil {
  105. return nil, nil, newError("invalid remote address.")
  106. }
  107. br.SetBuffered(false)
  108. var chunkReader buf.Reader
  109. if request.Option.Has(RequestOptionOneTimeAuth) {
  110. chunkReader = NewChunkReader(br, NewAuthenticator(ChunkKeyGenerator(iv)))
  111. } else {
  112. chunkReader = buf.NewReader(br)
  113. }
  114. return request, chunkReader, nil
  115. }
  116. // WriteTCPRequest writes Shadowsocks request into the given writer, and returns a writer for body.
  117. func WriteTCPRequest(request *protocol.RequestHeader, writer io.Writer) (buf.Writer, error) {
  118. user := request.User
  119. rawAccount, err := user.GetTypedAccount()
  120. if err != nil {
  121. return nil, newError("failed to parse account").Base(err).AtError()
  122. }
  123. account := rawAccount.(*MemoryAccount)
  124. if account.Cipher.IsAEAD() {
  125. request.Option.Clear(RequestOptionOneTimeAuth)
  126. }
  127. var iv []byte
  128. if account.Cipher.IVSize() > 0 {
  129. iv = make([]byte, account.Cipher.IVSize())
  130. common.Must2(rand.Read(iv))
  131. _, err = writer.Write(iv)
  132. if err != nil {
  133. return nil, newError("failed to write IV")
  134. }
  135. }
  136. w, err := account.Cipher.NewEncryptionWriter(account.Key, iv, writer)
  137. if err != nil {
  138. return nil, newError("failed to create encoding stream").Base(err).AtError()
  139. }
  140. header := buf.NewLocal(512)
  141. if err := socks.AppendAddress(header, request.Address, request.Port); err != nil {
  142. return nil, newError("failed to write address").Base(err)
  143. }
  144. if request.Option.Has(RequestOptionOneTimeAuth) {
  145. header.SetByte(0, header.Byte(0)|0x10)
  146. authenticator := NewAuthenticator(HeaderKeyGenerator(account.Key, iv))
  147. common.Must(header.AppendSupplier(authenticator.Authenticate(header.Bytes())))
  148. }
  149. if err := w.WriteMultiBuffer(buf.NewMultiBufferValue(header)); err != nil {
  150. return nil, newError("failed to write header").Base(err)
  151. }
  152. var chunkWriter buf.Writer
  153. if request.Option.Has(RequestOptionOneTimeAuth) {
  154. chunkWriter = NewChunkWriter(w.(io.Writer), NewAuthenticator(ChunkKeyGenerator(iv)))
  155. } else {
  156. chunkWriter = w
  157. }
  158. return chunkWriter, nil
  159. }
  160. func ReadTCPResponse(user *protocol.User, reader io.Reader) (buf.Reader, error) {
  161. rawAccount, err := user.GetTypedAccount()
  162. if err != nil {
  163. return nil, newError("failed to parse account").Base(err).AtError()
  164. }
  165. account := rawAccount.(*MemoryAccount)
  166. var iv []byte
  167. if account.Cipher.IVSize() > 0 {
  168. iv = make([]byte, account.Cipher.IVSize())
  169. _, err = io.ReadFull(reader, iv)
  170. if err != nil {
  171. return nil, newError("failed to read IV").Base(err)
  172. }
  173. }
  174. return account.Cipher.NewDecryptionReader(account.Key, iv, reader)
  175. }
  176. func WriteTCPResponse(request *protocol.RequestHeader, writer io.Writer) (buf.Writer, error) {
  177. user := request.User
  178. rawAccount, err := user.GetTypedAccount()
  179. if err != nil {
  180. return nil, newError("failed to parse account.").Base(err).AtError()
  181. }
  182. account := rawAccount.(*MemoryAccount)
  183. var iv []byte
  184. if account.Cipher.IVSize() > 0 {
  185. iv = make([]byte, account.Cipher.IVSize())
  186. common.Must2(rand.Read(iv))
  187. _, err = writer.Write(iv)
  188. if err != nil {
  189. return nil, newError("failed to write IV.").Base(err)
  190. }
  191. }
  192. return account.Cipher.NewEncryptionWriter(account.Key, iv, writer)
  193. }
  194. func EncodeUDPPacket(request *protocol.RequestHeader, payload []byte) (*buf.Buffer, error) {
  195. user := request.User
  196. rawAccount, err := user.GetTypedAccount()
  197. if err != nil {
  198. return nil, newError("failed to parse account.").Base(err).AtError()
  199. }
  200. account := rawAccount.(*MemoryAccount)
  201. buffer := buf.New()
  202. ivLen := account.Cipher.IVSize()
  203. if ivLen > 0 {
  204. common.Must(buffer.Reset(buf.ReadFullFrom(rand.Reader, ivLen)))
  205. }
  206. iv := buffer.Bytes()
  207. if err := socks.AppendAddress(buffer, request.Address, request.Port); err != nil {
  208. return nil, newError("failed to write address").Base(err)
  209. }
  210. buffer.Append(payload)
  211. if !account.Cipher.IsAEAD() && request.Option.Has(RequestOptionOneTimeAuth) {
  212. authenticator := NewAuthenticator(HeaderKeyGenerator(account.Key, iv))
  213. buffer.SetByte(ivLen, buffer.Byte(ivLen)|0x10)
  214. common.Must(buffer.AppendSupplier(authenticator.Authenticate(buffer.BytesFrom(ivLen))))
  215. }
  216. if err := account.Cipher.EncodePacket(account.Key, buffer); err != nil {
  217. return nil, newError("failed to encrypt UDP payload").Base(err)
  218. }
  219. return buffer, nil
  220. }
  221. func DecodeUDPPacket(user *protocol.User, payload *buf.Buffer) (*protocol.RequestHeader, *buf.Buffer, error) {
  222. rawAccount, err := user.GetTypedAccount()
  223. if err != nil {
  224. return nil, nil, newError("failed to parse account").Base(err).AtError()
  225. }
  226. account := rawAccount.(*MemoryAccount)
  227. var iv []byte
  228. if !account.Cipher.IsAEAD() && account.Cipher.IVSize() > 0 {
  229. // Keep track of IV as it gets removed from payload in DecodePacket.
  230. iv = make([]byte, account.Cipher.IVSize())
  231. copy(iv, payload.BytesTo(account.Cipher.IVSize()))
  232. }
  233. if err := account.Cipher.DecodePacket(account.Key, payload); err != nil {
  234. return nil, nil, newError("failed to decrypt UDP payload").Base(err)
  235. }
  236. request := &protocol.RequestHeader{
  237. Version: Version,
  238. User: user,
  239. Command: protocol.RequestCommandUDP,
  240. }
  241. if !account.Cipher.IsAEAD() {
  242. if (payload.Byte(0) & 0x10) == 0x10 {
  243. request.Option |= RequestOptionOneTimeAuth
  244. }
  245. if request.Option.Has(RequestOptionOneTimeAuth) && account.OneTimeAuth == Account_Disabled {
  246. return nil, nil, newError("rejecting packet with OTA enabled, while server disables OTA").AtWarning()
  247. }
  248. if !request.Option.Has(RequestOptionOneTimeAuth) && account.OneTimeAuth == Account_Enabled {
  249. return nil, nil, newError("rejecting packet with OTA disabled, while server enables OTA").AtWarning()
  250. }
  251. if request.Option.Has(RequestOptionOneTimeAuth) {
  252. payloadLen := payload.Len() - AuthSize
  253. authBytes := payload.BytesFrom(payloadLen)
  254. authenticator := NewAuthenticator(HeaderKeyGenerator(account.Key, iv))
  255. actualAuth := make([]byte, AuthSize)
  256. authenticator.Authenticate(payload.BytesTo(payloadLen))(actualAuth)
  257. if !bytes.Equal(actualAuth, authBytes) {
  258. return nil, nil, newError("invalid OTA")
  259. }
  260. payload.Slice(0, payloadLen)
  261. }
  262. }
  263. addrType := (payload.Byte(0) & 0x0F)
  264. payload.SliceFrom(1)
  265. switch addrType {
  266. case AddrTypeIPv4:
  267. request.Address = net.IPAddress(payload.BytesTo(4))
  268. payload.SliceFrom(4)
  269. case AddrTypeIPv6:
  270. request.Address = net.IPAddress(payload.BytesTo(16))
  271. payload.SliceFrom(16)
  272. case AddrTypeDomain:
  273. domainLength := int(payload.Byte(0))
  274. request.Address = net.DomainAddress(string(payload.BytesRange(1, 1+domainLength)))
  275. payload.SliceFrom(1 + domainLength)
  276. default:
  277. return nil, nil, newError("unknown address type: ", addrType).AtError()
  278. }
  279. request.Port = net.PortFromBytes(payload.BytesTo(2))
  280. payload.SliceFrom(2)
  281. return request, payload, nil
  282. }
  283. type UDPReader struct {
  284. Reader io.Reader
  285. User *protocol.User
  286. }
  287. func (v *UDPReader) ReadMultiBuffer() (buf.MultiBuffer, error) {
  288. buffer := buf.New()
  289. err := buffer.AppendSupplier(buf.ReadFrom(v.Reader))
  290. if err != nil {
  291. buffer.Release()
  292. return nil, err
  293. }
  294. _, payload, err := DecodeUDPPacket(v.User, buffer)
  295. if err != nil {
  296. buffer.Release()
  297. return nil, err
  298. }
  299. return buf.NewMultiBufferValue(payload), nil
  300. }
  301. type UDPWriter struct {
  302. Writer io.Writer
  303. Request *protocol.RequestHeader
  304. }
  305. // Write implements io.Writer.
  306. func (w *UDPWriter) Write(payload []byte) (int, error) {
  307. packet, err := EncodeUDPPacket(w.Request, payload)
  308. if err != nil {
  309. return 0, err
  310. }
  311. _, err = w.Writer.Write(packet.Bytes())
  312. packet.Release()
  313. return len(payload), err
  314. }