vmess.go 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216
  1. // Package vmess contains protocol definition, io lib for VMess.
  2. package protocol
  3. import (
  4. "crypto/aes"
  5. "crypto/cipher"
  6. "encoding/binary"
  7. "hash/fnv"
  8. "io"
  9. "time"
  10. "github.com/v2ray/v2ray-core/common/alloc"
  11. v2io "github.com/v2ray/v2ray-core/common/io"
  12. "github.com/v2ray/v2ray-core/common/log"
  13. v2net "github.com/v2ray/v2ray-core/common/net"
  14. "github.com/v2ray/v2ray-core/proxy"
  15. "github.com/v2ray/v2ray-core/proxy/vmess/config"
  16. "github.com/v2ray/v2ray-core/proxy/vmess/protocol/user"
  17. "github.com/v2ray/v2ray-core/transport"
  18. )
  19. const (
  20. addrTypeIPv4 = byte(0x01)
  21. addrTypeIPv6 = byte(0x03)
  22. addrTypeDomain = byte(0x02)
  23. CmdTCP = byte(0x01)
  24. CmdUDP = byte(0x02)
  25. Version = byte(0x01)
  26. blockSize = 16
  27. )
  28. // VMessRequest implements the request message of VMess protocol. It only contains the header of a
  29. // request message. The data part will be handled by conection handler directly, in favor of data
  30. // streaming.
  31. type VMessRequest struct {
  32. Version byte
  33. UserId config.ID
  34. RequestIV []byte
  35. RequestKey []byte
  36. ResponseHeader []byte
  37. Command byte
  38. Address v2net.Address
  39. }
  40. // Destination is the final destination of this request.
  41. func (request *VMessRequest) Destination() v2net.Destination {
  42. if request.Command == CmdTCP {
  43. return v2net.NewTCPDestination(request.Address)
  44. } else {
  45. return v2net.NewUDPDestination(request.Address)
  46. }
  47. }
  48. // VMessRequestReader is a parser to read VMessRequest from a byte stream.
  49. type VMessRequestReader struct {
  50. vUserSet user.UserSet
  51. }
  52. // NewVMessRequestReader creates a new VMessRequestReader with a given UserSet
  53. func NewVMessRequestReader(vUserSet user.UserSet) *VMessRequestReader {
  54. return &VMessRequestReader{
  55. vUserSet: vUserSet,
  56. }
  57. }
  58. // Read reads a VMessRequest from a byte stream.
  59. func (r *VMessRequestReader) Read(reader io.Reader) (*VMessRequest, error) {
  60. buffer := alloc.NewSmallBuffer()
  61. nBytes, err := v2net.ReadAllBytes(reader, buffer.Value[:config.IDBytesLen])
  62. if err != nil {
  63. return nil, err
  64. }
  65. userId, timeSec, valid := r.vUserSet.GetUser(buffer.Value[:nBytes])
  66. if !valid {
  67. return nil, proxy.InvalidAuthentication
  68. }
  69. aesCipher, err := aes.NewCipher(userId.CmdKey())
  70. if err != nil {
  71. return nil, err
  72. }
  73. aesStream := cipher.NewCFBDecrypter(aesCipher, user.Int64Hash(timeSec))
  74. decryptor := v2io.NewCryptionReader(aesStream, reader)
  75. if err != nil {
  76. return nil, err
  77. }
  78. nBytes, err = v2net.ReadAllBytes(decryptor, buffer.Value[:41])
  79. if err != nil {
  80. return nil, err
  81. }
  82. bufferLen := nBytes
  83. request := &VMessRequest{
  84. UserId: *userId,
  85. Version: buffer.Value[0],
  86. }
  87. if request.Version != Version {
  88. log.Warning("Invalid protocol version %d", request.Version)
  89. return nil, proxy.InvalidProtocolVersion
  90. }
  91. request.RequestIV = buffer.Value[1:17] // 16 bytes
  92. request.RequestKey = buffer.Value[17:33] // 16 bytes
  93. request.ResponseHeader = buffer.Value[33:37] // 4 bytes
  94. request.Command = buffer.Value[37]
  95. port := binary.BigEndian.Uint16(buffer.Value[38:40])
  96. switch buffer.Value[40] {
  97. case addrTypeIPv4:
  98. _, err = v2net.ReadAllBytes(decryptor, buffer.Value[41:45]) // 4 bytes
  99. bufferLen += 4
  100. if err != nil {
  101. return nil, err
  102. }
  103. request.Address = v2net.IPAddress(buffer.Value[41:45], port)
  104. case addrTypeIPv6:
  105. _, err = v2net.ReadAllBytes(decryptor, buffer.Value[41:57]) // 16 bytes
  106. bufferLen += 16
  107. if err != nil {
  108. return nil, err
  109. }
  110. request.Address = v2net.IPAddress(buffer.Value[41:57], port)
  111. case addrTypeDomain:
  112. _, err = v2net.ReadAllBytes(decryptor, buffer.Value[41:42])
  113. if err != nil {
  114. return nil, err
  115. }
  116. domainLength := int(buffer.Value[41])
  117. _, err = v2net.ReadAllBytes(decryptor, buffer.Value[42:42+domainLength])
  118. if err != nil {
  119. return nil, err
  120. }
  121. bufferLen += 1 + domainLength
  122. request.Address = v2net.DomainAddress(string(buffer.Value[42:42+domainLength]), port)
  123. }
  124. _, err = v2net.ReadAllBytes(decryptor, buffer.Value[bufferLen:bufferLen+4])
  125. if err != nil {
  126. return nil, err
  127. }
  128. fnv1a := fnv.New32a()
  129. fnv1a.Write(buffer.Value[:bufferLen])
  130. actualHash := fnv1a.Sum32()
  131. expectedHash := binary.BigEndian.Uint32(buffer.Value[bufferLen : bufferLen+4])
  132. if actualHash != expectedHash {
  133. return nil, transport.CorruptedPacket
  134. }
  135. return request, nil
  136. }
  137. // ToBytes returns a VMessRequest in the form of byte array.
  138. func (request *VMessRequest) ToBytes(idHash user.CounterHash, randomRangeInt64 user.RandomInt64InRange, buffer []byte) ([]byte, error) {
  139. if buffer == nil {
  140. buffer = make([]byte, 0, 300)
  141. }
  142. counter := randomRangeInt64(time.Now().UTC().Unix(), 30)
  143. hash := idHash.Hash(request.UserId.Bytes[:], counter)
  144. buffer = append(buffer, hash...)
  145. encryptionBegin := len(buffer)
  146. buffer = append(buffer, request.Version)
  147. buffer = append(buffer, request.RequestIV...)
  148. buffer = append(buffer, request.RequestKey...)
  149. buffer = append(buffer, request.ResponseHeader...)
  150. buffer = append(buffer, request.Command)
  151. buffer = append(buffer, request.Address.PortBytes()...)
  152. switch {
  153. case request.Address.IsIPv4():
  154. buffer = append(buffer, addrTypeIPv4)
  155. buffer = append(buffer, request.Address.IP()...)
  156. case request.Address.IsIPv6():
  157. buffer = append(buffer, addrTypeIPv6)
  158. buffer = append(buffer, request.Address.IP()...)
  159. case request.Address.IsDomain():
  160. buffer = append(buffer, addrTypeDomain)
  161. buffer = append(buffer, byte(len(request.Address.Domain())))
  162. buffer = append(buffer, []byte(request.Address.Domain())...)
  163. }
  164. encryptionEnd := len(buffer)
  165. fnv1a := fnv.New32a()
  166. fnv1a.Write(buffer[encryptionBegin:encryptionEnd])
  167. fnvHash := fnv1a.Sum32()
  168. buffer = append(buffer, byte(fnvHash>>24))
  169. buffer = append(buffer, byte(fnvHash>>16))
  170. buffer = append(buffer, byte(fnvHash>>8))
  171. buffer = append(buffer, byte(fnvHash))
  172. encryptionEnd += 4
  173. aesCipher, err := aes.NewCipher(request.UserId.CmdKey())
  174. if err != nil {
  175. return nil, err
  176. }
  177. aesStream := cipher.NewCFBEncrypter(aesCipher, user.Int64Hash(counter))
  178. aesStream.XORKeyStream(buffer[encryptionBegin:encryptionEnd], buffer[encryptionBegin:encryptionEnd])
  179. return buffer, nil
  180. }