outbound.go 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205
  1. package outbound
  2. import (
  3. "crypto/md5"
  4. "crypto/rand"
  5. "net"
  6. "sync"
  7. "time"
  8. "github.com/v2ray/v2ray-core/app"
  9. "github.com/v2ray/v2ray-core/common/alloc"
  10. v2crypto "github.com/v2ray/v2ray-core/common/crypto"
  11. "github.com/v2ray/v2ray-core/common/log"
  12. v2net "github.com/v2ray/v2ray-core/common/net"
  13. "github.com/v2ray/v2ray-core/proxy"
  14. "github.com/v2ray/v2ray-core/proxy/internal"
  15. "github.com/v2ray/v2ray-core/proxy/vmess/protocol"
  16. "github.com/v2ray/v2ray-core/proxy/vmess/protocol/user"
  17. "github.com/v2ray/v2ray-core/transport/ray"
  18. )
  19. type VMessOutboundHandler struct {
  20. receiverManager *ReceiverManager
  21. space app.Space
  22. }
  23. func (this *VMessOutboundHandler) Dispatch(firstPacket v2net.Packet, ray ray.OutboundRay) error {
  24. vNextAddress, vNextUser := this.receiverManager.PickReceiver()
  25. command := protocol.CmdTCP
  26. if firstPacket.Destination().IsUDP() {
  27. command = protocol.CmdUDP
  28. }
  29. request := &protocol.VMessRequest{
  30. Version: protocol.Version,
  31. User: vNextUser,
  32. Command: command,
  33. Address: firstPacket.Destination().Address(),
  34. Port: firstPacket.Destination().Port(),
  35. }
  36. buffer := alloc.NewSmallBuffer()
  37. defer buffer.Release() // Buffer is released after communication finishes.
  38. v2net.ReadAllBytes(rand.Reader, buffer.Value[:33]) // 16 + 16 + 1
  39. buffer.Value[33] = 0
  40. buffer.Value[34] = 0
  41. buffer.Value[35] = 0
  42. request.RequestIV = buffer.Value[:16]
  43. request.RequestKey = buffer.Value[16:32]
  44. request.ResponseHeader = buffer.Value[32:36]
  45. return startCommunicate(request, vNextAddress, ray, firstPacket)
  46. }
  47. func startCommunicate(request *protocol.VMessRequest, dest v2net.Destination, ray ray.OutboundRay, firstPacket v2net.Packet) error {
  48. var destIp net.IP
  49. if dest.Address().IsIPv4() || dest.Address().IsIPv6() {
  50. destIp = dest.Address().IP()
  51. } else {
  52. ips, err := net.LookupIP(dest.Address().Domain())
  53. if err != nil {
  54. return err
  55. }
  56. destIp = ips[0]
  57. }
  58. conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{
  59. IP: destIp,
  60. Port: int(dest.Port()),
  61. })
  62. if err != nil {
  63. log.Error("Failed to open %s: %v", dest.String(), err)
  64. if ray != nil {
  65. close(ray.OutboundOutput())
  66. }
  67. return err
  68. }
  69. log.Info("VMessOut: Tunneling request to %s via %s", request.Address.String(), dest.String())
  70. defer conn.Close()
  71. input := ray.OutboundInput()
  72. output := ray.OutboundOutput()
  73. var requestFinish, responseFinish sync.Mutex
  74. requestFinish.Lock()
  75. responseFinish.Lock()
  76. go handleRequest(conn, request, firstPacket, input, &requestFinish)
  77. go handleResponse(conn, request, output, &responseFinish, (request.Command == protocol.CmdUDP))
  78. requestFinish.Lock()
  79. conn.CloseWrite()
  80. responseFinish.Lock()
  81. return nil
  82. }
  83. func handleRequest(conn net.Conn, request *protocol.VMessRequest, firstPacket v2net.Packet, input <-chan *alloc.Buffer, finish *sync.Mutex) {
  84. defer finish.Unlock()
  85. aesStream, err := v2crypto.NewAesEncryptionStream(request.RequestKey[:], request.RequestIV[:])
  86. if err != nil {
  87. log.Error("VMessOut: Failed to create AES encryption stream: %v", err)
  88. return
  89. }
  90. encryptRequestWriter := v2crypto.NewCryptionWriter(aesStream, conn)
  91. buffer := alloc.NewBuffer().Clear()
  92. defer buffer.Release()
  93. buffer, err = request.ToBytes(user.NewRandomTimestampGenerator(user.Timestamp(time.Now().Unix()), 30), buffer)
  94. if err != nil {
  95. log.Error("VMessOut: Failed to serialize VMess request: %v", err)
  96. return
  97. }
  98. // Send first packet of payload together with request, in favor of small requests.
  99. firstChunk := firstPacket.Chunk()
  100. moreChunks := firstPacket.MoreChunks()
  101. for firstChunk == nil && moreChunks {
  102. firstChunk, moreChunks = <-input
  103. }
  104. if firstChunk == nil && !moreChunks {
  105. log.Warning("VMessOut: Nothing to send. Existing...")
  106. return
  107. }
  108. aesStream.XORKeyStream(firstChunk.Value, firstChunk.Value)
  109. buffer.Append(firstChunk.Value)
  110. firstChunk.Release()
  111. _, err = conn.Write(buffer.Value)
  112. if err != nil {
  113. log.Error("VMessOut: Failed to write VMess request: %v", err)
  114. return
  115. }
  116. if moreChunks {
  117. v2net.ChanToWriter(encryptRequestWriter, input)
  118. }
  119. return
  120. }
  121. func headerMatch(request *protocol.VMessRequest, responseHeader []byte) bool {
  122. return (request.ResponseHeader[0] == responseHeader[0])
  123. }
  124. func handleResponse(conn net.Conn, request *protocol.VMessRequest, output chan<- *alloc.Buffer, finish *sync.Mutex, isUDP bool) {
  125. defer finish.Unlock()
  126. defer close(output)
  127. responseKey := md5.Sum(request.RequestKey[:])
  128. responseIV := md5.Sum(request.RequestIV[:])
  129. aesStream, err := v2crypto.NewAesDecryptionStream(responseKey[:], responseIV[:])
  130. if err != nil {
  131. log.Error("VMessOut: Failed to create AES encryption stream: %v", err)
  132. return
  133. }
  134. decryptResponseReader := v2crypto.NewCryptionReader(aesStream, conn)
  135. buffer, err := v2net.ReadFrom(decryptResponseReader, nil)
  136. if err != nil {
  137. log.Error("VMessOut: Failed to read VMess response (%d bytes): %v", buffer.Len(), err)
  138. buffer.Release()
  139. return
  140. }
  141. if buffer.Len() < 4 || !headerMatch(request, buffer.Value[:2]) {
  142. log.Warning("VMessOut: unexepcted response header. The connection is probably hijacked.")
  143. return
  144. }
  145. log.Info("VMessOut received %d bytes from %s", buffer.Len()-4, conn.RemoteAddr().String())
  146. responseBegin := 4
  147. if buffer.Value[2] != 0 {
  148. dataLen := int(buffer.Value[3])
  149. if buffer.Len() < dataLen+4 { // Rare case
  150. diffBuffer := make([]byte, dataLen+4-buffer.Len())
  151. v2net.ReadAllBytes(decryptResponseReader, diffBuffer)
  152. buffer.Append(diffBuffer)
  153. }
  154. command := buffer.Value[2]
  155. data := buffer.Value[4 : 4+dataLen]
  156. go handleCommand(command, data)
  157. responseBegin = 4 + dataLen
  158. }
  159. buffer.SliceFrom(responseBegin)
  160. output <- buffer
  161. if !isUDP {
  162. v2net.ReaderToChan(output, decryptResponseReader)
  163. }
  164. return
  165. }
  166. func init() {
  167. internal.MustRegisterOutboundConnectionHandlerCreator("vmess",
  168. func(space app.Space, rawConfig interface{}) (proxy.OutboundConnectionHandler, error) {
  169. vOutConfig := rawConfig.(Config)
  170. return &VMessOutboundHandler{
  171. space: space,
  172. receiverManager: NewReceiverManager(vOutConfig.Receivers()),
  173. }, nil
  174. })
  175. }