encoding.go 9.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290
  1. package shadowsocks2022
  2. import (
  3. "bytes"
  4. "crypto/cipher"
  5. cryptoRand "crypto/rand"
  6. "encoding/binary"
  7. "io"
  8. "time"
  9. "github.com/lunixbochs/struc"
  10. "github.com/v2fly/v2ray-core/v5/common"
  11. "github.com/v2fly/v2ray-core/v5/common/buf"
  12. "github.com/v2fly/v2ray-core/v5/common/crypto"
  13. "github.com/v2fly/v2ray-core/v5/common/dice"
  14. "github.com/v2fly/v2ray-core/v5/common/net"
  15. "github.com/v2fly/v2ray-core/v5/common/protocol"
  16. )
  17. type TCPRequest struct {
  18. keyDerivation KeyDerivation
  19. method Method
  20. c2sSalt RequestSalt
  21. c2sNonce crypto.BytesGenerator
  22. c2sAEAD cipher.AEAD
  23. s2cSalt RequestSalt
  24. s2cNonce crypto.BytesGenerator
  25. s2cAEAD cipher.AEAD
  26. s2cSaltAssert RequestSalt
  27. s2cInitialPayloadSize int
  28. }
  29. func (t *TCPRequest) EncodeTCPRequestHeader(effectivePsk []byte,
  30. eih [][]byte, address DestinationAddress, destPort int, initialPayload []byte, out *buf.Buffer,
  31. ) error {
  32. requestSalt := newRequestSaltWithLength(t.method.GetSessionSubKeyAndSaltLength())
  33. {
  34. err := requestSalt.FillAllFrom(cryptoRand.Reader)
  35. if err != nil {
  36. return newError("failed to fill salt").Base(err)
  37. }
  38. }
  39. t.c2sSalt = requestSalt
  40. sessionKey := make([]byte, t.method.GetSessionSubKeyAndSaltLength())
  41. {
  42. err := t.keyDerivation.GetSessionSubKey(effectivePsk, requestSalt.Bytes(), sessionKey)
  43. if err != nil {
  44. return newError("failed to get session sub key").Base(err)
  45. }
  46. }
  47. aead, err := t.method.GetStreamAEAD(sessionKey)
  48. if err != nil {
  49. return newError("failed to get stream AEAD").Base(err)
  50. }
  51. t.c2sAEAD = aead
  52. paddingLength := TCPMinPaddingLength
  53. if initialPayload == nil {
  54. initialPayload = []byte{}
  55. paddingLength += 1 + dice.RollWith(TCPMaxPaddingLength, cryptoRand.Reader)
  56. }
  57. variableLengthHeader := &TCPRequestHeader3VariableLength{
  58. DestinationAddress: address,
  59. Contents: struct {
  60. PaddingLength uint16 `struc:"sizeof=Padding"`
  61. Padding []byte
  62. }(struct {
  63. PaddingLength uint16
  64. Padding []byte
  65. }{
  66. PaddingLength: uint16(paddingLength),
  67. Padding: make([]byte, paddingLength),
  68. }),
  69. }
  70. variableLengthHeaderBuffer := buf.New()
  71. defer variableLengthHeaderBuffer.Release()
  72. {
  73. err := addrParser.WriteAddressPort(variableLengthHeaderBuffer, address, net.Port(destPort))
  74. if err != nil {
  75. return newError("failed to write address port").Base(err)
  76. }
  77. }
  78. {
  79. err := struc.Pack(variableLengthHeaderBuffer, &variableLengthHeader.Contents)
  80. if err != nil {
  81. return newError("failed to pack variable length header").Base(err)
  82. }
  83. }
  84. {
  85. _, err := variableLengthHeaderBuffer.Write(initialPayload)
  86. if err != nil {
  87. return newError("failed to write initial payload").Base(err)
  88. }
  89. }
  90. fixedLengthHeader := &TCPRequestHeader2FixedLength{
  91. Type: TCPHeaderTypeClientToServerStream,
  92. Timestamp: uint64(time.Now().Unix()),
  93. HeaderLength: uint16(variableLengthHeaderBuffer.Len()),
  94. }
  95. fixedLengthHeaderBuffer := buf.New()
  96. defer fixedLengthHeaderBuffer.Release()
  97. {
  98. err := struc.Pack(fixedLengthHeaderBuffer, fixedLengthHeader)
  99. if err != nil {
  100. return newError("failed to pack fixed length header").Base(err)
  101. }
  102. }
  103. eihHeader := ExtensibleIdentityHeaders(newAESEIH(0))
  104. if len(eih) != 0 {
  105. eihGenerator := newAESEIHGeneratorContainer(len(eih), effectivePsk, eih)
  106. eihHeaderGenerated, err := eihGenerator.GenerateEIH(t.keyDerivation, t.method, requestSalt.Bytes())
  107. if err != nil {
  108. return newError("failed to construct EIH").Base(err)
  109. }
  110. eihHeader = eihHeaderGenerated
  111. }
  112. preSessionKeyHeader := &TCPRequestHeader1PreSessionKey{
  113. Salt: requestSalt,
  114. EIH: eihHeader,
  115. }
  116. preSessionKeyHeaderBuffer := buf.New()
  117. defer preSessionKeyHeaderBuffer.Release()
  118. {
  119. err := struc.Pack(preSessionKeyHeaderBuffer, preSessionKeyHeader)
  120. if err != nil {
  121. return newError("failed to pack pre session key header").Base(err)
  122. }
  123. }
  124. requestNonce := crypto.GenerateInitialAEADNonce()
  125. t.c2sNonce = requestNonce
  126. {
  127. n, err := out.Write(preSessionKeyHeaderBuffer.BytesFrom(0))
  128. if err != nil {
  129. return newError("failed to write pre session key header").Base(err)
  130. }
  131. if int32(n) != preSessionKeyHeaderBuffer.Len() {
  132. return newError("failed to write pre session key header")
  133. }
  134. }
  135. {
  136. fixedLengthEncrypted := out.Extend(fixedLengthHeaderBuffer.Len() + int32(aead.Overhead()))
  137. aead.Seal(fixedLengthEncrypted[:0], requestNonce(), fixedLengthHeaderBuffer.Bytes(), nil)
  138. }
  139. {
  140. variableLengthEncrypted := out.Extend(variableLengthHeaderBuffer.Len() + int32(aead.Overhead()))
  141. aead.Seal(variableLengthEncrypted[:0], requestNonce(), variableLengthHeaderBuffer.Bytes(), nil)
  142. }
  143. return nil
  144. }
  145. func (t *TCPRequest) DecodeTCPResponseHeader(effectivePsk []byte, in io.Reader) error {
  146. var preSessionKeyHeader TCPResponseHeader1PreSessionKey
  147. preSessionKeyHeader.Salt = newRequestSaltWithLength(t.method.GetSessionSubKeyAndSaltLength())
  148. {
  149. err := struc.Unpack(in, &preSessionKeyHeader)
  150. if err != nil {
  151. return newError("failed to unpack pre session key header").Base(err)
  152. }
  153. }
  154. s2cSalt := preSessionKeyHeader.Salt.Bytes()
  155. t.s2cSalt = preSessionKeyHeader.Salt
  156. sessionKey := make([]byte, t.method.GetSessionSubKeyAndSaltLength())
  157. {
  158. err := t.keyDerivation.GetSessionSubKey(effectivePsk, s2cSalt, sessionKey)
  159. if err != nil {
  160. return newError("failed to get session sub key").Base(err)
  161. }
  162. }
  163. aead, err := t.method.GetStreamAEAD(sessionKey)
  164. if err != nil {
  165. return newError("failed to get stream AEAD").Base(err)
  166. }
  167. t.s2cAEAD = aead
  168. fixedLengthHeaderEncryptedBuffer := buf.New()
  169. defer fixedLengthHeaderEncryptedBuffer.Release()
  170. {
  171. _, err := fixedLengthHeaderEncryptedBuffer.ReadFullFrom(in, 11+int32(t.method.GetSessionSubKeyAndSaltLength())+int32(aead.Overhead()))
  172. if err != nil {
  173. return newError("failed to read fixed length header encrypted").Base(err)
  174. }
  175. }
  176. s2cNonce := crypto.GenerateInitialAEADNonce()
  177. t.s2cNonce = s2cNonce
  178. fixedLengthHeaderDecryptedBuffer := buf.New()
  179. defer fixedLengthHeaderDecryptedBuffer.Release()
  180. {
  181. decryptionBuffer := fixedLengthHeaderDecryptedBuffer.Extend(11 + int32(t.method.GetSessionSubKeyAndSaltLength()))
  182. _, err = aead.Open(decryptionBuffer[:0], s2cNonce(), fixedLengthHeaderEncryptedBuffer.Bytes(), nil)
  183. if err != nil {
  184. return newError("failed to decrypt fixed length header").Base(err)
  185. }
  186. }
  187. var fixedLengthHeader TCPResponseHeader2FixedLength
  188. fixedLengthHeader.RequestSalt = newRequestSaltWithLength(t.method.GetSessionSubKeyAndSaltLength())
  189. {
  190. err := struc.Unpack(bytes.NewReader(fixedLengthHeaderDecryptedBuffer.Bytes()), &fixedLengthHeader)
  191. if err != nil {
  192. return newError("failed to unpack fixed length header").Base(err)
  193. }
  194. }
  195. if fixedLengthHeader.Type != TCPHeaderTypeServerToClientStream {
  196. return newError("unexpected TCP header type")
  197. }
  198. timeDifference := int64(fixedLengthHeader.Timestamp) - time.Now().Unix()
  199. if timeDifference < -30 || timeDifference > 30 {
  200. return newError("timestamp is too far away, timeDifference = ", timeDifference)
  201. }
  202. t.s2cSaltAssert = fixedLengthHeader.RequestSalt
  203. t.s2cInitialPayloadSize = int(fixedLengthHeader.InitialPayloadLength)
  204. return nil
  205. }
  206. func (t *TCPRequest) CheckC2SConnectionConstraint() error {
  207. if !bytes.Equal(t.c2sSalt.Bytes(), t.s2cSaltAssert.Bytes()) {
  208. return newError("c2s salt not equal to s2c salt assert")
  209. }
  210. return nil
  211. }
  212. func (t *TCPRequest) CreateClientS2CReader(in io.Reader, initialPayload *buf.Buffer) (buf.Reader, error) {
  213. AEADAuthenticator := &crypto.AEADAuthenticator{
  214. AEAD: t.s2cAEAD,
  215. NonceGenerator: t.s2cNonce,
  216. AdditionalDataGenerator: crypto.GenerateEmptyBytes(),
  217. }
  218. initialPayloadEncrypted := buf.NewWithSize(65535)
  219. defer initialPayloadEncrypted.Release()
  220. initialPayloadEncryptedBytes := initialPayloadEncrypted.Extend(int32(t.s2cAEAD.Overhead()) + int32(t.s2cInitialPayloadSize))
  221. _, err := io.ReadFull(in, initialPayloadEncryptedBytes)
  222. if err != nil {
  223. return nil, newError("failed to read initial payload").Base(err)
  224. }
  225. initialPayloadBytes := initialPayload.Extend(int32(t.s2cInitialPayloadSize))
  226. _, err = t.s2cAEAD.Open(initialPayloadBytes[:0], t.s2cNonce(), initialPayloadEncryptedBytes, nil)
  227. if err != nil {
  228. return nil, newError("failed to decrypt initial payload").Base(err)
  229. }
  230. return crypto.NewAuthenticationReader(AEADAuthenticator, &AEADChunkSizeParser{
  231. Auth: AEADAuthenticator,
  232. }, in, protocol.TransferTypeStream, nil), nil
  233. }
  234. func (t *TCPRequest) CreateClientC2SWriter(writer io.Writer) buf.Writer {
  235. AEADAuthenticator := &crypto.AEADAuthenticator{
  236. AEAD: t.c2sAEAD,
  237. NonceGenerator: t.c2sNonce,
  238. AdditionalDataGenerator: crypto.GenerateEmptyBytes(),
  239. }
  240. sizeParser := &crypto.AEADChunkSizeParser{
  241. Auth: AEADAuthenticator,
  242. }
  243. return crypto.NewAuthenticationWriter(AEADAuthenticator, sizeParser, writer, protocol.TransferTypeStream, nil)
  244. }
  245. type AEADChunkSizeParser struct {
  246. Auth *crypto.AEADAuthenticator
  247. }
  248. func (p *AEADChunkSizeParser) HasConstantOffset() uint16 {
  249. return uint16(p.Auth.Overhead())
  250. }
  251. func (p *AEADChunkSizeParser) SizeBytes() int32 {
  252. return 2 + int32(p.Auth.Overhead())
  253. }
  254. func (p *AEADChunkSizeParser) Encode(size uint16, b []byte) []byte {
  255. binary.BigEndian.PutUint16(b, size-uint16(p.Auth.Overhead()))
  256. b, err := p.Auth.Seal(b[:0], b[:2])
  257. common.Must(err)
  258. return b
  259. }
  260. func (p *AEADChunkSizeParser) Decode(b []byte) (uint16, error) {
  261. b, err := p.Auth.Open(b[:0], b)
  262. if err != nil {
  263. return 0, err
  264. }
  265. return binary.BigEndian.Uint16(b), nil
  266. }