shadowsocks_test.go 23 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988
  1. package scenarios
  2. import (
  3. "crypto/rand"
  4. "sync"
  5. "testing"
  6. "time"
  7. "github.com/google/go-cmp/cmp"
  8. "golang.org/x/sync/errgroup"
  9. "v2ray.com/core"
  10. "v2ray.com/core/app/log"
  11. "v2ray.com/core/app/proxyman"
  12. "v2ray.com/core/common"
  13. "v2ray.com/core/common/compare"
  14. "v2ray.com/core/common/errors"
  15. clog "v2ray.com/core/common/log"
  16. "v2ray.com/core/common/net"
  17. "v2ray.com/core/common/protocol"
  18. "v2ray.com/core/common/serial"
  19. "v2ray.com/core/proxy/dokodemo"
  20. "v2ray.com/core/proxy/freedom"
  21. "v2ray.com/core/proxy/shadowsocks"
  22. "v2ray.com/core/testing/servers/tcp"
  23. "v2ray.com/core/testing/servers/udp"
  24. . "v2ray.com/ext/assert"
  25. )
  26. func TestShadowsocksAES256TCP(t *testing.T) {
  27. tcpServer := tcp.Server{
  28. MsgProcessor: xor,
  29. }
  30. dest, err := tcpServer.Start()
  31. common.Must(err)
  32. defer tcpServer.Close()
  33. account := serial.ToTypedMessage(&shadowsocks.Account{
  34. Password: "shadowsocks-password",
  35. CipherType: shadowsocks.CipherType_AES_256_CFB,
  36. Ota: shadowsocks.Account_Enabled,
  37. })
  38. serverPort := tcp.PickPort()
  39. serverConfig := &core.Config{
  40. App: []*serial.TypedMessage{
  41. serial.ToTypedMessage(&log.Config{
  42. ErrorLogLevel: clog.Severity_Debug,
  43. ErrorLogType: log.LogType_Console,
  44. }),
  45. },
  46. Inbound: []*core.InboundHandlerConfig{
  47. {
  48. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  49. PortRange: net.SinglePortRange(serverPort),
  50. Listen: net.NewIPOrDomain(net.LocalHostIP),
  51. }),
  52. ProxySettings: serial.ToTypedMessage(&shadowsocks.ServerConfig{
  53. User: &protocol.User{
  54. Account: account,
  55. Level: 1,
  56. },
  57. Network: []net.Network{net.Network_TCP},
  58. }),
  59. },
  60. },
  61. Outbound: []*core.OutboundHandlerConfig{
  62. {
  63. ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
  64. },
  65. },
  66. }
  67. clientPort := tcp.PickPort()
  68. clientConfig := &core.Config{
  69. App: []*serial.TypedMessage{
  70. serial.ToTypedMessage(&log.Config{
  71. ErrorLogLevel: clog.Severity_Debug,
  72. ErrorLogType: log.LogType_Console,
  73. }),
  74. },
  75. Inbound: []*core.InboundHandlerConfig{
  76. {
  77. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  78. PortRange: net.SinglePortRange(clientPort),
  79. Listen: net.NewIPOrDomain(net.LocalHostIP),
  80. }),
  81. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  82. Address: net.NewIPOrDomain(dest.Address),
  83. Port: uint32(dest.Port),
  84. NetworkList: &net.NetworkList{
  85. Network: []net.Network{net.Network_TCP},
  86. },
  87. }),
  88. },
  89. },
  90. Outbound: []*core.OutboundHandlerConfig{
  91. {
  92. ProxySettings: serial.ToTypedMessage(&shadowsocks.ClientConfig{
  93. Server: []*protocol.ServerEndpoint{
  94. {
  95. Address: net.NewIPOrDomain(net.LocalHostIP),
  96. Port: uint32(serverPort),
  97. User: []*protocol.User{
  98. {
  99. Account: account,
  100. },
  101. },
  102. },
  103. },
  104. }),
  105. },
  106. },
  107. }
  108. servers, err := InitializeServerConfigs(serverConfig, clientConfig)
  109. common.Must(err)
  110. defer CloseAllServers(servers)
  111. var errg errgroup.Group
  112. for i := 0; i < 10; i++ {
  113. errg.Go(func() error {
  114. conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{
  115. IP: []byte{127, 0, 0, 1},
  116. Port: int(clientPort),
  117. })
  118. if err != nil {
  119. return err
  120. }
  121. defer conn.Close()
  122. payload := make([]byte, 10240*1024)
  123. common.Must2(rand.Read(payload))
  124. nBytes, err := conn.Write([]byte(payload))
  125. if err != nil {
  126. return err
  127. }
  128. if nBytes != len(payload) {
  129. return errors.New("expect ", len(payload), " written, but actually ", nBytes)
  130. }
  131. response := readFrom(conn, time.Second*20, 10240*1024)
  132. if r := cmp.Diff(response, xor([]byte(payload))); r != "" {
  133. return errors.New(r)
  134. }
  135. return nil
  136. })
  137. }
  138. if err := errg.Wait(); err != nil {
  139. t.Fatal(err)
  140. }
  141. }
  142. func TestShadowsocksAES128UDP(t *testing.T) {
  143. udpServer := udp.Server{
  144. MsgProcessor: xor,
  145. }
  146. dest, err := udpServer.Start()
  147. common.Must(err)
  148. defer udpServer.Close()
  149. account := serial.ToTypedMessage(&shadowsocks.Account{
  150. Password: "shadowsocks-password",
  151. CipherType: shadowsocks.CipherType_AES_128_CFB,
  152. Ota: shadowsocks.Account_Enabled,
  153. })
  154. serverPort := tcp.PickPort()
  155. serverConfig := &core.Config{
  156. App: []*serial.TypedMessage{
  157. serial.ToTypedMessage(&log.Config{
  158. ErrorLogLevel: clog.Severity_Debug,
  159. ErrorLogType: log.LogType_Console,
  160. }),
  161. },
  162. Inbound: []*core.InboundHandlerConfig{
  163. {
  164. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  165. PortRange: net.SinglePortRange(serverPort),
  166. Listen: net.NewIPOrDomain(net.LocalHostIP),
  167. }),
  168. ProxySettings: serial.ToTypedMessage(&shadowsocks.ServerConfig{
  169. User: &protocol.User{
  170. Account: account,
  171. Level: 1,
  172. },
  173. Network: []net.Network{net.Network_UDP},
  174. }),
  175. },
  176. },
  177. Outbound: []*core.OutboundHandlerConfig{
  178. {
  179. ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
  180. },
  181. },
  182. }
  183. clientPort := tcp.PickPort()
  184. clientConfig := &core.Config{
  185. App: []*serial.TypedMessage{
  186. serial.ToTypedMessage(&log.Config{
  187. ErrorLogLevel: clog.Severity_Debug,
  188. ErrorLogType: log.LogType_Console,
  189. }),
  190. },
  191. Inbound: []*core.InboundHandlerConfig{
  192. {
  193. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  194. PortRange: net.SinglePortRange(clientPort),
  195. Listen: net.NewIPOrDomain(net.LocalHostIP),
  196. }),
  197. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  198. Address: net.NewIPOrDomain(dest.Address),
  199. Port: uint32(dest.Port),
  200. NetworkList: &net.NetworkList{
  201. Network: []net.Network{net.Network_UDP},
  202. },
  203. }),
  204. },
  205. },
  206. Outbound: []*core.OutboundHandlerConfig{
  207. {
  208. ProxySettings: serial.ToTypedMessage(&shadowsocks.ClientConfig{
  209. Server: []*protocol.ServerEndpoint{
  210. {
  211. Address: net.NewIPOrDomain(net.LocalHostIP),
  212. Port: uint32(serverPort),
  213. User: []*protocol.User{
  214. {
  215. Account: account,
  216. },
  217. },
  218. },
  219. },
  220. }),
  221. },
  222. },
  223. }
  224. servers, err := InitializeServerConfigs(serverConfig, clientConfig)
  225. common.Must(err)
  226. defer CloseAllServers(servers)
  227. var errg errgroup.Group
  228. for i := 0; i < 10; i++ {
  229. errg.Go(func() error {
  230. conn, err := net.DialUDP("udp", nil, &net.UDPAddr{
  231. IP: []byte{127, 0, 0, 1},
  232. Port: int(clientPort),
  233. })
  234. if err != nil {
  235. return err
  236. }
  237. defer conn.Close()
  238. payload := make([]byte, 1024)
  239. common.Must2(rand.Read(payload))
  240. nBytes, err := conn.Write([]byte(payload))
  241. if err != nil {
  242. return err
  243. }
  244. if nBytes != len(payload) {
  245. return errors.New("expect ", len(payload), " written, but actually ", nBytes)
  246. }
  247. response := readFrom(conn, time.Second*5, 1024)
  248. if r := cmp.Diff(response, xor(payload)); r != "" {
  249. return errors.New(r)
  250. }
  251. return nil
  252. })
  253. }
  254. if err := errg.Wait(); err != nil {
  255. t.Fatal(err)
  256. }
  257. }
  258. func TestShadowsocksChacha20TCP(t *testing.T) {
  259. tcpServer := tcp.Server{
  260. MsgProcessor: xor,
  261. }
  262. dest, err := tcpServer.Start()
  263. common.Must(err)
  264. defer tcpServer.Close()
  265. account := serial.ToTypedMessage(&shadowsocks.Account{
  266. Password: "shadowsocks-password",
  267. CipherType: shadowsocks.CipherType_CHACHA20_IETF,
  268. Ota: shadowsocks.Account_Enabled,
  269. })
  270. serverPort := tcp.PickPort()
  271. serverConfig := &core.Config{
  272. App: []*serial.TypedMessage{
  273. serial.ToTypedMessage(&log.Config{
  274. ErrorLogLevel: clog.Severity_Debug,
  275. ErrorLogType: log.LogType_Console,
  276. }),
  277. },
  278. Inbound: []*core.InboundHandlerConfig{
  279. {
  280. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  281. PortRange: net.SinglePortRange(serverPort),
  282. Listen: net.NewIPOrDomain(net.LocalHostIP),
  283. }),
  284. ProxySettings: serial.ToTypedMessage(&shadowsocks.ServerConfig{
  285. User: &protocol.User{
  286. Account: account,
  287. Level: 1,
  288. },
  289. Network: []net.Network{net.Network_TCP},
  290. }),
  291. },
  292. },
  293. Outbound: []*core.OutboundHandlerConfig{
  294. {
  295. ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
  296. },
  297. },
  298. }
  299. clientPort := tcp.PickPort()
  300. clientConfig := &core.Config{
  301. App: []*serial.TypedMessage{
  302. serial.ToTypedMessage(&log.Config{
  303. ErrorLogLevel: clog.Severity_Debug,
  304. ErrorLogType: log.LogType_Console,
  305. }),
  306. },
  307. Inbound: []*core.InboundHandlerConfig{
  308. {
  309. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  310. PortRange: net.SinglePortRange(clientPort),
  311. Listen: net.NewIPOrDomain(net.LocalHostIP),
  312. }),
  313. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  314. Address: net.NewIPOrDomain(dest.Address),
  315. Port: uint32(dest.Port),
  316. NetworkList: &net.NetworkList{
  317. Network: []net.Network{net.Network_TCP},
  318. },
  319. }),
  320. },
  321. },
  322. Outbound: []*core.OutboundHandlerConfig{
  323. {
  324. ProxySettings: serial.ToTypedMessage(&shadowsocks.ClientConfig{
  325. Server: []*protocol.ServerEndpoint{
  326. {
  327. Address: net.NewIPOrDomain(net.LocalHostIP),
  328. Port: uint32(serverPort),
  329. User: []*protocol.User{
  330. {
  331. Account: account,
  332. },
  333. },
  334. },
  335. },
  336. }),
  337. },
  338. },
  339. }
  340. servers, err := InitializeServerConfigs(serverConfig, clientConfig)
  341. common.Must(err)
  342. defer CloseAllServers(servers)
  343. var wg sync.WaitGroup
  344. wg.Add(10)
  345. for i := 0; i < 10; i++ {
  346. go func() {
  347. defer wg.Done()
  348. conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{
  349. IP: []byte{127, 0, 0, 1},
  350. Port: int(clientPort),
  351. })
  352. common.Must(err)
  353. defer conn.Close()
  354. payload := make([]byte, 10240*1024)
  355. rand.Read(payload)
  356. nBytes, err := conn.Write([]byte(payload))
  357. common.Must(err)
  358. if nBytes != len(payload) {
  359. t.Error("only part of payload is written: ", nBytes)
  360. }
  361. response := readFrom(conn, time.Second*20, 10240*1024)
  362. if err := compare.BytesEqualWithDetail(response, xor([]byte(payload))); err != nil {
  363. t.Error(err)
  364. }
  365. }()
  366. }
  367. wg.Wait()
  368. }
  369. func TestShadowsocksChacha20Poly1305TCP(t *testing.T) {
  370. tcpServer := tcp.Server{
  371. MsgProcessor: xor,
  372. }
  373. dest, err := tcpServer.Start()
  374. common.Must(err)
  375. defer tcpServer.Close()
  376. account := serial.ToTypedMessage(&shadowsocks.Account{
  377. Password: "shadowsocks-password",
  378. CipherType: shadowsocks.CipherType_CHACHA20_POLY1305,
  379. })
  380. serverPort := tcp.PickPort()
  381. serverConfig := &core.Config{
  382. Inbound: []*core.InboundHandlerConfig{
  383. {
  384. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  385. PortRange: net.SinglePortRange(serverPort),
  386. Listen: net.NewIPOrDomain(net.LocalHostIP),
  387. }),
  388. ProxySettings: serial.ToTypedMessage(&shadowsocks.ServerConfig{
  389. User: &protocol.User{
  390. Account: account,
  391. Level: 1,
  392. },
  393. Network: []net.Network{net.Network_TCP},
  394. }),
  395. },
  396. },
  397. Outbound: []*core.OutboundHandlerConfig{
  398. {
  399. ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
  400. },
  401. },
  402. }
  403. clientPort := tcp.PickPort()
  404. clientConfig := &core.Config{
  405. Inbound: []*core.InboundHandlerConfig{
  406. {
  407. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  408. PortRange: net.SinglePortRange(clientPort),
  409. Listen: net.NewIPOrDomain(net.LocalHostIP),
  410. }),
  411. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  412. Address: net.NewIPOrDomain(dest.Address),
  413. Port: uint32(dest.Port),
  414. NetworkList: &net.NetworkList{
  415. Network: []net.Network{net.Network_TCP},
  416. },
  417. }),
  418. },
  419. },
  420. Outbound: []*core.OutboundHandlerConfig{
  421. {
  422. ProxySettings: serial.ToTypedMessage(&shadowsocks.ClientConfig{
  423. Server: []*protocol.ServerEndpoint{
  424. {
  425. Address: net.NewIPOrDomain(net.LocalHostIP),
  426. Port: uint32(serverPort),
  427. User: []*protocol.User{
  428. {
  429. Account: account,
  430. },
  431. },
  432. },
  433. },
  434. }),
  435. },
  436. },
  437. }
  438. servers, err := InitializeServerConfigs(serverConfig, clientConfig)
  439. common.Must(err)
  440. defer CloseAllServers(servers)
  441. var wg sync.WaitGroup
  442. wg.Add(10)
  443. for i := 0; i < 10; i++ {
  444. go func() {
  445. defer wg.Done()
  446. conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{
  447. IP: []byte{127, 0, 0, 1},
  448. Port: int(clientPort),
  449. })
  450. common.Must(err)
  451. defer conn.Close()
  452. payload := make([]byte, 10240*1024)
  453. rand.Read(payload)
  454. nBytes, err := conn.Write([]byte(payload))
  455. common.Must(err)
  456. if nBytes != len(payload) {
  457. t.Error("only part of payload is written: ", nBytes)
  458. }
  459. response := readFrom(conn, time.Second*20, 10240*1024)
  460. if err := compare.BytesEqualWithDetail(response, xor([]byte(payload))); err != nil {
  461. t.Error(err)
  462. }
  463. }()
  464. }
  465. wg.Wait()
  466. }
  467. func TestShadowsocksAES256GCMTCP(t *testing.T) {
  468. assert := With(t)
  469. tcpServer := tcp.Server{
  470. MsgProcessor: xor,
  471. }
  472. dest, err := tcpServer.Start()
  473. assert(err, IsNil)
  474. defer tcpServer.Close()
  475. account := serial.ToTypedMessage(&shadowsocks.Account{
  476. Password: "shadowsocks-password",
  477. CipherType: shadowsocks.CipherType_AES_256_GCM,
  478. })
  479. serverPort := tcp.PickPort()
  480. serverConfig := &core.Config{
  481. App: []*serial.TypedMessage{
  482. serial.ToTypedMessage(&log.Config{
  483. ErrorLogLevel: clog.Severity_Debug,
  484. ErrorLogType: log.LogType_Console,
  485. }),
  486. },
  487. Inbound: []*core.InboundHandlerConfig{
  488. {
  489. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  490. PortRange: net.SinglePortRange(serverPort),
  491. Listen: net.NewIPOrDomain(net.LocalHostIP),
  492. }),
  493. ProxySettings: serial.ToTypedMessage(&shadowsocks.ServerConfig{
  494. User: &protocol.User{
  495. Account: account,
  496. Level: 1,
  497. },
  498. Network: []net.Network{net.Network_TCP},
  499. }),
  500. },
  501. },
  502. Outbound: []*core.OutboundHandlerConfig{
  503. {
  504. ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
  505. },
  506. },
  507. }
  508. clientPort := tcp.PickPort()
  509. clientConfig := &core.Config{
  510. App: []*serial.TypedMessage{
  511. serial.ToTypedMessage(&log.Config{
  512. ErrorLogLevel: clog.Severity_Debug,
  513. ErrorLogType: log.LogType_Console,
  514. }),
  515. },
  516. Inbound: []*core.InboundHandlerConfig{
  517. {
  518. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  519. PortRange: net.SinglePortRange(clientPort),
  520. Listen: net.NewIPOrDomain(net.LocalHostIP),
  521. }),
  522. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  523. Address: net.NewIPOrDomain(dest.Address),
  524. Port: uint32(dest.Port),
  525. NetworkList: &net.NetworkList{
  526. Network: []net.Network{net.Network_TCP},
  527. },
  528. }),
  529. },
  530. },
  531. Outbound: []*core.OutboundHandlerConfig{
  532. {
  533. ProxySettings: serial.ToTypedMessage(&shadowsocks.ClientConfig{
  534. Server: []*protocol.ServerEndpoint{
  535. {
  536. Address: net.NewIPOrDomain(net.LocalHostIP),
  537. Port: uint32(serverPort),
  538. User: []*protocol.User{
  539. {
  540. Account: account,
  541. },
  542. },
  543. },
  544. },
  545. }),
  546. },
  547. },
  548. }
  549. servers, err := InitializeServerConfigs(serverConfig, clientConfig)
  550. assert(err, IsNil)
  551. var wg sync.WaitGroup
  552. wg.Add(10)
  553. for i := 0; i < 10; i++ {
  554. go func() {
  555. conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{
  556. IP: []byte{127, 0, 0, 1},
  557. Port: int(clientPort),
  558. })
  559. assert(err, IsNil)
  560. payload := make([]byte, 10240*1024)
  561. rand.Read(payload)
  562. nBytes, err := conn.Write([]byte(payload))
  563. assert(err, IsNil)
  564. assert(nBytes, Equals, len(payload))
  565. response := readFrom(conn, time.Second*20, 10240*1024)
  566. assert(response, Equals, xor([]byte(payload)))
  567. assert(conn.Close(), IsNil)
  568. wg.Done()
  569. }()
  570. }
  571. wg.Wait()
  572. CloseAllServers(servers)
  573. }
  574. func TestShadowsocksAES128GCMUDP(t *testing.T) {
  575. assert := With(t)
  576. udpServer := udp.Server{
  577. MsgProcessor: xor,
  578. }
  579. dest, err := udpServer.Start()
  580. assert(err, IsNil)
  581. defer udpServer.Close()
  582. account := serial.ToTypedMessage(&shadowsocks.Account{
  583. Password: "shadowsocks-password",
  584. CipherType: shadowsocks.CipherType_AES_128_GCM,
  585. })
  586. serverPort := tcp.PickPort()
  587. serverConfig := &core.Config{
  588. App: []*serial.TypedMessage{
  589. serial.ToTypedMessage(&log.Config{
  590. ErrorLogLevel: clog.Severity_Debug,
  591. ErrorLogType: log.LogType_Console,
  592. }),
  593. },
  594. Inbound: []*core.InboundHandlerConfig{
  595. {
  596. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  597. PortRange: net.SinglePortRange(serverPort),
  598. Listen: net.NewIPOrDomain(net.LocalHostIP),
  599. }),
  600. ProxySettings: serial.ToTypedMessage(&shadowsocks.ServerConfig{
  601. User: &protocol.User{
  602. Account: account,
  603. Level: 1,
  604. },
  605. Network: []net.Network{net.Network_UDP},
  606. }),
  607. },
  608. },
  609. Outbound: []*core.OutboundHandlerConfig{
  610. {
  611. ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
  612. },
  613. },
  614. }
  615. clientPort := tcp.PickPort()
  616. clientConfig := &core.Config{
  617. App: []*serial.TypedMessage{
  618. serial.ToTypedMessage(&log.Config{
  619. ErrorLogLevel: clog.Severity_Debug,
  620. ErrorLogType: log.LogType_Console,
  621. }),
  622. },
  623. Inbound: []*core.InboundHandlerConfig{
  624. {
  625. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  626. PortRange: net.SinglePortRange(clientPort),
  627. Listen: net.NewIPOrDomain(net.LocalHostIP),
  628. }),
  629. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  630. Address: net.NewIPOrDomain(dest.Address),
  631. Port: uint32(dest.Port),
  632. NetworkList: &net.NetworkList{
  633. Network: []net.Network{net.Network_UDP},
  634. },
  635. }),
  636. },
  637. },
  638. Outbound: []*core.OutboundHandlerConfig{
  639. {
  640. ProxySettings: serial.ToTypedMessage(&shadowsocks.ClientConfig{
  641. Server: []*protocol.ServerEndpoint{
  642. {
  643. Address: net.NewIPOrDomain(net.LocalHostIP),
  644. Port: uint32(serverPort),
  645. User: []*protocol.User{
  646. {
  647. Account: account,
  648. },
  649. },
  650. },
  651. },
  652. }),
  653. },
  654. },
  655. }
  656. servers, err := InitializeServerConfigs(serverConfig, clientConfig)
  657. assert(err, IsNil)
  658. var wg sync.WaitGroup
  659. wg.Add(10)
  660. for i := 0; i < 10; i++ {
  661. go func() {
  662. conn, err := net.DialUDP("udp", nil, &net.UDPAddr{
  663. IP: []byte{127, 0, 0, 1},
  664. Port: int(clientPort),
  665. })
  666. assert(err, IsNil)
  667. payload := make([]byte, 1024)
  668. rand.Read(payload)
  669. nBytes, err := conn.Write([]byte(payload))
  670. assert(err, IsNil)
  671. assert(nBytes, Equals, len(payload))
  672. response := readFrom(conn, time.Second*5, 1024)
  673. assert(response, Equals, xor([]byte(payload)))
  674. assert(conn.Close(), IsNil)
  675. wg.Done()
  676. }()
  677. }
  678. wg.Wait()
  679. CloseAllServers(servers)
  680. }
  681. func TestShadowsocksAES128GCMUDPMux(t *testing.T) {
  682. assert := With(t)
  683. udpServer := udp.Server{
  684. MsgProcessor: xor,
  685. }
  686. dest, err := udpServer.Start()
  687. assert(err, IsNil)
  688. defer udpServer.Close()
  689. account := serial.ToTypedMessage(&shadowsocks.Account{
  690. Password: "shadowsocks-password",
  691. CipherType: shadowsocks.CipherType_AES_128_GCM,
  692. })
  693. serverPort := tcp.PickPort()
  694. serverConfig := &core.Config{
  695. App: []*serial.TypedMessage{
  696. serial.ToTypedMessage(&log.Config{
  697. ErrorLogLevel: clog.Severity_Debug,
  698. ErrorLogType: log.LogType_Console,
  699. }),
  700. },
  701. Inbound: []*core.InboundHandlerConfig{
  702. {
  703. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  704. PortRange: net.SinglePortRange(serverPort),
  705. Listen: net.NewIPOrDomain(net.LocalHostIP),
  706. }),
  707. ProxySettings: serial.ToTypedMessage(&shadowsocks.ServerConfig{
  708. User: &protocol.User{
  709. Account: account,
  710. Level: 1,
  711. },
  712. Network: []net.Network{net.Network_TCP},
  713. }),
  714. },
  715. },
  716. Outbound: []*core.OutboundHandlerConfig{
  717. {
  718. ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
  719. },
  720. },
  721. }
  722. clientPort := tcp.PickPort()
  723. clientConfig := &core.Config{
  724. App: []*serial.TypedMessage{
  725. serial.ToTypedMessage(&log.Config{
  726. ErrorLogLevel: clog.Severity_Debug,
  727. ErrorLogType: log.LogType_Console,
  728. }),
  729. },
  730. Inbound: []*core.InboundHandlerConfig{
  731. {
  732. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  733. PortRange: net.SinglePortRange(clientPort),
  734. Listen: net.NewIPOrDomain(net.LocalHostIP),
  735. }),
  736. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  737. Address: net.NewIPOrDomain(dest.Address),
  738. Port: uint32(dest.Port),
  739. NetworkList: &net.NetworkList{
  740. Network: []net.Network{net.Network_UDP},
  741. },
  742. }),
  743. },
  744. },
  745. Outbound: []*core.OutboundHandlerConfig{
  746. {
  747. SenderSettings: serial.ToTypedMessage(&proxyman.SenderConfig{
  748. MultiplexSettings: &proxyman.MultiplexingConfig{
  749. Enabled: true,
  750. Concurrency: 8,
  751. },
  752. }),
  753. ProxySettings: serial.ToTypedMessage(&shadowsocks.ClientConfig{
  754. Server: []*protocol.ServerEndpoint{
  755. {
  756. Address: net.NewIPOrDomain(net.LocalHostIP),
  757. Port: uint32(serverPort),
  758. User: []*protocol.User{
  759. {
  760. Account: account,
  761. },
  762. },
  763. },
  764. },
  765. }),
  766. },
  767. },
  768. }
  769. servers, err := InitializeServerConfigs(serverConfig, clientConfig)
  770. assert(err, IsNil)
  771. var wg sync.WaitGroup
  772. wg.Add(10)
  773. for i := 0; i < 10; i++ {
  774. go func() {
  775. conn, err := net.DialUDP("udp", nil, &net.UDPAddr{
  776. IP: []byte{127, 0, 0, 1},
  777. Port: int(clientPort),
  778. })
  779. assert(err, IsNil)
  780. payload := make([]byte, 1024)
  781. rand.Read(payload)
  782. nBytes, err := conn.Write([]byte(payload))
  783. assert(err, IsNil)
  784. assert(nBytes, Equals, len(payload))
  785. response := readFrom(conn, time.Second*5, 1024)
  786. assert(response, Equals, xor([]byte(payload)))
  787. assert(conn.Close(), IsNil)
  788. wg.Done()
  789. }()
  790. }
  791. wg.Wait()
  792. CloseAllServers(servers)
  793. }
  794. func TestShadowsocksNone(t *testing.T) {
  795. tcpServer := tcp.Server{
  796. MsgProcessor: xor,
  797. }
  798. dest, err := tcpServer.Start()
  799. common.Must(err)
  800. defer tcpServer.Close()
  801. account := serial.ToTypedMessage(&shadowsocks.Account{
  802. Password: "shadowsocks-password",
  803. CipherType: shadowsocks.CipherType_NONE,
  804. Ota: shadowsocks.Account_Enabled,
  805. })
  806. serverPort := tcp.PickPort()
  807. serverConfig := &core.Config{
  808. Inbound: []*core.InboundHandlerConfig{
  809. {
  810. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  811. PortRange: net.SinglePortRange(serverPort),
  812. Listen: net.NewIPOrDomain(net.LocalHostIP),
  813. }),
  814. ProxySettings: serial.ToTypedMessage(&shadowsocks.ServerConfig{
  815. User: &protocol.User{
  816. Account: account,
  817. Level: 1,
  818. },
  819. Network: []net.Network{net.Network_TCP},
  820. }),
  821. },
  822. },
  823. Outbound: []*core.OutboundHandlerConfig{
  824. {
  825. ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
  826. },
  827. },
  828. }
  829. clientPort := tcp.PickPort()
  830. clientConfig := &core.Config{
  831. Inbound: []*core.InboundHandlerConfig{
  832. {
  833. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  834. PortRange: net.SinglePortRange(clientPort),
  835. Listen: net.NewIPOrDomain(net.LocalHostIP),
  836. }),
  837. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  838. Address: net.NewIPOrDomain(dest.Address),
  839. Port: uint32(dest.Port),
  840. NetworkList: &net.NetworkList{
  841. Network: []net.Network{net.Network_TCP},
  842. },
  843. }),
  844. },
  845. },
  846. Outbound: []*core.OutboundHandlerConfig{
  847. {
  848. ProxySettings: serial.ToTypedMessage(&shadowsocks.ClientConfig{
  849. Server: []*protocol.ServerEndpoint{
  850. {
  851. Address: net.NewIPOrDomain(net.LocalHostIP),
  852. Port: uint32(serverPort),
  853. User: []*protocol.User{
  854. {
  855. Account: account,
  856. },
  857. },
  858. },
  859. },
  860. }),
  861. },
  862. },
  863. }
  864. servers, err := InitializeServerConfigs(serverConfig, clientConfig)
  865. common.Must(err)
  866. defer CloseAllServers(servers)
  867. var errg errgroup.Group
  868. for i := 0; i < 10; i++ {
  869. errg.Go(func() error {
  870. conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{
  871. IP: []byte{127, 0, 0, 1},
  872. Port: int(clientPort),
  873. })
  874. common.Must(err)
  875. defer conn.Close()
  876. payload := make([]byte, 10240*1024)
  877. rand.Read(payload)
  878. nBytes, err := conn.Write([]byte(payload))
  879. common.Must(err)
  880. if nBytes != len(payload) {
  881. return errors.New("only part of payload is written: ", nBytes)
  882. }
  883. response := readFrom(conn, time.Second*20, 10240*1024)
  884. if r := cmp.Diff(response, xor(payload)); r != "" {
  885. return errors.New(r)
  886. }
  887. return nil
  888. })
  889. }
  890. if err := errg.Wait(); err != nil {
  891. t.Fatal(err)
  892. }
  893. }