vmess.go 6.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219
  1. // Package vmess contains protocol definition, io lib for VMess.
  2. package protocol
  3. import (
  4. "encoding/binary"
  5. "hash/fnv"
  6. "io"
  7. "time"
  8. "github.com/v2ray/v2ray-core/common/alloc"
  9. v2crypto "github.com/v2ray/v2ray-core/common/crypto"
  10. "github.com/v2ray/v2ray-core/common/log"
  11. v2net "github.com/v2ray/v2ray-core/common/net"
  12. "github.com/v2ray/v2ray-core/proxy"
  13. "github.com/v2ray/v2ray-core/proxy/vmess"
  14. "github.com/v2ray/v2ray-core/proxy/vmess/protocol/user"
  15. "github.com/v2ray/v2ray-core/transport"
  16. )
  17. const (
  18. addrTypeIPv4 = byte(0x01)
  19. addrTypeIPv6 = byte(0x03)
  20. addrTypeDomain = byte(0x02)
  21. CmdTCP = byte(0x01)
  22. CmdUDP = byte(0x02)
  23. Version = byte(0x01)
  24. blockSize = 16
  25. )
  26. // VMessRequest implements the request message of VMess protocol. It only contains the header of a
  27. // request message. The data part will be handled by conection handler directly, in favor of data
  28. // streaming.
  29. type VMessRequest struct {
  30. Version byte
  31. User vmess.User
  32. RequestIV []byte
  33. RequestKey []byte
  34. ResponseHeader []byte
  35. Command byte
  36. Address v2net.Address
  37. Port v2net.Port
  38. }
  39. // Destination is the final destination of this request.
  40. func (this *VMessRequest) Destination() v2net.Destination {
  41. if this.Command == CmdTCP {
  42. return v2net.TCPDestination(this.Address, this.Port)
  43. } else {
  44. return v2net.UDPDestination(this.Address, this.Port)
  45. }
  46. }
  47. // VMessRequestReader is a parser to read VMessRequest from a byte stream.
  48. type VMessRequestReader struct {
  49. vUserSet user.UserSet
  50. }
  51. // NewVMessRequestReader creates a new VMessRequestReader with a given UserSet
  52. func NewVMessRequestReader(vUserSet user.UserSet) *VMessRequestReader {
  53. return &VMessRequestReader{
  54. vUserSet: vUserSet,
  55. }
  56. }
  57. // Read reads a VMessRequest from a byte stream.
  58. func (this *VMessRequestReader) Read(reader io.Reader) (*VMessRequest, error) {
  59. buffer := alloc.NewSmallBuffer()
  60. defer buffer.Release()
  61. nBytes, err := v2net.ReadAllBytes(reader, buffer.Value[:vmess.IDBytesLen])
  62. if err != nil {
  63. log.Debug("VMess: Failed to read request ID (%d bytes): %v", nBytes, err)
  64. return nil, err
  65. }
  66. userObj, timeSec, valid := this.vUserSet.GetUser(buffer.Value[:nBytes])
  67. if !valid {
  68. return nil, proxy.InvalidAuthentication
  69. }
  70. aesStream, err := v2crypto.NewAesDecryptionStream(userObj.ID().CmdKey(), user.Int64Hash(timeSec))
  71. if err != nil {
  72. log.Debug("VMess: Failed to create AES stream: %v", err)
  73. return nil, err
  74. }
  75. decryptor := v2crypto.NewCryptionReader(aesStream, reader)
  76. nBytes, err = v2net.ReadAllBytes(decryptor, buffer.Value[:41])
  77. if err != nil {
  78. log.Debug("VMess: Failed to read request header (%d bytes): %v", nBytes, err)
  79. return nil, err
  80. }
  81. bufferLen := nBytes
  82. request := &VMessRequest{
  83. User: userObj,
  84. Version: buffer.Value[0],
  85. }
  86. if request.Version != Version {
  87. log.Warning("VMess: Invalid protocol version %d", request.Version)
  88. return nil, proxy.InvalidProtocolVersion
  89. }
  90. request.RequestIV = append([]byte(nil), buffer.Value[1:17]...) // 16 bytes
  91. request.RequestKey = append([]byte(nil), buffer.Value[17:33]...) // 16 bytes
  92. request.ResponseHeader = append([]byte(nil), buffer.Value[33:37]...) // 4 bytes
  93. request.Command = buffer.Value[37]
  94. request.Port = v2net.PortFromBytes(buffer.Value[38:40])
  95. switch buffer.Value[40] {
  96. case addrTypeIPv4:
  97. nBytes, err = v2net.ReadAllBytes(decryptor, buffer.Value[41:45]) // 4 bytes
  98. bufferLen += 4
  99. if err != nil {
  100. log.Debug("VMess: Failed to read target IPv4 (%d bytes): %v", nBytes, err)
  101. return nil, err
  102. }
  103. request.Address = v2net.IPAddress(buffer.Value[41:45])
  104. case addrTypeIPv6:
  105. nBytes, err = v2net.ReadAllBytes(decryptor, buffer.Value[41:57]) // 16 bytes
  106. bufferLen += 16
  107. if err != nil {
  108. log.Debug("VMess: Failed to read target IPv6 (%d bytes): %v", nBytes, err)
  109. return nil, err
  110. }
  111. request.Address = v2net.IPAddress(buffer.Value[41:57])
  112. case addrTypeDomain:
  113. nBytes, err = v2net.ReadAllBytes(decryptor, buffer.Value[41:42])
  114. if err != nil {
  115. log.Debug("VMess: Failed to read target domain (%d bytes): %v", nBytes, err)
  116. return nil, err
  117. }
  118. domainLength := int(buffer.Value[41])
  119. if domainLength == 0 {
  120. return nil, transport.CorruptedPacket
  121. }
  122. nBytes, err = v2net.ReadAllBytes(decryptor, buffer.Value[42:42+domainLength])
  123. if err != nil {
  124. log.Debug("VMess: Failed to read target domain (%d bytes): %v", nBytes, err)
  125. return nil, err
  126. }
  127. bufferLen += 1 + domainLength
  128. domainBytes := append([]byte(nil), buffer.Value[42:42+domainLength]...)
  129. request.Address = v2net.DomainAddress(string(domainBytes))
  130. }
  131. nBytes, err = v2net.ReadAllBytes(decryptor, buffer.Value[bufferLen:bufferLen+4])
  132. if err != nil {
  133. log.Debug("VMess: Failed to read checksum (%d bytes): %v", nBytes, err)
  134. return nil, err
  135. }
  136. fnv1a := fnv.New32a()
  137. fnv1a.Write(buffer.Value[:bufferLen])
  138. actualHash := fnv1a.Sum32()
  139. expectedHash := binary.BigEndian.Uint32(buffer.Value[bufferLen : bufferLen+4])
  140. if actualHash != expectedHash {
  141. return nil, transport.CorruptedPacket
  142. }
  143. return request, nil
  144. }
  145. // ToBytes returns a VMessRequest in the form of byte array.
  146. func (this *VMessRequest) ToBytes(idHash user.CounterHash, randomRangeInt64 user.RandomInt64InRange, buffer *alloc.Buffer) (*alloc.Buffer, error) {
  147. if buffer == nil {
  148. buffer = alloc.NewSmallBuffer().Clear()
  149. }
  150. counter := randomRangeInt64(time.Now().Unix(), 30)
  151. hash := idHash.Hash(this.User.AnyValidID().Bytes(), counter)
  152. buffer.Append(hash)
  153. encryptionBegin := buffer.Len()
  154. buffer.AppendBytes(this.Version)
  155. buffer.Append(this.RequestIV)
  156. buffer.Append(this.RequestKey)
  157. buffer.Append(this.ResponseHeader)
  158. buffer.AppendBytes(this.Command)
  159. buffer.Append(this.Port.Bytes())
  160. switch {
  161. case this.Address.IsIPv4():
  162. buffer.AppendBytes(addrTypeIPv4)
  163. buffer.Append(this.Address.IP())
  164. case this.Address.IsIPv6():
  165. buffer.AppendBytes(addrTypeIPv6)
  166. buffer.Append(this.Address.IP())
  167. case this.Address.IsDomain():
  168. buffer.AppendBytes(addrTypeDomain, byte(len(this.Address.Domain())))
  169. buffer.Append([]byte(this.Address.Domain()))
  170. }
  171. encryptionEnd := buffer.Len()
  172. fnv1a := fnv.New32a()
  173. fnv1a.Write(buffer.Value[encryptionBegin:encryptionEnd])
  174. fnvHash := fnv1a.Sum32()
  175. buffer.AppendBytes(byte(fnvHash>>24), byte(fnvHash>>16), byte(fnvHash>>8), byte(fnvHash))
  176. encryptionEnd += 4
  177. aesStream, err := v2crypto.NewAesEncryptionStream(this.User.ID().CmdKey(), user.Int64Hash(counter))
  178. if err != nil {
  179. return nil, err
  180. }
  181. aesStream.XORKeyStream(buffer.Value[encryptionBegin:encryptionEnd], buffer.Value[encryptionBegin:encryptionEnd])
  182. return buffer, nil
  183. }