| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191 |
- // R.I.P Shadowsocks
- package shadowsocks
- import (
- "crypto/rand"
- "io"
- "sync"
- "github.com/v2ray/v2ray-core/app"
- "github.com/v2ray/v2ray-core/common/alloc"
- "github.com/v2ray/v2ray-core/common/log"
- v2net "github.com/v2ray/v2ray-core/common/net"
- "github.com/v2ray/v2ray-core/proxy"
- "github.com/v2ray/v2ray-core/proxy/internal"
- "github.com/v2ray/v2ray-core/transport/hub"
- )
- type Shadowsocks struct {
- space app.Space
- config *Config
- port v2net.Port
- accepting bool
- tcpHub *hub.TCPHub
- udpHub *hub.UDPHub
- }
- func (this *Shadowsocks) Port() v2net.Port {
- return this.port
- }
- func (this *Shadowsocks) Close() {
- this.accepting = false
- this.tcpHub.Close()
- this.tcpHub = nil
- this.udpHub.Close()
- this.udpHub = nil
- }
- func (this *Shadowsocks) Listen(port v2net.Port) error {
- if this.accepting {
- if this.port == port {
- return nil
- } else {
- return proxy.ErrorAlreadyListening
- }
- }
- this.accepting = true
- tcpHub, err := hub.ListenTCP(port, this.handleConnection)
- if err != nil {
- log.Error("Shadowsocks: Failed to listen TCP on port ", port, ": ", err)
- return err
- }
- this.tcpHub = tcpHub
- if this.config.UDP {
- udpHub, err := hub.ListenUDP(port, this.handlerUDPPayload)
- if err != nil {
- log.Error("Shadowsocks: Failed to listen UDP on port ", port, ": ", err)
- }
- this.udpHub = udpHub
- }
- return nil
- }
- func (this *Shadowsocks) handlerUDPPayload(payload *alloc.Buffer, dest v2net.Destination) {
- defer payload.Release()
- iv := payload.Value[:this.config.Cipher.IVSize()]
- key := this.config.Key
- payload.SliceFrom(this.config.Cipher.IVSize())
- reader, err := this.config.Cipher.NewDecodingStream(key, iv, payload)
- if err != nil {
- log.Error("Shadowsocks: Failed to create decoding stream: ", err)
- return
- }
- request, err := ReadRequest(reader)
- if err != nil {
- return
- }
- buffer, _ := v2net.ReadFrom(reader, nil)
- packet := v2net.NewPacket(v2net.TCPDestination(request.Address, request.Port), buffer, false)
- ray := this.space.PacketDispatcher().DispatchToOutbound(packet)
- close(ray.InboundInput())
- for respChunk := range ray.InboundOutput() {
- response := alloc.NewBuffer().Slice(0, this.config.Cipher.IVSize())
- rand.Read(response.Value)
- writer, err := this.config.Cipher.NewEncodingStream(key, response.Value, response)
- if err != nil {
- log.Error("Shadowsocks: Failed to create encoding stream: ", err)
- return
- }
- switch {
- case request.Address.IsIPv4():
- writer.Write([]byte{AddrTypeIPv4})
- writer.Write(request.Address.IP())
- case request.Address.IsIPv6():
- writer.Write([]byte{AddrTypeIPv6})
- writer.Write(request.Address.IP())
- case request.Address.IsDomain():
- writer.Write([]byte{AddrTypeDomain, byte(len(request.Address.Domain()))})
- writer.Write([]byte(request.Address.Domain()))
- }
- writer.Write(request.Port.Bytes())
- writer.Write(respChunk.Value)
- respChunk.Release()
- this.udpHub.WriteTo(response.Value, dest)
- response.Release()
- }
- }
- func (this *Shadowsocks) handleConnection(conn *hub.TCPConn) {
- defer conn.Close()
- buffer := alloc.NewSmallBuffer()
- defer buffer.Release()
- _, err := io.ReadFull(conn, buffer.Value[:this.config.Cipher.IVSize()])
- if err != nil {
- log.Error("Shadowsocks: Failed to read IV: ", err)
- return
- }
- iv := buffer.Value[:this.config.Cipher.IVSize()]
- key := this.config.Key
- reader, err := this.config.Cipher.NewDecodingStream(key, iv, conn)
- if err != nil {
- log.Error("Shadowsocks: Failed to create decoding stream: ", err)
- return
- }
- request, err := ReadRequest(reader)
- if err != nil {
- return
- }
- packet := v2net.NewPacket(v2net.TCPDestination(request.Address, request.Port), nil, true)
- ray := this.space.PacketDispatcher().DispatchToOutbound(packet)
- var writeFinish sync.Mutex
- writeFinish.Lock()
- go func() {
- firstChunk := alloc.NewBuffer().Slice(0, this.config.Cipher.IVSize())
- defer firstChunk.Release()
- writer, err := this.config.Cipher.NewEncodingStream(key, firstChunk.Value, conn)
- if err != nil {
- log.Error("Shadowsocks: Failed to create encoding stream: ", err)
- return
- }
- if payload, ok := <-ray.InboundOutput(); ok {
- firstChunk.Append(payload.Value)
- payload.Release()
- writer.Write(firstChunk.Value)
- v2net.ChanToWriter(writer, ray.InboundOutput())
- }
- writeFinish.Unlock()
- }()
- v2net.ReaderToChan(ray.InboundInput(), reader)
- close(ray.InboundInput())
- writeFinish.Lock()
- }
- func init() {
- internal.MustRegisterInboundHandlerCreator("shadowsocks",
- func(space app.Space, rawConfig interface{}) (proxy.InboundHandler, error) {
- config := rawConfig.(*Config)
- return &Shadowsocks{
- space: space,
- config: config,
- }, nil
- })
- }
|