vmess.go 6.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253
  1. // Package vmess contains protocol definition, io lib for VMess.
  2. package vmess
  3. import (
  4. "crypto/aes"
  5. "crypto/cipher"
  6. "crypto/rand"
  7. "encoding/binary"
  8. "errors"
  9. "fmt"
  10. "io"
  11. mrand "math/rand"
  12. "time"
  13. "github.com/v2ray/v2ray-core"
  14. v2hash "github.com/v2ray/v2ray-core/hash"
  15. v2io "github.com/v2ray/v2ray-core/io"
  16. "github.com/v2ray/v2ray-core/log"
  17. v2math "github.com/v2ray/v2ray-core/math"
  18. v2net "github.com/v2ray/v2ray-core/net"
  19. )
  20. const (
  21. addrTypeIPv4 = byte(0x01)
  22. addrTypeIPv6 = byte(0x03)
  23. addrTypeDomain = byte(0x02)
  24. Version = byte(0x01)
  25. blockSize = 16
  26. )
  27. var (
  28. ErrorInvalidUser = errors.New("Invalid User")
  29. ErrorInvalidVerion = errors.New("Invalid Version")
  30. )
  31. // VMessRequest implements the request message of VMess protocol. It only contains
  32. // the header of a request message. The data part will be handled by conection
  33. // handler directly, in favor of data streaming.
  34. type VMessRequest struct {
  35. Version byte
  36. UserId core.ID
  37. RequestIV [16]byte
  38. RequestKey [16]byte
  39. ResponseHeader [4]byte
  40. Command byte
  41. Address v2net.Address
  42. }
  43. type VMessRequestReader struct {
  44. vUserSet core.UserSet
  45. }
  46. func NewVMessRequestReader(vUserSet core.UserSet) *VMessRequestReader {
  47. return &VMessRequestReader{
  48. vUserSet: vUserSet,
  49. }
  50. }
  51. func (r *VMessRequestReader) Read(reader io.Reader) (*VMessRequest, error) {
  52. buffer := make([]byte, 256)
  53. nBytes, err := reader.Read(buffer[:core.IDBytesLen])
  54. if err != nil {
  55. return nil, err
  56. }
  57. log.Debug("Read user hash: %v", buffer[:nBytes])
  58. userId, timeSec, valid := r.vUserSet.GetUser(buffer[:nBytes])
  59. if !valid {
  60. return nil, ErrorInvalidUser
  61. }
  62. aesCipher, err := aes.NewCipher(userId.CmdKey())
  63. if err != nil {
  64. return nil, err
  65. }
  66. aesStream := cipher.NewCFBDecrypter(aesCipher, v2hash.Int64Hash(timeSec))
  67. decryptor := v2io.NewCryptionReader(aesStream, reader)
  68. if err != nil {
  69. return nil, err
  70. }
  71. nBytes, err = decryptor.Read(buffer[0:1])
  72. if err != nil {
  73. return nil, err
  74. }
  75. randomLength := buffer[0]
  76. if randomLength <= 0 || randomLength > 32 {
  77. return nil, fmt.Errorf("Unexpected random length %d", randomLength)
  78. }
  79. _, err = decryptor.Read(buffer[:randomLength])
  80. if err != nil {
  81. return nil, err
  82. }
  83. nBytes, err = decryptor.Read(buffer[0:1])
  84. if err != nil {
  85. return nil, err
  86. }
  87. request := &VMessRequest{
  88. UserId: *userId,
  89. Version: buffer[0],
  90. }
  91. if request.Version != Version {
  92. log.Error("Unknown VMess version %d", request.Version)
  93. return nil, ErrorInvalidVerion
  94. }
  95. // TODO: check number of bytes returned
  96. _, err = decryptor.Read(request.RequestIV[:])
  97. if err != nil {
  98. return nil, err
  99. }
  100. _, err = decryptor.Read(request.RequestKey[:])
  101. if err != nil {
  102. return nil, err
  103. }
  104. _, err = decryptor.Read(request.ResponseHeader[:])
  105. if err != nil {
  106. return nil, err
  107. }
  108. _, err = decryptor.Read(buffer[0:1])
  109. if err != nil {
  110. return nil, err
  111. }
  112. request.Command = buffer[0]
  113. _, err = decryptor.Read(buffer[0:2])
  114. if err != nil {
  115. return nil, err
  116. }
  117. port := binary.BigEndian.Uint16(buffer[0:2])
  118. _, err = decryptor.Read(buffer[0:1])
  119. if err != nil {
  120. return nil, err
  121. }
  122. switch buffer[0] {
  123. case addrTypeIPv4:
  124. _, err = decryptor.Read(buffer[1:5])
  125. if err != nil {
  126. return nil, err
  127. }
  128. request.Address = v2net.IPAddress(buffer[1:5], port)
  129. case addrTypeIPv6:
  130. _, err = decryptor.Read(buffer[1:17])
  131. if err != nil {
  132. return nil, err
  133. }
  134. request.Address = v2net.IPAddress(buffer[1:17], port)
  135. case addrTypeDomain:
  136. _, err = decryptor.Read(buffer[1:2])
  137. if err != nil {
  138. return nil, err
  139. }
  140. domainLength := buffer[1]
  141. _, err = decryptor.Read(buffer[2 : 2+domainLength])
  142. if err != nil {
  143. return nil, err
  144. }
  145. request.Address = v2net.DomainAddress(string(buffer[2:2+domainLength]), port)
  146. }
  147. _, err = decryptor.Read(buffer[0:1])
  148. if err != nil {
  149. return nil, err
  150. }
  151. randomLength = buffer[0]
  152. _, err = decryptor.Read(buffer[:randomLength])
  153. if err != nil {
  154. return nil, err
  155. }
  156. return request, nil
  157. }
  158. func (request *VMessRequest) ToBytes(idHash v2hash.CounterHash, randomRangeInt64 v2math.RandomInt64InRange) ([]byte, error) {
  159. buffer := make([]byte, 0, 300)
  160. counter := randomRangeInt64(time.Now().UTC().Unix(), 30)
  161. hash := idHash.Hash(request.UserId.Bytes, counter)
  162. log.Debug("Writing userhash: %v", hash)
  163. buffer = append(buffer, hash...)
  164. encryptionBegin := len(buffer)
  165. randomLength := mrand.Intn(32) + 1
  166. randomContent := make([]byte, randomLength)
  167. _, err := rand.Read(randomContent)
  168. if err != nil {
  169. return nil, err
  170. }
  171. buffer = append(buffer, byte(randomLength))
  172. buffer = append(buffer, randomContent...)
  173. buffer = append(buffer, request.Version)
  174. buffer = append(buffer, request.RequestIV[:]...)
  175. buffer = append(buffer, request.RequestKey[:]...)
  176. buffer = append(buffer, request.ResponseHeader[:]...)
  177. buffer = append(buffer, request.Command)
  178. portBytes := make([]byte, 2)
  179. binary.BigEndian.PutUint16(portBytes, request.Address.Port)
  180. buffer = append(buffer, portBytes...)
  181. switch {
  182. case request.Address.IsIPv4():
  183. buffer = append(buffer, addrTypeIPv4)
  184. buffer = append(buffer, request.Address.IP...)
  185. case request.Address.IsIPv6():
  186. buffer = append(buffer, addrTypeIPv6)
  187. buffer = append(buffer, request.Address.IP...)
  188. case request.Address.IsDomain():
  189. buffer = append(buffer, addrTypeDomain)
  190. buffer = append(buffer, byte(len(request.Address.Domain)))
  191. buffer = append(buffer, []byte(request.Address.Domain)...)
  192. }
  193. paddingLength := mrand.Intn(32) + 1
  194. paddingBuffer := make([]byte, paddingLength)
  195. _, err = rand.Read(paddingBuffer)
  196. if err != nil {
  197. return nil, err
  198. }
  199. buffer = append(buffer, byte(paddingLength))
  200. buffer = append(buffer, paddingBuffer...)
  201. encryptionEnd := len(buffer)
  202. aesCipher, err := aes.NewCipher(request.UserId.CmdKey())
  203. if err != nil {
  204. return nil, err
  205. }
  206. aesStream := cipher.NewCFBEncrypter(aesCipher, v2hash.Int64Hash(counter))
  207. aesStream.XORKeyStream(buffer[encryptionBegin:encryptionEnd], buffer[encryptionBegin:encryptionEnd])
  208. return buffer, nil
  209. }
  210. type VMessResponse [4]byte
  211. func NewVMessResponse(request *VMessRequest) *VMessResponse {
  212. response := new(VMessResponse)
  213. copy(response[:], request.ResponseHeader[:])
  214. return response
  215. }