protocol.go 7.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273
  1. // +build !confonly
  2. package shadowsocks
  3. import (
  4. "crypto/hmac"
  5. "crypto/rand"
  6. "crypto/sha256"
  7. "hash/crc32"
  8. "io"
  9. "io/ioutil"
  10. "github.com/v2fly/v2ray-core/v4/common"
  11. "github.com/v2fly/v2ray-core/v4/common/buf"
  12. "github.com/v2fly/v2ray-core/v4/common/dice"
  13. "github.com/v2fly/v2ray-core/v4/common/net"
  14. "github.com/v2fly/v2ray-core/v4/common/protocol"
  15. )
  16. const (
  17. Version = 1
  18. )
  19. var addrParser = protocol.NewAddressParser(
  20. protocol.AddressFamilyByte(0x01, net.AddressFamilyIPv4),
  21. protocol.AddressFamilyByte(0x04, net.AddressFamilyIPv6),
  22. protocol.AddressFamilyByte(0x03, net.AddressFamilyDomain),
  23. protocol.WithAddressTypeParser(func(b byte) byte {
  24. return b & 0x0F
  25. }),
  26. )
  27. // ReadTCPSession reads a Shadowsocks TCP session from the given reader, returns its header and remaining parts.
  28. func ReadTCPSession(user *protocol.MemoryUser, reader io.Reader) (*protocol.RequestHeader, buf.Reader, error) {
  29. account := user.Account.(*MemoryAccount)
  30. hashkdf := hmac.New(sha256.New, []byte("SSBSKDF"))
  31. hashkdf.Write(account.Key)
  32. behaviorSeed := crc32.ChecksumIEEE(hashkdf.Sum(nil))
  33. behaviorRand := dice.NewDeterministicDice(int64(behaviorSeed))
  34. BaseDrainSize := behaviorRand.Roll(3266)
  35. RandDrainMax := behaviorRand.Roll(64) + 1
  36. RandDrainRolled := dice.Roll(RandDrainMax)
  37. DrainSize := BaseDrainSize + 16 + 38 + RandDrainRolled
  38. readSizeRemain := DrainSize
  39. buffer := buf.New()
  40. defer buffer.Release()
  41. ivLen := account.Cipher.IVSize()
  42. var iv []byte
  43. if ivLen > 0 {
  44. if _, err := buffer.ReadFullFrom(reader, ivLen); err != nil {
  45. readSizeRemain -= int(buffer.Len())
  46. DrainConnN(reader, readSizeRemain)
  47. return nil, nil, newError("failed to read IV").Base(err)
  48. }
  49. iv = append([]byte(nil), buffer.BytesTo(ivLen)...)
  50. }
  51. r, err := account.Cipher.NewDecryptionReader(account.Key, iv, reader)
  52. if err != nil {
  53. readSizeRemain -= int(buffer.Len())
  54. DrainConnN(reader, readSizeRemain)
  55. return nil, nil, newError("failed to initialize decoding stream").Base(err).AtError()
  56. }
  57. br := &buf.BufferedReader{Reader: r}
  58. request := &protocol.RequestHeader{
  59. Version: Version,
  60. User: user,
  61. Command: protocol.RequestCommandTCP,
  62. }
  63. readSizeRemain -= int(buffer.Len())
  64. buffer.Clear()
  65. addr, port, err := addrParser.ReadAddressPort(buffer, br)
  66. if err != nil {
  67. readSizeRemain -= int(buffer.Len())
  68. DrainConnN(reader, readSizeRemain)
  69. return nil, nil, newError("failed to read address").Base(err)
  70. }
  71. request.Address = addr
  72. request.Port = port
  73. if request.Address == nil {
  74. readSizeRemain -= int(buffer.Len())
  75. DrainConnN(reader, readSizeRemain)
  76. return nil, nil, newError("invalid remote address.")
  77. }
  78. if ivError := account.CheckIV(iv); ivError != nil {
  79. readSizeRemain -= int(buffer.Len())
  80. DrainConnN(reader, readSizeRemain)
  81. return nil, nil, newError("failed iv check").Base(ivError)
  82. }
  83. return request, br, nil
  84. }
  85. func DrainConnN(reader io.Reader, n int) error {
  86. _, err := io.CopyN(ioutil.Discard, reader, int64(n))
  87. return err
  88. }
  89. // WriteTCPRequest writes Shadowsocks request into the given writer, and returns a writer for body.
  90. func WriteTCPRequest(request *protocol.RequestHeader, writer io.Writer) (buf.Writer, error) {
  91. user := request.User
  92. account := user.Account.(*MemoryAccount)
  93. var iv []byte
  94. if account.Cipher.IVSize() > 0 {
  95. iv = make([]byte, account.Cipher.IVSize())
  96. common.Must2(rand.Read(iv))
  97. if ivError := account.CheckIV(iv); ivError != nil {
  98. return nil, newError("failed to mark outgoing iv").Base(ivError)
  99. }
  100. if err := buf.WriteAllBytes(writer, iv); err != nil {
  101. return nil, newError("failed to write IV")
  102. }
  103. }
  104. w, err := account.Cipher.NewEncryptionWriter(account.Key, iv, writer)
  105. if err != nil {
  106. return nil, newError("failed to create encoding stream").Base(err).AtError()
  107. }
  108. header := buf.New()
  109. if err := addrParser.WriteAddressPort(header, request.Address, request.Port); err != nil {
  110. return nil, newError("failed to write address").Base(err)
  111. }
  112. if err := w.WriteMultiBuffer(buf.MultiBuffer{header}); err != nil {
  113. return nil, newError("failed to write header").Base(err)
  114. }
  115. return w, nil
  116. }
  117. func ReadTCPResponse(user *protocol.MemoryUser, reader io.Reader) (buf.Reader, error) {
  118. account := user.Account.(*MemoryAccount)
  119. var iv []byte
  120. if account.Cipher.IVSize() > 0 {
  121. iv = make([]byte, account.Cipher.IVSize())
  122. if _, err := io.ReadFull(reader, iv); err != nil {
  123. return nil, newError("failed to read IV").Base(err)
  124. }
  125. }
  126. if ivError := account.CheckIV(iv); ivError != nil {
  127. return nil, newError("failed iv check").Base(ivError)
  128. }
  129. return account.Cipher.NewDecryptionReader(account.Key, iv, reader)
  130. }
  131. func WriteTCPResponse(request *protocol.RequestHeader, writer io.Writer) (buf.Writer, error) {
  132. user := request.User
  133. account := user.Account.(*MemoryAccount)
  134. var iv []byte
  135. if account.Cipher.IVSize() > 0 {
  136. iv = make([]byte, account.Cipher.IVSize())
  137. common.Must2(rand.Read(iv))
  138. if ivError := account.CheckIV(iv); ivError != nil {
  139. return nil, newError("failed to mark outgoing iv").Base(ivError)
  140. }
  141. if err := buf.WriteAllBytes(writer, iv); err != nil {
  142. return nil, newError("failed to write IV.").Base(err)
  143. }
  144. }
  145. return account.Cipher.NewEncryptionWriter(account.Key, iv, writer)
  146. }
  147. func EncodeUDPPacket(request *protocol.RequestHeader, payload []byte) (*buf.Buffer, error) {
  148. user := request.User
  149. account := user.Account.(*MemoryAccount)
  150. buffer := buf.New()
  151. ivLen := account.Cipher.IVSize()
  152. if ivLen > 0 {
  153. common.Must2(buffer.ReadFullFrom(rand.Reader, ivLen))
  154. }
  155. if err := addrParser.WriteAddressPort(buffer, request.Address, request.Port); err != nil {
  156. return nil, newError("failed to write address").Base(err)
  157. }
  158. buffer.Write(payload)
  159. if err := account.Cipher.EncodePacket(account.Key, buffer); err != nil {
  160. return nil, newError("failed to encrypt UDP payload").Base(err)
  161. }
  162. return buffer, nil
  163. }
  164. func DecodeUDPPacket(user *protocol.MemoryUser, payload *buf.Buffer) (*protocol.RequestHeader, *buf.Buffer, error) {
  165. account := user.Account.(*MemoryAccount)
  166. var iv []byte
  167. if !account.Cipher.IsAEAD() && account.Cipher.IVSize() > 0 {
  168. // Keep track of IV as it gets removed from payload in DecodePacket.
  169. iv = make([]byte, account.Cipher.IVSize())
  170. copy(iv, payload.BytesTo(account.Cipher.IVSize()))
  171. }
  172. if err := account.Cipher.DecodePacket(account.Key, payload); err != nil {
  173. return nil, nil, newError("failed to decrypt UDP payload").Base(err)
  174. }
  175. request := &protocol.RequestHeader{
  176. Version: Version,
  177. User: user,
  178. Command: protocol.RequestCommandUDP,
  179. }
  180. payload.SetByte(0, payload.Byte(0)&0x0F)
  181. addr, port, err := addrParser.ReadAddressPort(nil, payload)
  182. if err != nil {
  183. return nil, nil, newError("failed to parse address").Base(err)
  184. }
  185. request.Address = addr
  186. request.Port = port
  187. return request, payload, nil
  188. }
  189. type UDPReader struct {
  190. Reader io.Reader
  191. User *protocol.MemoryUser
  192. }
  193. func (v *UDPReader) ReadMultiBuffer() (buf.MultiBuffer, error) {
  194. buffer := buf.New()
  195. _, err := buffer.ReadFrom(v.Reader)
  196. if err != nil {
  197. buffer.Release()
  198. return nil, err
  199. }
  200. _, payload, err := DecodeUDPPacket(v.User, buffer)
  201. if err != nil {
  202. buffer.Release()
  203. return nil, err
  204. }
  205. return buf.MultiBuffer{payload}, nil
  206. }
  207. type UDPWriter struct {
  208. Writer io.Writer
  209. Request *protocol.RequestHeader
  210. }
  211. // Write implements io.Writer.
  212. func (w *UDPWriter) Write(payload []byte) (int, error) {
  213. packet, err := EncodeUDPPacket(w.Request, payload)
  214. if err != nil {
  215. return 0, err
  216. }
  217. _, err = w.Writer.Write(packet.Bytes())
  218. packet.Release()
  219. return len(payload), err
  220. }