| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259 |
- // Package vmess contains protocol definition, io lib for VMess.
- package vmess
- import (
- "crypto/aes"
- "crypto/cipher"
- "crypto/rand"
- "encoding/binary"
- "errors"
- "fmt"
- "io"
- mrand "math/rand"
- "github.com/v2ray/v2ray-core"
- v2io "github.com/v2ray/v2ray-core/io"
- v2net "github.com/v2ray/v2ray-core/net"
- )
- const (
- addrTypeIPv4 = byte(0x01)
- addrTypeIPv6 = byte(0x03)
- addrTypeDomain = byte(0x02)
- Version = byte(0x01)
- blockSize = 16
- CryptoMessage = "c48619fe-8f02-49e0-b9e9-edf763e17e21"
- )
- var (
- ErrorInvalidUser = errors.New("Invalid User")
- emptyIV = make([]byte, blockSize)
- )
- // VMessRequest implements the request message of VMess protocol. It only contains
- // the header of a request message. The data part will be handled by conection
- // handler directly, in favor of data streaming.
- type VMessRequest struct {
- Version byte
- UserId core.ID
- RequestIV [16]byte
- RequestKey [16]byte
- ResponseHeader [4]byte
- Command byte
- Address v2net.Address
- }
- type VMessRequestReader struct {
- vUserSet core.UserSet
- }
- func NewVMessRequestReader(vUserSet core.UserSet) *VMessRequestReader {
- reader := new(VMessRequestReader)
- reader.vUserSet = vUserSet
- return reader
- }
- func (r *VMessRequestReader) Read(reader io.Reader) (*VMessRequest, error) {
- request := new(VMessRequest)
- buffer := make([]byte, 256)
- nBytes, err := reader.Read(buffer[0:1])
- if err != nil {
- return nil, err
- }
- // TODO: verify version number
- request.Version = buffer[0]
- nBytes, err = reader.Read(buffer[:core.IDBytesLen])
- if err != nil {
- return nil, err
- }
- userId, valid := r.vUserSet.GetUser(buffer[:nBytes])
- if !valid {
- return nil, ErrorInvalidUser
- }
- request.UserId = *userId
- aesCipher, err := aes.NewCipher(userId.Hash([]byte(CryptoMessage)))
- if err != nil {
- return nil, err
- }
- aesStream := cipher.NewCFBDecrypter(aesCipher, emptyIV)
- decryptor := v2io.NewCryptionReader(aesStream, reader)
- if err != nil {
- return nil, err
- }
- nBytes, err = decryptor.Read(buffer[0:1])
- if err != nil {
- return nil, err
- }
- randomLength := buffer[0]
- if randomLength <= 0 || randomLength > 32 {
- return nil, fmt.Errorf("Unexpected random length %d", randomLength)
- }
- _, err = decryptor.Read(buffer[:randomLength])
- if err != nil {
- return nil, err
- }
- // TODO: check number of bytes returned
- _, err = decryptor.Read(request.RequestIV[:])
- if err != nil {
- return nil, err
- }
- _, err = decryptor.Read(request.RequestKey[:])
- if err != nil {
- return nil, err
- }
- _, err = decryptor.Read(request.ResponseHeader[:])
- if err != nil {
- return nil, err
- }
- _, err = decryptor.Read(buffer[0:1])
- if err != nil {
- return nil, err
- }
- request.Command = buffer[0]
- _, err = decryptor.Read(buffer[0:2])
- if err != nil {
- return nil, err
- }
- port := binary.BigEndian.Uint16(buffer[0:2])
- _, err = decryptor.Read(buffer[0:1])
- if err != nil {
- return nil, err
- }
- switch buffer[0] {
- case addrTypeIPv4:
- _, err = decryptor.Read(buffer[1:5])
- if err != nil {
- return nil, err
- }
- request.Address = v2net.IPAddress(buffer[1:5], port)
- case addrTypeIPv6:
- _, err = decryptor.Read(buffer[1:17])
- if err != nil {
- return nil, err
- }
- request.Address = v2net.IPAddress(buffer[1:17], port)
- case addrTypeDomain:
- _, err = decryptor.Read(buffer[1:2])
- if err != nil {
- return nil, err
- }
- domainLength := buffer[1]
- _, err = decryptor.Read(buffer[2 : 2+domainLength])
- if err != nil {
- return nil, err
- }
- request.Address = v2net.DomainAddress(string(buffer[2:2+domainLength]), port)
- }
- _, err = decryptor.Read(buffer[0:1])
- if err != nil {
- return nil, err
- }
- randomLength = buffer[0]
- _, err = decryptor.Read(buffer[:randomLength])
- if err != nil {
- return nil, err
- }
- return request, nil
- }
- type VMessRequestWriter struct {
- }
- func NewVMessRequestWriter() *VMessRequestWriter {
- writer := new(VMessRequestWriter)
- return writer
- }
- func (w *VMessRequestWriter) Write(writer io.Writer, request *VMessRequest) error {
- buffer := make([]byte, 0, 300)
- buffer = append(buffer, request.Version)
- buffer = append(buffer, request.UserId.TimeRangeHash(30)...)
- encryptionBegin := len(buffer)
- randomLength := mrand.Intn(32) + 1
- randomContent := make([]byte, randomLength)
- _, err := rand.Read(randomContent)
- if err != nil {
- return err
- }
- buffer = append(buffer, byte(randomLength))
- buffer = append(buffer, randomContent...)
- buffer = append(buffer, request.RequestIV[:]...)
- buffer = append(buffer, request.RequestKey[:]...)
- buffer = append(buffer, request.ResponseHeader[:]...)
- buffer = append(buffer, request.Command)
- portBytes := make([]byte, 2)
- binary.BigEndian.PutUint16(portBytes, request.Address.Port)
- buffer = append(buffer, portBytes...)
- switch {
- case request.Address.IsIPv4():
- buffer = append(buffer, addrTypeIPv4)
- buffer = append(buffer, request.Address.IP...)
- case request.Address.IsIPv6():
- buffer = append(buffer, addrTypeIPv6)
- buffer = append(buffer, request.Address.IP...)
- case request.Address.IsDomain():
- buffer = append(buffer, addrTypeDomain)
- buffer = append(buffer, byte(len(request.Address.Domain)))
- buffer = append(buffer, []byte(request.Address.Domain)...)
- }
- paddingLength := blockSize - 1 - (len(buffer)-encryptionBegin)%blockSize
- if paddingLength == 0 {
- paddingLength = blockSize
- }
- paddingBuffer := make([]byte, paddingLength)
- _, err = rand.Read(paddingBuffer)
- if err != nil {
- return err
- }
- buffer = append(buffer, byte(paddingLength))
- buffer = append(buffer, paddingBuffer...)
- encryptionEnd := len(buffer)
- aesCipher, err := aes.NewCipher(request.UserId.Hash([]byte(CryptoMessage)))
- if err != nil {
- return err
- }
- aesStream := cipher.NewCFBEncrypter(aesCipher, emptyIV)
- cWriter := v2io.NewCryptionWriter(aesStream, writer)
- _, err = writer.Write(buffer[0:encryptionBegin])
- if err != nil {
- return err
- }
- _, err = cWriter.Write(buffer[encryptionBegin:encryptionEnd])
- if err != nil {
- return err
- }
- return nil
- }
- type VMessResponse [4]byte
- func NewVMessResponse(request *VMessRequest) *VMessResponse {
- response := new(VMessResponse)
- copy(response[:], request.ResponseHeader[:])
- return response
- }
|