vmessout.go 6.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228
  1. package vmess
  2. import (
  3. "bytes"
  4. "crypto/md5"
  5. "crypto/rand"
  6. mrand "math/rand"
  7. "net"
  8. "sync"
  9. "github.com/v2ray/v2ray-core"
  10. v2io "github.com/v2ray/v2ray-core/common/io"
  11. "github.com/v2ray/v2ray-core/common/log"
  12. v2net "github.com/v2ray/v2ray-core/common/net"
  13. "github.com/v2ray/v2ray-core/proxy/vmess/protocol"
  14. "github.com/v2ray/v2ray-core/proxy/vmess/protocol/user"
  15. )
  16. const (
  17. InfoTimeNotSync = "Please check the User ID in your vmess configuration, and make sure the time on your local and remote server are in sync."
  18. )
  19. // VNext is the next Point server in the connection chain.
  20. type VNextServer struct {
  21. Destination v2net.Destination // Address of VNext server
  22. Users []user.User // User accounts for accessing VNext.
  23. }
  24. type VMessOutboundHandler struct {
  25. vPoint *core.Point
  26. packet v2net.Packet
  27. vNextList []VNextServer
  28. vNextListUDP []VNextServer
  29. }
  30. func NewVMessOutboundHandler(vp *core.Point, vNextList, vNextListUDP []VNextServer, firstPacket v2net.Packet) *VMessOutboundHandler {
  31. return &VMessOutboundHandler{
  32. vPoint: vp,
  33. packet: firstPacket,
  34. vNextList: vNextList,
  35. vNextListUDP: vNextListUDP,
  36. }
  37. }
  38. func pickVNext(serverList []VNextServer) (v2net.Destination, user.User) {
  39. vNextLen := len(serverList)
  40. if vNextLen == 0 {
  41. panic("VMessOut: Zero vNext is configured.")
  42. }
  43. vNextIndex := 0
  44. if vNextLen > 1 {
  45. vNextIndex = mrand.Intn(vNextLen)
  46. }
  47. vNext := serverList[vNextIndex]
  48. vNextUserLen := len(vNext.Users)
  49. if vNextUserLen == 0 {
  50. panic("VMessOut: Zero User account.")
  51. }
  52. vNextUserIndex := 0
  53. if vNextUserLen > 1 {
  54. vNextUserIndex = mrand.Intn(vNextUserLen)
  55. }
  56. vNextUser := vNext.Users[vNextUserIndex]
  57. return vNext.Destination, vNextUser
  58. }
  59. func (handler *VMessOutboundHandler) Start(ray core.OutboundRay) error {
  60. vNextList := handler.vNextList
  61. if handler.packet.Destination().IsUDP() {
  62. vNextList = handler.vNextListUDP
  63. }
  64. vNextAddress, vNextUser := pickVNext(vNextList)
  65. command := protocol.CmdTCP
  66. if handler.packet.Destination().IsUDP() {
  67. command = protocol.CmdUDP
  68. }
  69. request := &protocol.VMessRequest{
  70. Version: protocol.Version,
  71. UserId: vNextUser.Id,
  72. Command: command,
  73. Address: handler.packet.Destination().Address(),
  74. }
  75. rand.Read(request.RequestIV[:])
  76. rand.Read(request.RequestKey[:])
  77. rand.Read(request.ResponseHeader[:])
  78. go startCommunicate(request, vNextAddress, ray, handler.packet)
  79. return nil
  80. }
  81. func startCommunicate(request *protocol.VMessRequest, dest v2net.Destination, ray core.OutboundRay, firstPacket v2net.Packet) error {
  82. conn, err := net.Dial(dest.Network(), dest.Address().String())
  83. if err != nil {
  84. log.Error("Failed to open %s: %v", dest.String(), err)
  85. if ray != nil {
  86. close(ray.OutboundOutput())
  87. }
  88. return err
  89. }
  90. log.Info("VMessOut: Tunneling request for %s", request.Address.String())
  91. defer conn.Close()
  92. input := ray.OutboundInput()
  93. output := ray.OutboundOutput()
  94. var requestFinish, responseFinish sync.Mutex
  95. requestFinish.Lock()
  96. responseFinish.Lock()
  97. go handleRequest(conn, request, firstPacket, input, &requestFinish)
  98. go handleResponse(conn, request, output, &responseFinish, dest.IsUDP())
  99. requestFinish.Lock()
  100. if tcpConn, ok := conn.(*net.TCPConn); ok {
  101. tcpConn.CloseWrite()
  102. }
  103. responseFinish.Lock()
  104. return nil
  105. }
  106. func handleRequest(conn net.Conn, request *protocol.VMessRequest, firstPacket v2net.Packet, input <-chan []byte, finish *sync.Mutex) {
  107. defer finish.Unlock()
  108. encryptRequestWriter, err := v2io.NewAesEncryptWriter(request.RequestKey[:], request.RequestIV[:], conn)
  109. if err != nil {
  110. log.Error("VMessOut: Failed to create encrypt writer: %v", err)
  111. return
  112. }
  113. buffer := make([]byte, 0, 2*1024)
  114. buffer, err = request.ToBytes(user.NewTimeHash(user.HMACHash{}), user.GenerateRandomInt64InRange, buffer)
  115. if err != nil {
  116. log.Error("VMessOut: Failed to serialize VMess request: %v", err)
  117. return
  118. }
  119. // Send first packet of payload together with request, in favor of small requests.
  120. firstChunk := firstPacket.Chunk()
  121. moreChunks := firstPacket.MoreChunks()
  122. if firstChunk == nil && moreChunks {
  123. firstChunk, moreChunks = <-input
  124. }
  125. if firstChunk != nil {
  126. encryptRequestWriter.Crypt(firstChunk)
  127. buffer = append(buffer, firstChunk...)
  128. _, err = conn.Write(buffer)
  129. if err != nil {
  130. log.Error("VMessOut: Failed to write VMess request: %v", err)
  131. return
  132. }
  133. }
  134. if moreChunks {
  135. v2net.ChanToWriter(encryptRequestWriter, input)
  136. }
  137. return
  138. }
  139. func handleResponse(conn net.Conn, request *protocol.VMessRequest, output chan<- []byte, finish *sync.Mutex, isUDP bool) {
  140. defer finish.Unlock()
  141. defer close(output)
  142. responseKey := md5.Sum(request.RequestKey[:])
  143. responseIV := md5.Sum(request.RequestIV[:])
  144. decryptResponseReader, err := v2io.NewAesDecryptReader(responseKey[:], responseIV[:], conn)
  145. if err != nil {
  146. log.Error("VMessOut: Failed to create decrypt reader: %v", err)
  147. return
  148. }
  149. buffer := make([]byte, 2*1024)
  150. nBytes, err := decryptResponseReader.Read(buffer)
  151. if err != nil {
  152. //log.Error("VMessOut: Failed to read VMess response (%d bytes): %v", nBytes, err)
  153. return
  154. }
  155. if !bytes.Equal(buffer[:4], request.ResponseHeader[:]) {
  156. log.Warning("VMessOut: unexepcted response header. The connection is probably hijacked.")
  157. return
  158. }
  159. output <- buffer[4:nBytes]
  160. if !isUDP {
  161. v2net.ReaderToChan(output, decryptResponseReader)
  162. }
  163. return
  164. }
  165. type VMessOutboundHandlerFactory struct {
  166. servers []VNextServer
  167. udpServers []VNextServer
  168. }
  169. func (factory *VMessOutboundHandlerFactory) Initialize(rawConfig []byte) error {
  170. config, err := loadOutboundConfig(rawConfig)
  171. if err != nil {
  172. panic(log.Error("Failed to load VMess outbound config: %v", err))
  173. return err
  174. }
  175. servers := make([]VNextServer, 0, len(config.VNextList))
  176. udpServers := make([]VNextServer, 0, len(config.VNextList))
  177. for _, server := range config.VNextList {
  178. if server.HasNetwork("tcp") {
  179. servers = append(servers, server.ToVNextServer())
  180. }
  181. if server.HasNetwork("udp") {
  182. udpServers = append(udpServers, server.ToVNextServer())
  183. }
  184. }
  185. factory.servers = servers
  186. factory.udpServers = udpServers
  187. return nil
  188. }
  189. func (factory *VMessOutboundHandlerFactory) Create(vp *core.Point, firstPacket v2net.Packet) (core.OutboundConnectionHandler, error) {
  190. return NewVMessOutboundHandler(vp, factory.servers, factory.udpServers, firstPacket), nil
  191. }
  192. func init() {
  193. core.RegisterOutboundConnectionHandlerFactory("vmess", &VMessOutboundHandlerFactory{})
  194. }