outbound.go 6.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215
  1. package outbound
  2. import (
  3. "crypto/md5"
  4. "crypto/rand"
  5. mrand "math/rand"
  6. "net"
  7. "sync"
  8. "github.com/v2ray/v2ray-core/common/alloc"
  9. v2crypto "github.com/v2ray/v2ray-core/common/crypto"
  10. "github.com/v2ray/v2ray-core/common/log"
  11. v2net "github.com/v2ray/v2ray-core/common/net"
  12. "github.com/v2ray/v2ray-core/proxy/common/connhandler"
  13. "github.com/v2ray/v2ray-core/proxy/vmess/config"
  14. "github.com/v2ray/v2ray-core/proxy/vmess/protocol"
  15. "github.com/v2ray/v2ray-core/proxy/vmess/protocol/user"
  16. "github.com/v2ray/v2ray-core/transport/ray"
  17. )
  18. type VMessOutboundHandler struct {
  19. vNextList []*config.OutboundTarget
  20. }
  21. func NewVMessOutboundHandler(vNextList []*config.OutboundTarget) *VMessOutboundHandler {
  22. return &VMessOutboundHandler{
  23. vNextList: vNextList,
  24. }
  25. }
  26. func pickVNext(serverList []*config.OutboundTarget) (v2net.Destination, config.User) {
  27. vNextLen := len(serverList)
  28. if vNextLen == 0 {
  29. panic("VMessOut: Zero vNext is configured.")
  30. }
  31. vNextIndex := 0
  32. if vNextLen > 1 {
  33. vNextIndex = mrand.Intn(vNextLen)
  34. }
  35. vNext := serverList[vNextIndex]
  36. vNextUserLen := len(vNext.Accounts)
  37. if vNextUserLen == 0 {
  38. panic("VMessOut: Zero User account.")
  39. }
  40. vNextUserIndex := 0
  41. if vNextUserLen > 1 {
  42. vNextUserIndex = mrand.Intn(vNextUserLen)
  43. }
  44. vNextUser := vNext.Accounts[vNextUserIndex]
  45. return vNext.Destination, vNextUser
  46. }
  47. func (this *VMessOutboundHandler) Dispatch(firstPacket v2net.Packet, ray ray.OutboundRay) error {
  48. vNextList := this.vNextList
  49. vNextAddress, vNextUser := pickVNext(vNextList)
  50. command := protocol.CmdTCP
  51. if firstPacket.Destination().IsUDP() {
  52. command = protocol.CmdUDP
  53. }
  54. request := &protocol.VMessRequest{
  55. Version: protocol.Version,
  56. User: vNextUser,
  57. Command: command,
  58. Address: firstPacket.Destination().Address(),
  59. }
  60. buffer := alloc.NewSmallBuffer()
  61. defer buffer.Release()
  62. v2net.ReadAllBytes(rand.Reader, buffer.Value[:36]) // 16 + 16 + 4
  63. request.RequestIV = buffer.Value[:16]
  64. request.RequestKey = buffer.Value[16:32]
  65. request.ResponseHeader = buffer.Value[32:36]
  66. return startCommunicate(request, vNextAddress, ray, firstPacket)
  67. }
  68. func startCommunicate(request *protocol.VMessRequest, dest v2net.Destination, ray ray.OutboundRay, firstPacket v2net.Packet) error {
  69. conn, err := net.Dial(dest.Network(), dest.Address().String())
  70. if err != nil {
  71. log.Error("Failed to open %s: %v", dest.String(), err)
  72. if ray != nil {
  73. close(ray.OutboundOutput())
  74. }
  75. return err
  76. }
  77. log.Info("VMessOut: Tunneling request to %s via %s", request.Address.String(), dest.String())
  78. defer conn.Close()
  79. input := ray.OutboundInput()
  80. output := ray.OutboundOutput()
  81. var requestFinish, responseFinish sync.Mutex
  82. requestFinish.Lock()
  83. responseFinish.Lock()
  84. go handleRequest(conn, request, firstPacket, input, &requestFinish)
  85. go handleResponse(conn, request, output, &responseFinish, dest.IsUDP())
  86. requestFinish.Lock()
  87. if tcpConn, ok := conn.(*net.TCPConn); ok {
  88. tcpConn.CloseWrite()
  89. }
  90. responseFinish.Lock()
  91. return nil
  92. }
  93. func handleRequest(conn net.Conn, request *protocol.VMessRequest, firstPacket v2net.Packet, input <-chan *alloc.Buffer, finish *sync.Mutex) {
  94. defer finish.Unlock()
  95. aesStream, err := v2crypto.NewAesEncryptionStream(request.RequestKey[:], request.RequestIV[:])
  96. if err != nil {
  97. log.Error("VMessOut: Failed to create AES encryption stream: %v", err)
  98. return
  99. }
  100. encryptRequestWriter := v2crypto.NewCryptionWriter(aesStream, conn)
  101. buffer := alloc.NewBuffer().Clear()
  102. buffer, err = request.ToBytes(user.NewTimeHash(user.HMACHash{}), user.GenerateRandomInt64InRange, buffer)
  103. if err != nil {
  104. log.Error("VMessOut: Failed to serialize VMess request: %v", err)
  105. return
  106. }
  107. // Send first packet of payload together with request, in favor of small requests.
  108. firstChunk := firstPacket.Chunk()
  109. moreChunks := firstPacket.MoreChunks()
  110. if firstChunk == nil && moreChunks {
  111. firstChunk, moreChunks = <-input
  112. }
  113. if firstChunk != nil {
  114. aesStream.XORKeyStream(firstChunk.Value, firstChunk.Value)
  115. buffer.Append(firstChunk.Value)
  116. firstChunk.Release()
  117. _, err = conn.Write(buffer.Value)
  118. buffer.Release()
  119. if err != nil {
  120. log.Error("VMessOut: Failed to write VMess request: %v", err)
  121. return
  122. }
  123. }
  124. if moreChunks {
  125. v2net.ChanToWriter(encryptRequestWriter, input)
  126. }
  127. return
  128. }
  129. func headerMatch(request *protocol.VMessRequest, responseHeader []byte) bool {
  130. return ((request.ResponseHeader[0] ^ request.ResponseHeader[1]) == responseHeader[0]) &&
  131. ((request.ResponseHeader[2] ^ request.ResponseHeader[3]) == responseHeader[1])
  132. }
  133. func handleResponse(conn net.Conn, request *protocol.VMessRequest, output chan<- *alloc.Buffer, finish *sync.Mutex, isUDP bool) {
  134. defer finish.Unlock()
  135. defer close(output)
  136. responseKey := md5.Sum(request.RequestKey[:])
  137. responseIV := md5.Sum(request.RequestIV[:])
  138. aesStream, err := v2crypto.NewAesDecryptionStream(responseKey[:], responseIV[:])
  139. if err != nil {
  140. log.Error("VMessOut: Failed to create AES encryption stream: %v", err)
  141. return
  142. }
  143. decryptResponseReader := v2crypto.NewCryptionReader(aesStream, conn)
  144. buffer, err := v2net.ReadFrom(decryptResponseReader, nil)
  145. if err != nil {
  146. log.Error("VMessOut: Failed to read VMess response (%d bytes): %v", buffer.Len(), err)
  147. return
  148. }
  149. if buffer.Len() < 4 || !headerMatch(request, buffer.Value[:2]) {
  150. log.Warning("VMessOut: unexepcted response header. The connection is probably hijacked.")
  151. return
  152. }
  153. log.Info("VMessOut received %d bytes from %s", buffer.Len()-4, conn.RemoteAddr().String())
  154. responseBegin := 4
  155. if buffer.Value[2] != 0 {
  156. dataLen := int(buffer.Value[3])
  157. if buffer.Len() < dataLen+4 { // Rare case
  158. diffBuffer := make([]byte, dataLen+4-buffer.Len())
  159. v2net.ReadAllBytes(decryptResponseReader, diffBuffer)
  160. buffer.Append(diffBuffer)
  161. }
  162. command := buffer.Value[2]
  163. data := buffer.Value[4 : 4+dataLen]
  164. go handleCommand(command, data)
  165. responseBegin = 4 + dataLen
  166. }
  167. buffer.SliceFrom(responseBegin)
  168. output <- buffer
  169. if !isUDP {
  170. v2net.ReaderToChan(output, decryptResponseReader)
  171. }
  172. return
  173. }
  174. type VMessOutboundHandlerFactory struct {
  175. }
  176. func (this *VMessOutboundHandlerFactory) Create(rawConfig interface{}) (connhandler.OutboundConnectionHandler, error) {
  177. vOutConfig := rawConfig.(config.Outbound)
  178. return NewVMessOutboundHandler(vOutConfig.Targets()), nil
  179. }
  180. func init() {
  181. connhandler.RegisterOutboundConnectionHandlerFactory("vmess", &VMessOutboundHandlerFactory{})
  182. }