vmess.go 5.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215
  1. // Package vmess contains protocol definition, io lib for VMess.
  2. package protocol
  3. import (
  4. "crypto/aes"
  5. "crypto/cipher"
  6. "encoding/binary"
  7. "hash/fnv"
  8. "io"
  9. "time"
  10. v2io "github.com/v2ray/v2ray-core/common/io"
  11. "github.com/v2ray/v2ray-core/common/log"
  12. v2net "github.com/v2ray/v2ray-core/common/net"
  13. "github.com/v2ray/v2ray-core/proxy"
  14. "github.com/v2ray/v2ray-core/proxy/vmess/config"
  15. "github.com/v2ray/v2ray-core/proxy/vmess/protocol/user"
  16. "github.com/v2ray/v2ray-core/transport"
  17. )
  18. const (
  19. addrTypeIPv4 = byte(0x01)
  20. addrTypeIPv6 = byte(0x03)
  21. addrTypeDomain = byte(0x02)
  22. CmdTCP = byte(0x01)
  23. CmdUDP = byte(0x02)
  24. Version = byte(0x01)
  25. blockSize = 16
  26. )
  27. // VMessRequest implements the request message of VMess protocol. It only contains the header of a
  28. // request message. The data part will be handled by conection handler directly, in favor of data
  29. // streaming.
  30. type VMessRequest struct {
  31. Version byte
  32. UserId config.ID
  33. RequestIV []byte
  34. RequestKey []byte
  35. ResponseHeader []byte
  36. Command byte
  37. Address v2net.Address
  38. }
  39. // Destination is the final destination of this request.
  40. func (request *VMessRequest) Destination() v2net.Destination {
  41. if request.Command == CmdTCP {
  42. return v2net.NewTCPDestination(request.Address)
  43. } else {
  44. return v2net.NewUDPDestination(request.Address)
  45. }
  46. }
  47. // VMessRequestReader is a parser to read VMessRequest from a byte stream.
  48. type VMessRequestReader struct {
  49. vUserSet user.UserSet
  50. }
  51. // NewVMessRequestReader creates a new VMessRequestReader with a given UserSet
  52. func NewVMessRequestReader(vUserSet user.UserSet) *VMessRequestReader {
  53. return &VMessRequestReader{
  54. vUserSet: vUserSet,
  55. }
  56. }
  57. // Read reads a VMessRequest from a byte stream.
  58. func (r *VMessRequestReader) Read(reader io.Reader) (*VMessRequest, error) {
  59. buffer := make([]byte, 256)
  60. nBytes, err := reader.Read(buffer[:config.IDBytesLen])
  61. if err != nil {
  62. return nil, err
  63. }
  64. userId, timeSec, valid := r.vUserSet.GetUser(buffer[:nBytes])
  65. if !valid {
  66. return nil, proxy.InvalidAuthentication
  67. }
  68. aesCipher, err := aes.NewCipher(userId.CmdKey())
  69. if err != nil {
  70. return nil, err
  71. }
  72. aesStream := cipher.NewCFBDecrypter(aesCipher, user.Int64Hash(timeSec))
  73. decryptor := v2io.NewCryptionReader(aesStream, reader)
  74. if err != nil {
  75. return nil, err
  76. }
  77. nBytes, err = decryptor.Read(buffer[:41])
  78. if err != nil {
  79. return nil, err
  80. }
  81. bufferLen := nBytes
  82. request := &VMessRequest{
  83. UserId: *userId,
  84. Version: buffer[0],
  85. }
  86. if request.Version != Version {
  87. log.Warning("Invalid protocol version %d", request.Version)
  88. return nil, proxy.InvalidProtocolVersion
  89. }
  90. request.RequestIV = buffer[1:17] // 16 bytes
  91. request.RequestKey = buffer[17:33] // 16 bytes
  92. request.ResponseHeader = buffer[33:37] // 4 bytes
  93. request.Command = buffer[37]
  94. port := binary.BigEndian.Uint16(buffer[38:40])
  95. switch buffer[40] {
  96. case addrTypeIPv4:
  97. _, err = decryptor.Read(buffer[41:45]) // 4 bytes
  98. bufferLen += 4
  99. if err != nil {
  100. return nil, err
  101. }
  102. request.Address = v2net.IPAddress(buffer[41:45], port)
  103. case addrTypeIPv6:
  104. _, err = decryptor.Read(buffer[41:57]) // 16 bytes
  105. bufferLen += 16
  106. if err != nil {
  107. return nil, err
  108. }
  109. request.Address = v2net.IPAddress(buffer[41:57], port)
  110. case addrTypeDomain:
  111. _, err = decryptor.Read(buffer[41:42])
  112. if err != nil {
  113. return nil, err
  114. }
  115. domainLength := int(buffer[41])
  116. _, err = decryptor.Read(buffer[42 : 42+domainLength])
  117. if err != nil {
  118. return nil, err
  119. }
  120. bufferLen += 1 + domainLength
  121. request.Address = v2net.DomainAddress(string(buffer[42:42+domainLength]), port)
  122. }
  123. _, err = decryptor.Read(buffer[bufferLen : bufferLen+4])
  124. if err != nil {
  125. return nil, err
  126. }
  127. fnv1a := fnv.New32a()
  128. fnv1a.Write(buffer[:bufferLen])
  129. actualHash := fnv1a.Sum32()
  130. expectedHash := binary.BigEndian.Uint32(buffer[bufferLen : bufferLen+4])
  131. if actualHash != expectedHash {
  132. return nil, transport.CorruptedPacket
  133. }
  134. return request, nil
  135. }
  136. // ToBytes returns a VMessRequest in the form of byte array.
  137. func (request *VMessRequest) ToBytes(idHash user.CounterHash, randomRangeInt64 user.RandomInt64InRange, buffer []byte) ([]byte, error) {
  138. if buffer == nil {
  139. buffer = make([]byte, 0, 300)
  140. }
  141. counter := randomRangeInt64(time.Now().UTC().Unix(), 30)
  142. hash := idHash.Hash(request.UserId.Bytes[:], counter)
  143. buffer = append(buffer, hash...)
  144. encryptionBegin := len(buffer)
  145. buffer = append(buffer, request.Version)
  146. buffer = append(buffer, request.RequestIV...)
  147. buffer = append(buffer, request.RequestKey...)
  148. buffer = append(buffer, request.ResponseHeader...)
  149. buffer = append(buffer, request.Command)
  150. buffer = append(buffer, request.Address.PortBytes()...)
  151. switch {
  152. case request.Address.IsIPv4():
  153. buffer = append(buffer, addrTypeIPv4)
  154. buffer = append(buffer, request.Address.IP()...)
  155. case request.Address.IsIPv6():
  156. buffer = append(buffer, addrTypeIPv6)
  157. buffer = append(buffer, request.Address.IP()...)
  158. case request.Address.IsDomain():
  159. buffer = append(buffer, addrTypeDomain)
  160. buffer = append(buffer, byte(len(request.Address.Domain())))
  161. buffer = append(buffer, []byte(request.Address.Domain())...)
  162. }
  163. encryptionEnd := len(buffer)
  164. fnv1a := fnv.New32a()
  165. fnv1a.Write(buffer[encryptionBegin:encryptionEnd])
  166. fnvHash := fnv1a.Sum32()
  167. buffer = append(buffer, byte(fnvHash>>24))
  168. buffer = append(buffer, byte(fnvHash>>16))
  169. buffer = append(buffer, byte(fnvHash>>8))
  170. buffer = append(buffer, byte(fnvHash))
  171. encryptionEnd += 4
  172. aesCipher, err := aes.NewCipher(request.UserId.CmdKey())
  173. if err != nil {
  174. return nil, err
  175. }
  176. aesStream := cipher.NewCFBEncrypter(aesCipher, user.Int64Hash(counter))
  177. aesStream.XORKeyStream(buffer[encryptionBegin:encryptionEnd], buffer[encryptionBegin:encryptionEnd])
  178. return buffer, nil
  179. }