vmessin.go 4.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158
  1. package vmess
  2. import (
  3. "crypto/md5"
  4. "io"
  5. "net"
  6. "sync"
  7. "github.com/v2ray/v2ray-core/app"
  8. "github.com/v2ray/v2ray-core/common/alloc"
  9. v2io "github.com/v2ray/v2ray-core/common/io"
  10. "github.com/v2ray/v2ray-core/common/log"
  11. v2net "github.com/v2ray/v2ray-core/common/net"
  12. "github.com/v2ray/v2ray-core/common/retry"
  13. "github.com/v2ray/v2ray-core/proxy"
  14. "github.com/v2ray/v2ray-core/proxy/vmess/config"
  15. "github.com/v2ray/v2ray-core/proxy/vmess/protocol"
  16. "github.com/v2ray/v2ray-core/proxy/vmess/protocol/user"
  17. )
  18. type VMessInboundHandler struct {
  19. dispatcher app.PacketDispatcher
  20. clients user.UserSet
  21. accepting bool
  22. udpEnabled bool
  23. }
  24. func NewVMessInboundHandler(dispatcher app.PacketDispatcher, clients user.UserSet, udpEnabled bool) *VMessInboundHandler {
  25. return &VMessInboundHandler{
  26. dispatcher: dispatcher,
  27. clients: clients,
  28. udpEnabled: udpEnabled,
  29. }
  30. }
  31. func (handler *VMessInboundHandler) Listen(port uint16) error {
  32. listener, err := net.ListenTCP("tcp", &net.TCPAddr{
  33. IP: []byte{0, 0, 0, 0},
  34. Port: int(port),
  35. Zone: "",
  36. })
  37. if err != nil {
  38. log.Error("Unable to listen tcp port %d: %v", port, err)
  39. return err
  40. }
  41. handler.accepting = true
  42. go handler.AcceptConnections(listener)
  43. if handler.udpEnabled {
  44. handler.ListenUDP(port)
  45. }
  46. return nil
  47. }
  48. func (handler *VMessInboundHandler) AcceptConnections(listener *net.TCPListener) error {
  49. for handler.accepting {
  50. retry.Timed(100 /* times */, 100 /* ms */).On(func() error {
  51. connection, err := listener.AcceptTCP()
  52. if err != nil {
  53. log.Error("Failed to accpet connection: %s", err.Error())
  54. return err
  55. }
  56. go handler.HandleConnection(connection)
  57. return nil
  58. })
  59. }
  60. return nil
  61. }
  62. func (handler *VMessInboundHandler) HandleConnection(connection *net.TCPConn) error {
  63. defer connection.Close()
  64. connReader := v2net.NewTimeOutReader(120, connection)
  65. requestReader := protocol.NewVMessRequestReader(handler.clients)
  66. request, err := requestReader.Read(connReader)
  67. if err != nil {
  68. log.Access(connection.RemoteAddr().String(), "", log.AccessRejected, err.Error())
  69. log.Warning("VMessIn: Invalid request from (%s): %v", connection.RemoteAddr().String(), err)
  70. return err
  71. }
  72. log.Access(connection.RemoteAddr().String(), request.Address.String(), log.AccessAccepted, "")
  73. log.Debug("VMessIn: Received request for %s", request.Address.String())
  74. ray := handler.dispatcher.DispatchToOutbound(v2net.NewPacket(request.Destination(), nil, true))
  75. input := ray.InboundInput()
  76. output := ray.InboundOutput()
  77. var readFinish, writeFinish sync.Mutex
  78. readFinish.Lock()
  79. writeFinish.Lock()
  80. go handleInput(request, connReader, input, &readFinish)
  81. responseKey := md5.Sum(request.RequestKey)
  82. responseIV := md5.Sum(request.RequestIV)
  83. responseWriter, err := v2io.NewAesEncryptWriter(responseKey[:], responseIV[:], connection)
  84. if err != nil {
  85. log.Error("VMessIn: Failed to create encrypt writer: %v", err)
  86. return err
  87. }
  88. // Optimize for small response packet
  89. buffer := alloc.NewLargeBuffer().Clear()
  90. buffer.Append(request.ResponseHeader)
  91. if data, open := <-output; open {
  92. buffer.Append(data.Value)
  93. data.Release()
  94. responseWriter.Write(buffer.Value)
  95. buffer.Release()
  96. go handleOutput(request, responseWriter, output, &writeFinish)
  97. writeFinish.Lock()
  98. }
  99. connection.CloseWrite()
  100. readFinish.Lock()
  101. return nil
  102. }
  103. func handleInput(request *protocol.VMessRequest, reader io.Reader, input chan<- *alloc.Buffer, finish *sync.Mutex) {
  104. defer close(input)
  105. defer finish.Unlock()
  106. requestReader, err := v2io.NewAesDecryptReader(request.RequestKey, request.RequestIV, reader)
  107. if err != nil {
  108. log.Error("VMessIn: Failed to create decrypt reader: %v", err)
  109. return
  110. }
  111. v2net.ReaderToChan(input, requestReader)
  112. }
  113. func handleOutput(request *protocol.VMessRequest, writer io.Writer, output <-chan *alloc.Buffer, finish *sync.Mutex) {
  114. v2net.ChanToWriter(writer, output)
  115. finish.Unlock()
  116. }
  117. type VMessInboundHandlerFactory struct {
  118. }
  119. func (factory *VMessInboundHandlerFactory) Create(dispatcher app.PacketDispatcher, rawConfig interface{}) (proxy.InboundConnectionHandler, error) {
  120. config := rawConfig.(config.Inbound)
  121. allowedClients := user.NewTimedUserSet()
  122. for _, user := range config.AllowedUsers() {
  123. allowedClients.AddUser(user)
  124. }
  125. return NewVMessInboundHandler(dispatcher, allowedClients, config.UDPEnabled()), nil
  126. }
  127. func init() {
  128. proxy.RegisterInboundConnectionHandlerFactory("vmess", &VMessInboundHandlerFactory{})
  129. }