sniffer.go 3.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167
  1. package impl
  2. import (
  3. "bytes"
  4. "strings"
  5. "v2ray.com/core/common/serial"
  6. )
  7. var (
  8. ErrMoreData = newError("need more data")
  9. ErrInvalidData = newError("invalid data")
  10. )
  11. func ContainsValidHTTPMethod(b []byte) bool {
  12. if len(b) == 0 {
  13. return false
  14. }
  15. parts := bytes.Split(b, []byte{' '})
  16. part0Trimed := strings.ToLower(string(bytes.Trim(parts[0], " ")))
  17. return part0Trimed == "get" || part0Trimed == "post" ||
  18. part0Trimed == "head" || part0Trimed == "put" ||
  19. part0Trimed == "delete" || part0Trimed == "options" || part0Trimed == "connect"
  20. }
  21. func SniffHTTP(b []byte) (string, error) {
  22. if len(b) == 0 {
  23. return "", ErrMoreData
  24. }
  25. headers := bytes.Split(b, []byte{'\n'})
  26. if !ContainsValidHTTPMethod(headers[0]) {
  27. return "", ErrInvalidData
  28. }
  29. for i := 1; i < len(headers); i++ {
  30. header := headers[i]
  31. if len(header) == 0 {
  32. return "", ErrInvalidData
  33. }
  34. parts := bytes.SplitN(header, []byte{':'}, 2)
  35. if len(parts) != 2 {
  36. return "", ErrInvalidData
  37. }
  38. key := strings.ToLower(string(parts[0]))
  39. value := strings.ToLower(string(bytes.Trim(parts[1], " ")))
  40. if key == "host" {
  41. return value, nil
  42. }
  43. }
  44. return "", ErrMoreData
  45. }
  46. func IsValidTLSVersion(major, minor byte) bool {
  47. return major == 3
  48. }
  49. // ReadClientHello returns server name (if any) from TLS client hello message.
  50. // https://github.com/golang/go/blob/master/src/crypto/tls/handshake_messages.go#L300
  51. func ReadClientHello(data []byte) (string, error) {
  52. if len(data) < 42 {
  53. return "", ErrMoreData
  54. }
  55. sessionIdLen := int(data[38])
  56. if sessionIdLen > 32 || len(data) < 39+sessionIdLen {
  57. return "", ErrInvalidData
  58. }
  59. data = data[39+sessionIdLen:]
  60. if len(data) < 2 {
  61. return "", ErrMoreData
  62. }
  63. // cipherSuiteLen is the number of bytes of cipher suite numbers. Since
  64. // they are uint16s, the number must be even.
  65. cipherSuiteLen := int(data[0])<<8 | int(data[1])
  66. if cipherSuiteLen%2 == 1 || len(data) < 2+cipherSuiteLen {
  67. return "", ErrInvalidData
  68. }
  69. data = data[2+cipherSuiteLen:]
  70. if len(data) < 1 {
  71. return "", ErrMoreData
  72. }
  73. compressionMethodsLen := int(data[0])
  74. if len(data) < 1+compressionMethodsLen {
  75. return "", ErrMoreData
  76. }
  77. data = data[1+compressionMethodsLen:]
  78. if len(data) == 0 {
  79. return "", ErrInvalidData
  80. }
  81. if len(data) < 2 {
  82. return "", ErrInvalidData
  83. }
  84. extensionsLength := int(data[0])<<8 | int(data[1])
  85. data = data[2:]
  86. if extensionsLength != len(data) {
  87. return "", ErrInvalidData
  88. }
  89. for len(data) != 0 {
  90. if len(data) < 4 {
  91. return "", ErrInvalidData
  92. }
  93. extension := uint16(data[0])<<8 | uint16(data[1])
  94. length := int(data[2])<<8 | int(data[3])
  95. data = data[4:]
  96. if len(data) < length {
  97. return "", ErrInvalidData
  98. }
  99. switch extension {
  100. case 0x00: /* extensionServerName */
  101. d := data[:length]
  102. if len(d) < 2 {
  103. return "", ErrInvalidData
  104. }
  105. namesLen := int(d[0])<<8 | int(d[1])
  106. d = d[2:]
  107. if len(d) != namesLen {
  108. return "", ErrInvalidData
  109. }
  110. for len(d) > 0 {
  111. if len(d) < 3 {
  112. return "", ErrInvalidData
  113. }
  114. nameType := d[0]
  115. nameLen := int(d[1])<<8 | int(d[2])
  116. d = d[3:]
  117. if len(d) < nameLen {
  118. return "", ErrInvalidData
  119. }
  120. if nameType == 0 {
  121. serverName := string(d[:nameLen])
  122. // An SNI value may not include a
  123. // trailing dot. See
  124. // https://tools.ietf.org/html/rfc6066#section-3.
  125. if strings.HasSuffix(serverName, ".") {
  126. return "", ErrInvalidData
  127. }
  128. return serverName, nil
  129. }
  130. d = d[nameLen:]
  131. }
  132. }
  133. data = data[length:]
  134. }
  135. return "", ErrInvalidData
  136. }
  137. func SniffTLS(b []byte) (string, error) {
  138. if len(b) < 5 {
  139. return "", ErrMoreData
  140. }
  141. if b[0] != 0x16 /* TLS Handshake */ {
  142. return "", ErrInvalidData
  143. }
  144. if !IsValidTLSVersion(b[1], b[2]) {
  145. return "", ErrInvalidData
  146. }
  147. headerLen := int(serial.BytesToUint16(b[3:5]))
  148. if 5+headerLen > len(b) {
  149. return "", ErrMoreData
  150. }
  151. return ReadClientHello(b[5 : 5+headerLen])
  152. }