vmessout.go 5.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202
  1. package vmess
  2. import (
  3. "bytes"
  4. "crypto/md5"
  5. "crypto/rand"
  6. mrand "math/rand"
  7. "net"
  8. "github.com/v2ray/v2ray-core"
  9. v2io "github.com/v2ray/v2ray-core/common/io"
  10. "github.com/v2ray/v2ray-core/common/log"
  11. v2net "github.com/v2ray/v2ray-core/common/net"
  12. "github.com/v2ray/v2ray-core/proxy/vmess/protocol"
  13. "github.com/v2ray/v2ray-core/proxy/vmess/protocol/user"
  14. )
  15. const (
  16. InfoTimeNotSync = "Please check the User ID in your vmess configuration, and make sure the time on your local and remote server are in sync."
  17. )
  18. // VNext is the next Point server in the connection chain.
  19. type VNextServer struct {
  20. Destination v2net.Destination // Address of VNext server
  21. Users []user.User // User accounts for accessing VNext.
  22. }
  23. type VMessOutboundHandler struct {
  24. vPoint *core.Point
  25. packet v2net.Packet
  26. vNextList []VNextServer
  27. }
  28. func NewVMessOutboundHandler(vp *core.Point, vNextList []VNextServer, firstPacket v2net.Packet) *VMessOutboundHandler {
  29. return &VMessOutboundHandler{
  30. vPoint: vp,
  31. packet: firstPacket,
  32. vNextList: vNextList,
  33. }
  34. }
  35. func (handler *VMessOutboundHandler) pickVNext() (v2net.Destination, user.User) {
  36. vNextLen := len(handler.vNextList)
  37. if vNextLen == 0 {
  38. panic("VMessOut: Zero vNext is configured.")
  39. }
  40. vNextIndex := 0
  41. if vNextLen > 1 {
  42. vNextIndex = mrand.Intn(vNextLen)
  43. }
  44. vNext := handler.vNextList[vNextIndex]
  45. vNextUserLen := len(vNext.Users)
  46. if vNextUserLen == 0 {
  47. panic("VMessOut: Zero User account.")
  48. }
  49. vNextUserIndex := 0
  50. if vNextUserLen > 1 {
  51. vNextUserIndex = mrand.Intn(vNextUserLen)
  52. }
  53. vNextUser := vNext.Users[vNextUserIndex]
  54. return vNext.Destination, vNextUser
  55. }
  56. func (handler *VMessOutboundHandler) Start(ray core.OutboundRay) error {
  57. vNextAddress, vNextUser := handler.pickVNext()
  58. command := protocol.CmdTCP
  59. if handler.packet.Destination().IsUDP() {
  60. command = protocol.CmdUDP
  61. }
  62. request := &protocol.VMessRequest{
  63. Version: protocol.Version,
  64. UserId: vNextUser.Id,
  65. Command: command,
  66. Address: handler.packet.Destination().Address(),
  67. }
  68. rand.Read(request.RequestIV[:])
  69. rand.Read(request.RequestKey[:])
  70. rand.Read(request.ResponseHeader[:])
  71. go startCommunicate(request, vNextAddress, ray, handler.packet)
  72. return nil
  73. }
  74. func startCommunicate(request *protocol.VMessRequest, dest v2net.Destination, ray core.OutboundRay, firstPacket v2net.Packet) error {
  75. conn, err := net.DialTCP(dest.Network(), nil, &net.TCPAddr{dest.Address().IP(), int(dest.Address().Port()), ""})
  76. if err != nil {
  77. log.Error("Failed to open tcp (%s): %v", dest.String(), err)
  78. if ray != nil {
  79. close(ray.OutboundOutput())
  80. }
  81. return err
  82. }
  83. log.Info("VMessOut: Tunneling request for %s", request.Address.String())
  84. defer conn.Close()
  85. if chunk := firstPacket.Chunk(); chunk != nil {
  86. conn.Write(chunk)
  87. }
  88. if !firstPacket.MoreChunks() {
  89. if ray != nil {
  90. close(ray.OutboundOutput())
  91. }
  92. return nil
  93. }
  94. input := ray.OutboundInput()
  95. output := ray.OutboundOutput()
  96. requestFinish := make(chan bool)
  97. responseFinish := make(chan bool)
  98. go handleRequest(conn, request, input, requestFinish)
  99. go handleResponse(conn, request, output, responseFinish)
  100. <-requestFinish
  101. conn.CloseWrite()
  102. <-responseFinish
  103. return nil
  104. }
  105. func handleRequest(conn *net.TCPConn, request *protocol.VMessRequest, input <-chan []byte, finish chan<- bool) {
  106. defer close(finish)
  107. encryptRequestWriter, err := v2io.NewAesEncryptWriter(request.RequestKey[:], request.RequestIV[:], conn)
  108. if err != nil {
  109. log.Error("VMessOut: Failed to create encrypt writer: %v", err)
  110. return
  111. }
  112. buffer := make([]byte, 0, 2*1024)
  113. buffer, err = request.ToBytes(user.NewTimeHash(user.HMACHash{}), user.GenerateRandomInt64InRange, buffer)
  114. if err != nil {
  115. log.Error("VMessOut: Failed to serialize VMess request: %v", err)
  116. return
  117. }
  118. // Send first packet of payload together with request, in favor of small requests.
  119. payload, open := <-input
  120. if open {
  121. encryptRequestWriter.Crypt(payload)
  122. buffer = append(buffer, payload...)
  123. _, err = conn.Write(buffer)
  124. if err != nil {
  125. log.Error("VMessOut: Failed to write VMess request: %v", err)
  126. return
  127. }
  128. v2net.ChanToWriter(encryptRequestWriter, input)
  129. }
  130. return
  131. }
  132. func handleResponse(conn *net.TCPConn, request *protocol.VMessRequest, output chan<- []byte, finish chan<- bool) {
  133. defer close(finish)
  134. defer close(output)
  135. responseKey := md5.Sum(request.RequestKey[:])
  136. responseIV := md5.Sum(request.RequestIV[:])
  137. decryptResponseReader, err := v2io.NewAesDecryptReader(responseKey[:], responseIV[:], conn)
  138. if err != nil {
  139. log.Error("VMessOut: Failed to create decrypt reader: %v", err)
  140. return
  141. }
  142. response := protocol.VMessResponse{}
  143. nBytes, err := decryptResponseReader.Read(response[:])
  144. if err != nil {
  145. log.Error("VMessOut: Failed to read VMess response (%d bytes): %v", nBytes, err)
  146. log.Error(InfoTimeNotSync)
  147. return
  148. }
  149. if !bytes.Equal(response[:], request.ResponseHeader[:]) {
  150. log.Warning("VMessOut: unexepcted response header. The connection is probably hijacked.")
  151. return
  152. }
  153. v2net.ReaderToChan(output, decryptResponseReader)
  154. return
  155. }
  156. type VMessOutboundHandlerFactory struct {
  157. }
  158. func (factory *VMessOutboundHandlerFactory) Create(vp *core.Point, rawConfig []byte, firstPacket v2net.Packet) (core.OutboundConnectionHandler, error) {
  159. config, err := loadOutboundConfig(rawConfig)
  160. if err != nil {
  161. panic(log.Error("Failed to load VMess outbound config: %v", err))
  162. }
  163. servers := make([]VNextServer, 0, len(config.VNextList))
  164. for _, server := range config.VNextList {
  165. servers = append(servers, server.ToVNextServer())
  166. }
  167. return NewVMessOutboundHandler(vp, servers, firstPacket), nil
  168. }
  169. func init() {
  170. core.RegisterOutboundConnectionHandlerFactory("vmess", &VMessOutboundHandlerFactory{})
  171. }