sniffer.go 3.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168
  1. package impl
  2. import (
  3. "bytes"
  4. "strings"
  5. "v2ray.com/core/common/serial"
  6. )
  7. var (
  8. ErrMoreData = newError("need more data")
  9. ErrInvalidData = newError("invalid data")
  10. )
  11. func ContainsValidHTTPMethod(b []byte) bool {
  12. if len(b) == 0 {
  13. return false
  14. }
  15. parts := bytes.Split(b, []byte{' '})
  16. part0Trimed := strings.ToLower(string(bytes.Trim(parts[0], " ")))
  17. return part0Trimed == "get" || part0Trimed == "post" ||
  18. part0Trimed == "head" || part0Trimed == "put" ||
  19. part0Trimed == "delete" || part0Trimed == "options" || part0Trimed == "connect"
  20. }
  21. func SniffHTTP(b []byte) (string, error) {
  22. if len(b) == 0 {
  23. return "", ErrMoreData
  24. }
  25. headers := bytes.Split(b, []byte{'\n'})
  26. if !ContainsValidHTTPMethod(headers[0]) {
  27. return "", ErrInvalidData
  28. }
  29. for i := 1; i < len(headers); i++ {
  30. header := headers[i]
  31. if len(header) == 0 {
  32. return "", ErrInvalidData
  33. }
  34. parts := bytes.SplitN(header, []byte{':'}, 2)
  35. if len(parts) != 2 {
  36. return "", ErrInvalidData
  37. }
  38. key := strings.ToLower(string(parts[0]))
  39. value := strings.ToLower(string(bytes.Trim(parts[1], " ")))
  40. if key == "host" {
  41. domain := strings.Split(value, ":")
  42. return strings.TrimSpace(domain[0]), nil
  43. }
  44. }
  45. return "", ErrMoreData
  46. }
  47. func IsValidTLSVersion(major, minor byte) bool {
  48. return major == 3
  49. }
  50. // ReadClientHello returns server name (if any) from TLS client hello message.
  51. // https://github.com/golang/go/blob/master/src/crypto/tls/handshake_messages.go#L300
  52. func ReadClientHello(data []byte) (string, error) {
  53. if len(data) < 42 {
  54. return "", ErrMoreData
  55. }
  56. sessionIDLen := int(data[38])
  57. if sessionIDLen > 32 || len(data) < 39+sessionIDLen {
  58. return "", ErrInvalidData
  59. }
  60. data = data[39+sessionIDLen:]
  61. if len(data) < 2 {
  62. return "", ErrMoreData
  63. }
  64. // cipherSuiteLen is the number of bytes of cipher suite numbers. Since
  65. // they are uint16s, the number must be even.
  66. cipherSuiteLen := int(data[0])<<8 | int(data[1])
  67. if cipherSuiteLen%2 == 1 || len(data) < 2+cipherSuiteLen {
  68. return "", ErrInvalidData
  69. }
  70. data = data[2+cipherSuiteLen:]
  71. if len(data) < 1 {
  72. return "", ErrMoreData
  73. }
  74. compressionMethodsLen := int(data[0])
  75. if len(data) < 1+compressionMethodsLen {
  76. return "", ErrMoreData
  77. }
  78. data = data[1+compressionMethodsLen:]
  79. if len(data) == 0 {
  80. return "", ErrInvalidData
  81. }
  82. if len(data) < 2 {
  83. return "", ErrInvalidData
  84. }
  85. extensionsLength := int(data[0])<<8 | int(data[1])
  86. data = data[2:]
  87. if extensionsLength != len(data) {
  88. return "", ErrInvalidData
  89. }
  90. for len(data) != 0 {
  91. if len(data) < 4 {
  92. return "", ErrInvalidData
  93. }
  94. extension := uint16(data[0])<<8 | uint16(data[1])
  95. length := int(data[2])<<8 | int(data[3])
  96. data = data[4:]
  97. if len(data) < length {
  98. return "", ErrInvalidData
  99. }
  100. switch extension {
  101. case 0x00: /* extensionServerName */
  102. d := data[:length]
  103. if len(d) < 2 {
  104. return "", ErrInvalidData
  105. }
  106. namesLen := int(d[0])<<8 | int(d[1])
  107. d = d[2:]
  108. if len(d) != namesLen {
  109. return "", ErrInvalidData
  110. }
  111. for len(d) > 0 {
  112. if len(d) < 3 {
  113. return "", ErrInvalidData
  114. }
  115. nameType := d[0]
  116. nameLen := int(d[1])<<8 | int(d[2])
  117. d = d[3:]
  118. if len(d) < nameLen {
  119. return "", ErrInvalidData
  120. }
  121. if nameType == 0 {
  122. serverName := string(d[:nameLen])
  123. // An SNI value may not include a
  124. // trailing dot. See
  125. // https://tools.ietf.org/html/rfc6066#section-3.
  126. if strings.HasSuffix(serverName, ".") {
  127. return "", ErrInvalidData
  128. }
  129. return serverName, nil
  130. }
  131. d = d[nameLen:]
  132. }
  133. }
  134. data = data[length:]
  135. }
  136. return "", ErrInvalidData
  137. }
  138. func SniffTLS(b []byte) (string, error) {
  139. if len(b) < 5 {
  140. return "", ErrMoreData
  141. }
  142. if b[0] != 0x16 /* TLS Handshake */ {
  143. return "", ErrInvalidData
  144. }
  145. if !IsValidTLSVersion(b[1], b[2]) {
  146. return "", ErrInvalidData
  147. }
  148. headerLen := int(serial.BytesToUint16(b[3:5]))
  149. if 5+headerLen > len(b) {
  150. return "", ErrMoreData
  151. }
  152. return ReadClientHello(b[5 : 5+headerLen])
  153. }