vmessin_udp.go 2.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104
  1. package vmess
  2. import (
  3. "bytes"
  4. "crypto/md5"
  5. "net"
  6. "github.com/v2ray/v2ray-core/common/alloc"
  7. v2io "github.com/v2ray/v2ray-core/common/io"
  8. "github.com/v2ray/v2ray-core/common/log"
  9. v2net "github.com/v2ray/v2ray-core/common/net"
  10. "github.com/v2ray/v2ray-core/proxy/vmess/protocol"
  11. )
  12. const (
  13. bufferSize = 2 * 1024
  14. )
  15. func (handler *VMessInboundHandler) ListenUDP(port uint16) error {
  16. addr := &net.UDPAddr{
  17. IP: net.IP{0, 0, 0, 0},
  18. Port: int(port),
  19. Zone: "",
  20. }
  21. conn, err := net.ListenUDP("udp", addr)
  22. if err != nil {
  23. log.Error("VMessIn failed to listen UDP on port %d: %v", port, err)
  24. return err
  25. }
  26. go handler.AcceptPackets(conn)
  27. return nil
  28. }
  29. func (handler *VMessInboundHandler) AcceptPackets(conn *net.UDPConn) {
  30. for {
  31. buffer := make([]byte, bufferSize)
  32. nBytes, addr, err := conn.ReadFromUDP(buffer)
  33. if err != nil {
  34. log.Error("VMessIn failed to read UDP packets: %v", err)
  35. continue
  36. }
  37. reader := bytes.NewReader(buffer[:nBytes])
  38. requestReader := protocol.NewVMessRequestReader(handler.clients)
  39. request, err := requestReader.Read(reader)
  40. if err != nil {
  41. log.Access(addr.String(), "", log.AccessRejected, err.Error())
  42. log.Warning("VMessIn: Invalid request from (%s): %v", addr.String(), err)
  43. continue
  44. }
  45. log.Access(addr.String(), request.Address.String(), log.AccessAccepted, "")
  46. cryptReader, err := v2io.NewAesDecryptReader(request.RequestKey, request.RequestIV, reader)
  47. if err != nil {
  48. log.Error("VMessIn: Failed to create decrypt reader: %v", err)
  49. continue
  50. }
  51. data := alloc.NewBuffer()
  52. nBytes, err = cryptReader.Read(data.Value)
  53. if err != nil {
  54. log.Warning("VMessIn: Unable to decrypt data: %v", err)
  55. data.Release()
  56. continue
  57. }
  58. data.Slice(0, nBytes)
  59. packet := v2net.NewPacket(request.Destination(), data, false)
  60. go handler.handlePacket(conn, request, packet, addr)
  61. }
  62. }
  63. func (handler *VMessInboundHandler) handlePacket(conn *net.UDPConn, request *protocol.VMessRequest, packet v2net.Packet, clientAddr *net.UDPAddr) {
  64. ray := handler.dispatcher.DispatchToOutbound(packet)
  65. close(ray.InboundInput())
  66. responseKey := md5.Sum(request.RequestKey)
  67. responseIV := md5.Sum(request.RequestIV)
  68. buffer := alloc.NewBuffer().Clear()
  69. defer buffer.Release()
  70. responseWriter, err := v2io.NewAesEncryptWriter(responseKey[:], responseIV[:], buffer)
  71. if err != nil {
  72. log.Error("VMessIn: Failed to create encrypt writer: %v", err)
  73. return
  74. }
  75. responseWriter.Write(request.ResponseHeader)
  76. hasData := false
  77. if data, ok := <-ray.InboundOutput(); ok {
  78. hasData = true
  79. responseWriter.Write(data.Value)
  80. data.Release()
  81. }
  82. if hasData {
  83. conn.WriteToUDP(buffer.Value, clientAddr)
  84. log.Info("VMessIn sending %d bytes to %s", buffer.Len(), clientAddr.String())
  85. }
  86. }