vmessout.go 5.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197
  1. package vmess
  2. import (
  3. "bytes"
  4. "crypto/md5"
  5. "crypto/rand"
  6. mrand "math/rand"
  7. "net"
  8. "sync"
  9. "github.com/v2ray/v2ray-core/common/alloc"
  10. v2crypto "github.com/v2ray/v2ray-core/common/crypto"
  11. "github.com/v2ray/v2ray-core/common/log"
  12. v2net "github.com/v2ray/v2ray-core/common/net"
  13. "github.com/v2ray/v2ray-core/proxy/common/connhandler"
  14. "github.com/v2ray/v2ray-core/proxy/vmess/config"
  15. "github.com/v2ray/v2ray-core/proxy/vmess/protocol"
  16. "github.com/v2ray/v2ray-core/proxy/vmess/protocol/user"
  17. "github.com/v2ray/v2ray-core/transport/ray"
  18. )
  19. type VMessOutboundHandler struct {
  20. vNextList []*config.OutboundTarget
  21. }
  22. func NewVMessOutboundHandler(vNextList []*config.OutboundTarget) *VMessOutboundHandler {
  23. return &VMessOutboundHandler{
  24. vNextList: vNextList,
  25. }
  26. }
  27. func pickVNext(serverList []*config.OutboundTarget) (v2net.Destination, config.User) {
  28. vNextLen := len(serverList)
  29. if vNextLen == 0 {
  30. panic("VMessOut: Zero vNext is configured.")
  31. }
  32. vNextIndex := 0
  33. if vNextLen > 1 {
  34. vNextIndex = mrand.Intn(vNextLen)
  35. }
  36. vNext := serverList[vNextIndex]
  37. vNextUserLen := len(vNext.Accounts)
  38. if vNextUserLen == 0 {
  39. panic("VMessOut: Zero User account.")
  40. }
  41. vNextUserIndex := 0
  42. if vNextUserLen > 1 {
  43. vNextUserIndex = mrand.Intn(vNextUserLen)
  44. }
  45. vNextUser := vNext.Accounts[vNextUserIndex]
  46. return vNext.Destination, vNextUser
  47. }
  48. func (this *VMessOutboundHandler) Dispatch(firstPacket v2net.Packet, ray ray.OutboundRay) error {
  49. vNextList := this.vNextList
  50. vNextAddress, vNextUser := pickVNext(vNextList)
  51. command := protocol.CmdTCP
  52. if firstPacket.Destination().IsUDP() {
  53. command = protocol.CmdUDP
  54. }
  55. request := &protocol.VMessRequest{
  56. Version: protocol.Version,
  57. User: vNextUser,
  58. Command: command,
  59. Address: firstPacket.Destination().Address(),
  60. }
  61. buffer := alloc.NewSmallBuffer()
  62. defer buffer.Release()
  63. v2net.ReadAllBytes(rand.Reader, buffer.Value[:36]) // 16 + 16 + 4
  64. request.RequestIV = buffer.Value[:16]
  65. request.RequestKey = buffer.Value[16:32]
  66. request.ResponseHeader = buffer.Value[32:36]
  67. return startCommunicate(request, vNextAddress, ray, firstPacket)
  68. }
  69. func startCommunicate(request *protocol.VMessRequest, dest v2net.Destination, ray ray.OutboundRay, firstPacket v2net.Packet) error {
  70. conn, err := net.Dial(dest.Network(), dest.Address().String())
  71. if err != nil {
  72. log.Error("Failed to open %s: %v", dest.String(), err)
  73. if ray != nil {
  74. close(ray.OutboundOutput())
  75. }
  76. return err
  77. }
  78. log.Info("VMessOut: Tunneling request to %s via %s", request.Address.String(), dest.String())
  79. defer conn.Close()
  80. input := ray.OutboundInput()
  81. output := ray.OutboundOutput()
  82. var requestFinish, responseFinish sync.Mutex
  83. requestFinish.Lock()
  84. responseFinish.Lock()
  85. go handleRequest(conn, request, firstPacket, input, &requestFinish)
  86. go handleResponse(conn, request, output, &responseFinish, dest.IsUDP())
  87. requestFinish.Lock()
  88. if tcpConn, ok := conn.(*net.TCPConn); ok {
  89. tcpConn.CloseWrite()
  90. }
  91. responseFinish.Lock()
  92. return nil
  93. }
  94. func handleRequest(conn net.Conn, request *protocol.VMessRequest, firstPacket v2net.Packet, input <-chan *alloc.Buffer, finish *sync.Mutex) {
  95. defer finish.Unlock()
  96. aesStream, err := v2crypto.NewAesEncryptionStream(request.RequestKey[:], request.RequestIV[:])
  97. if err != nil {
  98. log.Error("VMessOut: Failed to create AES encryption stream: %v", err)
  99. return
  100. }
  101. encryptRequestWriter := v2crypto.NewCryptionWriter(aesStream, conn)
  102. buffer := alloc.NewBuffer().Clear()
  103. buffer, err = request.ToBytes(user.NewTimeHash(user.HMACHash{}), user.GenerateRandomInt64InRange, buffer)
  104. if err != nil {
  105. log.Error("VMessOut: Failed to serialize VMess request: %v", err)
  106. return
  107. }
  108. // Send first packet of payload together with request, in favor of small requests.
  109. firstChunk := firstPacket.Chunk()
  110. moreChunks := firstPacket.MoreChunks()
  111. if firstChunk == nil && moreChunks {
  112. firstChunk, moreChunks = <-input
  113. }
  114. if firstChunk != nil {
  115. aesStream.XORKeyStream(firstChunk.Value, firstChunk.Value)
  116. buffer.Append(firstChunk.Value)
  117. firstChunk.Release()
  118. _, err = conn.Write(buffer.Value)
  119. buffer.Release()
  120. if err != nil {
  121. log.Error("VMessOut: Failed to write VMess request: %v", err)
  122. return
  123. }
  124. }
  125. if moreChunks {
  126. v2net.ChanToWriter(encryptRequestWriter, input)
  127. }
  128. return
  129. }
  130. func handleResponse(conn net.Conn, request *protocol.VMessRequest, output chan<- *alloc.Buffer, finish *sync.Mutex, isUDP bool) {
  131. defer finish.Unlock()
  132. defer close(output)
  133. responseKey := md5.Sum(request.RequestKey[:])
  134. responseIV := md5.Sum(request.RequestIV[:])
  135. aesStream, err := v2crypto.NewAesDecryptionStream(responseKey[:], responseIV[:])
  136. if err != nil {
  137. log.Error("VMessOut: Failed to create AES encryption stream: %v", err)
  138. return
  139. }
  140. decryptResponseReader := v2crypto.NewCryptionReader(aesStream, conn)
  141. buffer, err := v2net.ReadFrom(decryptResponseReader, nil)
  142. if err != nil {
  143. log.Error("VMessOut: Failed to read VMess response (%d bytes): %v", buffer.Len(), err)
  144. return
  145. }
  146. if buffer.Len() < 4 || !bytes.Equal(buffer.Value[:4], request.ResponseHeader[:]) {
  147. log.Warning("VMessOut: unexepcted response header. The connection is probably hijacked.")
  148. return
  149. }
  150. log.Info("VMessOut received %d bytes from %s", buffer.Len()-4, conn.RemoteAddr().String())
  151. buffer.SliceFrom(4)
  152. output <- buffer
  153. if !isUDP {
  154. v2net.ReaderToChan(output, decryptResponseReader)
  155. }
  156. return
  157. }
  158. type VMessOutboundHandlerFactory struct {
  159. }
  160. func (this *VMessOutboundHandlerFactory) Create(rawConfig interface{}) (connhandler.OutboundConnectionHandler, error) {
  161. vOutConfig := rawConfig.(config.Outbound)
  162. return NewVMessOutboundHandler(vOutConfig.Targets()), nil
  163. }
  164. func init() {
  165. connhandler.RegisterOutboundConnectionHandlerFactory("vmess", &VMessOutboundHandlerFactory{})
  166. }