vmessin_udp.go 2.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101
  1. package vmess
  2. import (
  3. "bytes"
  4. "crypto/md5"
  5. "net"
  6. "github.com/v2ray/v2ray-core/common/alloc"
  7. v2io "github.com/v2ray/v2ray-core/common/io"
  8. "github.com/v2ray/v2ray-core/common/log"
  9. v2net "github.com/v2ray/v2ray-core/common/net"
  10. "github.com/v2ray/v2ray-core/proxy/vmess/protocol"
  11. )
  12. const (
  13. bufferSize = 2 * 1024
  14. )
  15. func (handler *VMessInboundHandler) ListenUDP(port uint16) error {
  16. addr := &net.UDPAddr{
  17. IP: net.IP{0, 0, 0, 0},
  18. Port: int(port),
  19. Zone: "",
  20. }
  21. conn, err := net.ListenUDP("udp", addr)
  22. if err != nil {
  23. log.Error("VMessIn failed to listen UDP on port %d: %v", port, err)
  24. return err
  25. }
  26. go handler.AcceptPackets(conn)
  27. return nil
  28. }
  29. func (handler *VMessInboundHandler) AcceptPackets(conn *net.UDPConn) {
  30. for {
  31. buffer := make([]byte, bufferSize)
  32. nBytes, addr, err := conn.ReadFromUDP(buffer)
  33. if err != nil {
  34. log.Error("VMessIn failed to read UDP packets: %v", err)
  35. continue
  36. }
  37. reader := bytes.NewReader(buffer[:nBytes])
  38. requestReader := protocol.NewVMessRequestReader(handler.clients)
  39. request, err := requestReader.Read(reader)
  40. if err != nil {
  41. log.Warning("VMessIn: Invalid request from (%s): %v", addr.String(), err)
  42. continue
  43. }
  44. cryptReader, err := v2io.NewAesDecryptReader(request.RequestKey, request.RequestIV, reader)
  45. if err != nil {
  46. log.Error("VMessIn: Failed to create decrypt reader: %v", err)
  47. continue
  48. }
  49. data := alloc.NewBuffer()
  50. nBytes, err = cryptReader.Read(data.Value)
  51. if err != nil {
  52. log.Warning("VMessIn: Unable to decrypt data: %v", err)
  53. continue
  54. }
  55. data.Slice(0, nBytes)
  56. packet := v2net.NewPacket(request.Destination(), data, false)
  57. go handler.handlePacket(conn, request, packet, addr)
  58. }
  59. }
  60. func (handler *VMessInboundHandler) handlePacket(conn *net.UDPConn, request *protocol.VMessRequest, packet v2net.Packet, clientAddr *net.UDPAddr) {
  61. ray := handler.vPoint.DispatchToOutbound(packet)
  62. close(ray.InboundInput())
  63. responseKey := md5.Sum(request.RequestKey)
  64. responseIV := md5.Sum(request.RequestIV)
  65. buffer := bytes.NewBuffer(make([]byte, 0, bufferSize))
  66. responseWriter, err := v2io.NewAesEncryptWriter(responseKey[:], responseIV[:], buffer)
  67. if err != nil {
  68. log.Error("VMessIn: Failed to create encrypt writer: %v", err)
  69. return
  70. }
  71. responseWriter.Write(request.ResponseHeader)
  72. hasData := false
  73. if data, ok := <-ray.InboundOutput(); ok {
  74. hasData = true
  75. responseWriter.Write(data.Value)
  76. data.Release()
  77. data = nil
  78. }
  79. if hasData {
  80. conn.WriteToUDP(buffer.Bytes(), clientAddr)
  81. log.Info("VMessIn sending %d bytes to %s", len(buffer.Bytes()), clientAddr.String())
  82. }
  83. }