vmessin_udp.go 2.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111
  1. package vmess
  2. import (
  3. "bytes"
  4. "crypto/md5"
  5. "net"
  6. "github.com/v2ray/v2ray-core/common/alloc"
  7. v2crypto "github.com/v2ray/v2ray-core/common/crypto"
  8. "github.com/v2ray/v2ray-core/common/log"
  9. v2net "github.com/v2ray/v2ray-core/common/net"
  10. "github.com/v2ray/v2ray-core/proxy/vmess/protocol"
  11. )
  12. const (
  13. bufferSize = 2 * 1024
  14. )
  15. func (handler *VMessInboundHandler) ListenUDP(port uint16) error {
  16. addr := &net.UDPAddr{
  17. IP: net.IP{0, 0, 0, 0},
  18. Port: int(port),
  19. Zone: "",
  20. }
  21. conn, err := net.ListenUDP("udp", addr)
  22. if err != nil {
  23. log.Error("VMessIn failed to listen UDP on port %d: %v", port, err)
  24. return err
  25. }
  26. go handler.AcceptPackets(conn)
  27. return nil
  28. }
  29. func (handler *VMessInboundHandler) AcceptPackets(conn *net.UDPConn) {
  30. for {
  31. buffer := alloc.NewBuffer()
  32. nBytes, addr, err := conn.ReadFromUDP(buffer.Value)
  33. if err != nil {
  34. log.Error("VMessIn failed to read UDP packets: %v", err)
  35. buffer.Release()
  36. continue
  37. }
  38. reader := bytes.NewReader(buffer.Value[:nBytes])
  39. requestReader := protocol.NewVMessRequestReader(handler.clients)
  40. request, err := requestReader.Read(reader)
  41. if err != nil {
  42. log.Access(addr.String(), "", log.AccessRejected, err.Error())
  43. log.Warning("VMessIn: Invalid request from (%s): %v", addr.String(), err)
  44. buffer.Release()
  45. continue
  46. }
  47. log.Access(addr.String(), request.Address.String(), log.AccessAccepted, "")
  48. aesStream, err := v2crypto.NewAesDecryptionStream(request.RequestKey, request.RequestIV)
  49. if err != nil {
  50. log.Error("VMessIn: Failed to AES decryption stream: %v", err)
  51. buffer.Release()
  52. continue
  53. }
  54. cryptReader := v2crypto.NewCryptionReader(aesStream, reader)
  55. data := alloc.NewBuffer()
  56. nBytes, err = cryptReader.Read(data.Value)
  57. buffer.Release()
  58. if err != nil {
  59. log.Warning("VMessIn: Unable to decrypt data: %v", err)
  60. data.Release()
  61. continue
  62. }
  63. data.Slice(0, nBytes)
  64. packet := v2net.NewPacket(request.Destination(), data, false)
  65. go handler.handlePacket(conn, request, packet, addr)
  66. }
  67. }
  68. func (handler *VMessInboundHandler) handlePacket(conn *net.UDPConn, request *protocol.VMessRequest, packet v2net.Packet, clientAddr *net.UDPAddr) {
  69. ray := handler.dispatcher.DispatchToOutbound(packet)
  70. close(ray.InboundInput())
  71. responseKey := md5.Sum(request.RequestKey)
  72. responseIV := md5.Sum(request.RequestIV)
  73. buffer := alloc.NewBuffer().Clear()
  74. defer buffer.Release()
  75. aesStream, err := v2crypto.NewAesEncryptionStream(responseKey[:], responseIV[:])
  76. if err != nil {
  77. log.Error("VMessIn: Failed to create AES encryption stream: %v", err)
  78. return
  79. }
  80. responseWriter := v2crypto.NewCryptionWriter(aesStream, buffer)
  81. responseWriter.Write(request.ResponseHeader)
  82. hasData := false
  83. if data, ok := <-ray.InboundOutput(); ok {
  84. hasData = true
  85. responseWriter.Write(data.Value)
  86. data.Release()
  87. }
  88. if hasData {
  89. conn.WriteToUDP(buffer.Value, clientAddr)
  90. log.Info("VMessIn sending %d bytes to %s", buffer.Len(), clientAddr.String())
  91. }
  92. }