vmessout.go 4.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172
  1. package vmess
  2. import (
  3. "bytes"
  4. "crypto/md5"
  5. "crypto/rand"
  6. mrand "math/rand"
  7. "net"
  8. "github.com/v2ray/v2ray-core"
  9. v2io "github.com/v2ray/v2ray-core/common/io"
  10. "github.com/v2ray/v2ray-core/common/log"
  11. v2net "github.com/v2ray/v2ray-core/common/net"
  12. "github.com/v2ray/v2ray-core/proxy/vmess/protocol"
  13. "github.com/v2ray/v2ray-core/proxy/vmess/protocol/user"
  14. )
  15. // VNext is the next Point server in the connection chain.
  16. type VNextServer struct {
  17. Address v2net.Address // Address of VNext server
  18. Users []user.User // User accounts for accessing VNext.
  19. }
  20. type VMessOutboundHandler struct {
  21. vPoint *core.Point
  22. dest v2net.Address
  23. vNextList []VNextServer
  24. }
  25. func NewVMessOutboundHandler(vp *core.Point, vNextList []VNextServer, dest v2net.Address) *VMessOutboundHandler {
  26. return &VMessOutboundHandler{
  27. vPoint: vp,
  28. dest: dest,
  29. vNextList: vNextList,
  30. }
  31. }
  32. func (handler *VMessOutboundHandler) pickVNext() (v2net.Address, user.User) {
  33. vNextLen := len(handler.vNextList)
  34. if vNextLen == 0 {
  35. panic("VMessOut: Zero vNext is configured.")
  36. }
  37. vNextIndex := mrand.Intn(vNextLen)
  38. vNext := handler.vNextList[vNextIndex]
  39. vNextUserLen := len(vNext.Users)
  40. if vNextUserLen == 0 {
  41. panic("VMessOut: Zero User account.")
  42. }
  43. vNextUserIndex := mrand.Intn(vNextUserLen)
  44. vNextUser := vNext.Users[vNextUserIndex]
  45. return vNext.Address, vNextUser
  46. }
  47. func (handler *VMessOutboundHandler) Start(ray core.OutboundRay) error {
  48. vNextAddress, vNextUser := handler.pickVNext()
  49. request := &protocol.VMessRequest{
  50. Version: protocol.Version,
  51. UserId: vNextUser.Id,
  52. Command: byte(0x01),
  53. Address: handler.dest,
  54. }
  55. rand.Read(request.RequestIV[:])
  56. rand.Read(request.RequestKey[:])
  57. rand.Read(request.ResponseHeader[:])
  58. go startCommunicate(request, vNextAddress, ray)
  59. return nil
  60. }
  61. func startCommunicate(request *protocol.VMessRequest, dest v2net.Address, ray core.OutboundRay) error {
  62. input := ray.OutboundInput()
  63. output := ray.OutboundOutput()
  64. conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{dest.IP, int(dest.Port), ""})
  65. if err != nil {
  66. log.Error("Failed to open tcp (%s): %v", dest.String(), err)
  67. close(output)
  68. return err
  69. }
  70. log.Info("VMessOut: Tunneling request for %s", request.Address.String())
  71. defer conn.Close()
  72. requestFinish := make(chan bool)
  73. responseFinish := make(chan bool)
  74. go handleRequest(conn, request, input, requestFinish)
  75. go handleResponse(conn, request, output, responseFinish)
  76. <-requestFinish
  77. conn.CloseWrite()
  78. <-responseFinish
  79. return nil
  80. }
  81. func handleRequest(conn *net.TCPConn, request *protocol.VMessRequest, input <-chan []byte, finish chan<- bool) {
  82. defer close(finish)
  83. encryptRequestWriter, err := v2io.NewAesEncryptWriter(request.RequestKey[:], request.RequestIV[:], conn)
  84. if err != nil {
  85. log.Error("VMessOut: Failed to create encrypt writer: %v", err)
  86. return
  87. }
  88. buffer, err := request.ToBytes(user.NewTimeHash(user.HMACHash{}), user.GenerateRandomInt64InRange)
  89. if err != nil {
  90. log.Error("VMessOut: Failed to serialize VMess request: %v", err)
  91. return
  92. }
  93. // Send first packet of payload together with request, in favor of small requests.
  94. payload, open := <-input
  95. if open {
  96. encryptRequestWriter.Crypt(payload)
  97. buffer = append(buffer, payload...)
  98. _, err = conn.Write(buffer)
  99. if err != nil {
  100. log.Error("VMessOut: Failed to write VMess request: %v", err)
  101. return
  102. }
  103. v2net.ChanToWriter(encryptRequestWriter, input)
  104. }
  105. return
  106. }
  107. func handleResponse(conn *net.TCPConn, request *protocol.VMessRequest, output chan<- []byte, finish chan<- bool) {
  108. defer close(finish)
  109. defer close(output)
  110. responseKey := md5.Sum(request.RequestKey[:])
  111. responseIV := md5.Sum(request.RequestIV[:])
  112. decryptResponseReader, err := v2io.NewAesDecryptReader(responseKey[:], responseIV[:], conn)
  113. if err != nil {
  114. log.Error("VMessOut: Failed to create decrypt reader: %v", err)
  115. return
  116. }
  117. response := protocol.VMessResponse{}
  118. nBytes, err := decryptResponseReader.Read(response[:])
  119. if err != nil {
  120. log.Error("VMessOut: Failed to read VMess response (%d bytes): %v", nBytes, err)
  121. return
  122. }
  123. if !bytes.Equal(response[:], request.ResponseHeader[:]) {
  124. log.Warning("VMessOut: unexepcted response header. The connection is probably hijacked.")
  125. return
  126. }
  127. v2net.ReaderToChan(output, decryptResponseReader)
  128. return
  129. }
  130. type VMessOutboundHandlerFactory struct {
  131. }
  132. func (factory *VMessOutboundHandlerFactory) Create(vp *core.Point, rawConfig []byte, destination v2net.Address) (core.OutboundConnectionHandler, error) {
  133. config, err := loadOutboundConfig(rawConfig)
  134. if err != nil {
  135. panic(log.Error("Failed to load VMess outbound config: %v", err))
  136. }
  137. servers := make([]VNextServer, 0, len(config.VNextList))
  138. for _, server := range config.VNextList {
  139. servers = append(servers, server.ToVNextServer())
  140. }
  141. return NewVMessOutboundHandler(vp, servers, destination), nil
  142. }
  143. func init() {
  144. core.RegisterOutboundConnectionHandlerFactory("vmess", &VMessOutboundHandlerFactory{})
  145. }