inbound.go 5.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194
  1. package inbound
  2. import (
  3. "crypto/md5"
  4. "io"
  5. "net"
  6. "sync"
  7. "github.com/v2ray/v2ray-core/app"
  8. "github.com/v2ray/v2ray-core/common/alloc"
  9. v2crypto "github.com/v2ray/v2ray-core/common/crypto"
  10. "github.com/v2ray/v2ray-core/common/log"
  11. v2net "github.com/v2ray/v2ray-core/common/net"
  12. "github.com/v2ray/v2ray-core/common/retry"
  13. "github.com/v2ray/v2ray-core/common/serial"
  14. "github.com/v2ray/v2ray-core/proxy"
  15. "github.com/v2ray/v2ray-core/proxy/internal"
  16. "github.com/v2ray/v2ray-core/proxy/vmess"
  17. "github.com/v2ray/v2ray-core/proxy/vmess/protocol"
  18. )
  19. // Inbound connection handler that handles messages in VMess format.
  20. type VMessInboundHandler struct {
  21. sync.Mutex
  22. space app.Space
  23. clients protocol.UserSet
  24. user *vmess.User
  25. accepting bool
  26. listener *net.TCPListener
  27. features *FeaturesConfig
  28. listeningPort v2net.Port
  29. }
  30. func (this *VMessInboundHandler) Port() v2net.Port {
  31. return this.listeningPort
  32. }
  33. func (this *VMessInboundHandler) Close() {
  34. this.accepting = false
  35. if this.listener != nil {
  36. this.listener.Close()
  37. this.Lock()
  38. this.listener = nil
  39. this.Unlock()
  40. }
  41. }
  42. func (this *VMessInboundHandler) GetUser() *vmess.User {
  43. return this.user
  44. }
  45. func (this *VMessInboundHandler) Listen(port v2net.Port) error {
  46. if this.accepting {
  47. if this.listeningPort == port {
  48. return nil
  49. } else {
  50. return proxy.ErrorAlreadyListening
  51. }
  52. }
  53. this.listeningPort = port
  54. listener, err := net.ListenTCP("tcp", &net.TCPAddr{
  55. IP: []byte{0, 0, 0, 0},
  56. Port: int(port),
  57. Zone: "",
  58. })
  59. if err != nil {
  60. log.Error("Unable to listen tcp port ", port, ": ", err)
  61. return err
  62. }
  63. this.accepting = true
  64. this.Lock()
  65. this.listener = listener
  66. this.Unlock()
  67. go this.AcceptConnections()
  68. return nil
  69. }
  70. func (this *VMessInboundHandler) AcceptConnections() error {
  71. for this.accepting {
  72. retry.Timed(100 /* times */, 100 /* ms */).On(func() error {
  73. this.Lock()
  74. defer this.Unlock()
  75. if !this.accepting {
  76. return nil
  77. }
  78. connection, err := this.listener.AcceptTCP()
  79. if err != nil {
  80. log.Error("Failed to accpet connection: ", err)
  81. return err
  82. }
  83. go this.HandleConnection(connection)
  84. return nil
  85. })
  86. }
  87. return nil
  88. }
  89. func (this *VMessInboundHandler) HandleConnection(connection *net.TCPConn) error {
  90. defer connection.Close()
  91. connReader := v2net.NewTimeOutReader(16, connection)
  92. requestReader := protocol.NewVMessRequestReader(this.clients)
  93. request, err := requestReader.Read(connReader)
  94. if err != nil {
  95. log.Access(connection.RemoteAddr(), serial.StringLiteral(""), log.AccessRejected, serial.StringLiteral(err.Error()))
  96. log.Warning("VMessIn: Invalid request from ", connection.RemoteAddr(), ": ", err)
  97. return err
  98. }
  99. log.Access(connection.RemoteAddr(), request.Address, log.AccessAccepted, serial.StringLiteral(""))
  100. log.Debug("VMessIn: Received request for ", request.Address)
  101. ray := this.space.PacketDispatcher().DispatchToOutbound(v2net.NewPacket(request.Destination(), nil, true))
  102. input := ray.InboundInput()
  103. output := ray.InboundOutput()
  104. var readFinish, writeFinish sync.Mutex
  105. readFinish.Lock()
  106. writeFinish.Lock()
  107. userSettings := vmess.GetUserSettings(request.User.Level)
  108. connReader.SetTimeOut(userSettings.PayloadReadTimeout)
  109. go handleInput(request, connReader, input, &readFinish)
  110. responseKey := md5.Sum(request.RequestKey)
  111. responseIV := md5.Sum(request.RequestIV)
  112. aesStream, err := v2crypto.NewAesEncryptionStream(responseKey[:], responseIV[:])
  113. if err != nil {
  114. log.Error("VMessIn: Failed to create AES decryption stream: ", err)
  115. close(input)
  116. return err
  117. }
  118. responseWriter := v2crypto.NewCryptionWriter(aesStream, connection)
  119. // Optimize for small response packet
  120. buffer := alloc.NewLargeBuffer().Clear()
  121. defer buffer.Release()
  122. buffer.AppendBytes(request.ResponseHeader[0] ^ request.ResponseHeader[1])
  123. buffer.AppendBytes(request.ResponseHeader[2] ^ request.ResponseHeader[3])
  124. buffer.AppendBytes(byte(0), byte(0))
  125. if data, open := <-output; open {
  126. buffer.Append(data.Value)
  127. data.Release()
  128. responseWriter.Write(buffer.Value)
  129. go handleOutput(request, responseWriter, output, &writeFinish)
  130. writeFinish.Lock()
  131. }
  132. connection.CloseWrite()
  133. readFinish.Lock()
  134. return nil
  135. }
  136. func handleInput(request *protocol.VMessRequest, reader io.Reader, input chan<- *alloc.Buffer, finish *sync.Mutex) {
  137. defer close(input)
  138. defer finish.Unlock()
  139. aesStream, err := v2crypto.NewAesDecryptionStream(request.RequestKey, request.RequestIV)
  140. if err != nil {
  141. log.Error("VMessIn: Failed to create AES decryption stream: ", err)
  142. return
  143. }
  144. requestReader := v2crypto.NewCryptionReader(aesStream, reader)
  145. v2net.ReaderToChan(input, requestReader)
  146. }
  147. func handleOutput(request *protocol.VMessRequest, writer io.Writer, output <-chan *alloc.Buffer, finish *sync.Mutex) {
  148. v2net.ChanToWriter(writer, output)
  149. finish.Unlock()
  150. }
  151. func init() {
  152. internal.MustRegisterInboundConnectionHandlerCreator("vmess",
  153. func(space app.Space, rawConfig interface{}) (proxy.InboundConnectionHandler, error) {
  154. config := rawConfig.(*Config)
  155. allowedClients := protocol.NewTimedUserSet()
  156. for _, user := range config.AllowedUsers {
  157. allowedClients.AddUser(user)
  158. }
  159. return &VMessInboundHandler{
  160. space: space,
  161. clients: allowedClients,
  162. features: config.Features,
  163. user: config.AllowedUsers[0],
  164. }, nil
  165. })
  166. }