shadowsocks_test.go 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854
  1. package scenarios
  2. import (
  3. "crypto/rand"
  4. "fmt"
  5. "sync"
  6. "testing"
  7. "time"
  8. "v2ray.com/core"
  9. "v2ray.com/core/app/log"
  10. "v2ray.com/core/app/proxyman"
  11. "v2ray.com/core/common/buf"
  12. "v2ray.com/core/common/net"
  13. "v2ray.com/core/common/protocol"
  14. "v2ray.com/core/common/serial"
  15. "v2ray.com/core/proxy/dokodemo"
  16. "v2ray.com/core/proxy/freedom"
  17. "v2ray.com/core/proxy/shadowsocks"
  18. "v2ray.com/core/testing/servers/tcp"
  19. "v2ray.com/core/testing/servers/udp"
  20. . "v2ray.com/ext/assert"
  21. ss "github.com/shadowsocks/go-shadowsocks2/core"
  22. )
  23. func TestShadowsocksAES256TCP(t *testing.T) {
  24. assert := With(t)
  25. tcpServer := tcp.Server{
  26. MsgProcessor: xor,
  27. }
  28. dest, err := tcpServer.Start()
  29. assert(err, IsNil)
  30. defer tcpServer.Close()
  31. account := serial.ToTypedMessage(&shadowsocks.Account{
  32. Password: "shadowsocks-password",
  33. CipherType: shadowsocks.CipherType_AES_256_CFB,
  34. Ota: shadowsocks.Account_Enabled,
  35. })
  36. serverPort := pickPort()
  37. serverConfig := &core.Config{
  38. App: []*serial.TypedMessage{
  39. serial.ToTypedMessage(&log.Config{
  40. ErrorLogLevel: log.LogLevel_Debug,
  41. ErrorLogType: log.LogType_Console,
  42. }),
  43. },
  44. Inbound: []*proxyman.InboundHandlerConfig{
  45. {
  46. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  47. PortRange: net.SinglePortRange(serverPort),
  48. Listen: net.NewIPOrDomain(net.LocalHostIP),
  49. }),
  50. ProxySettings: serial.ToTypedMessage(&shadowsocks.ServerConfig{
  51. User: &protocol.User{
  52. Account: account,
  53. Level: 1,
  54. },
  55. }),
  56. },
  57. },
  58. Outbound: []*proxyman.OutboundHandlerConfig{
  59. {
  60. ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
  61. },
  62. },
  63. }
  64. clientPort := pickPort()
  65. clientConfig := &core.Config{
  66. App: []*serial.TypedMessage{
  67. serial.ToTypedMessage(&log.Config{
  68. ErrorLogLevel: log.LogLevel_Debug,
  69. ErrorLogType: log.LogType_Console,
  70. }),
  71. },
  72. Inbound: []*proxyman.InboundHandlerConfig{
  73. {
  74. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  75. PortRange: net.SinglePortRange(clientPort),
  76. Listen: net.NewIPOrDomain(net.LocalHostIP),
  77. }),
  78. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  79. Address: net.NewIPOrDomain(dest.Address),
  80. Port: uint32(dest.Port),
  81. NetworkList: &net.NetworkList{
  82. Network: []net.Network{net.Network_TCP},
  83. },
  84. }),
  85. },
  86. },
  87. Outbound: []*proxyman.OutboundHandlerConfig{
  88. {
  89. ProxySettings: serial.ToTypedMessage(&shadowsocks.ClientConfig{
  90. Server: []*protocol.ServerEndpoint{
  91. {
  92. Address: net.NewIPOrDomain(net.LocalHostIP),
  93. Port: uint32(serverPort),
  94. User: []*protocol.User{
  95. {
  96. Account: account,
  97. },
  98. },
  99. },
  100. },
  101. }),
  102. },
  103. },
  104. }
  105. servers, err := InitializeServerConfigs(serverConfig, clientConfig)
  106. assert(err, IsNil)
  107. var wg sync.WaitGroup
  108. wg.Add(10)
  109. for i := 0; i < 10; i++ {
  110. go func() {
  111. conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{
  112. IP: []byte{127, 0, 0, 1},
  113. Port: int(clientPort),
  114. })
  115. assert(err, IsNil)
  116. payload := make([]byte, 10240*1024)
  117. rand.Read(payload)
  118. nBytes, err := conn.Write([]byte(payload))
  119. assert(err, IsNil)
  120. assert(nBytes, Equals, len(payload))
  121. response := readFrom(conn, time.Second*20, 10240*1024)
  122. assert(response, Equals, xor([]byte(payload)))
  123. assert(conn.Close(), IsNil)
  124. wg.Done()
  125. }()
  126. }
  127. wg.Wait()
  128. CloseAllServers(servers)
  129. }
  130. func TestShadowsocksAES128UDP(t *testing.T) {
  131. assert := With(t)
  132. udpServer := udp.Server{
  133. MsgProcessor: xor,
  134. }
  135. dest, err := udpServer.Start()
  136. assert(err, IsNil)
  137. defer udpServer.Close()
  138. account := serial.ToTypedMessage(&shadowsocks.Account{
  139. Password: "shadowsocks-password",
  140. CipherType: shadowsocks.CipherType_AES_128_CFB,
  141. Ota: shadowsocks.Account_Enabled,
  142. })
  143. serverPort := pickPort()
  144. serverConfig := &core.Config{
  145. App: []*serial.TypedMessage{
  146. serial.ToTypedMessage(&log.Config{
  147. ErrorLogLevel: log.LogLevel_Debug,
  148. ErrorLogType: log.LogType_Console,
  149. }),
  150. },
  151. Inbound: []*proxyman.InboundHandlerConfig{
  152. {
  153. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  154. PortRange: net.SinglePortRange(serverPort),
  155. Listen: net.NewIPOrDomain(net.LocalHostIP),
  156. }),
  157. ProxySettings: serial.ToTypedMessage(&shadowsocks.ServerConfig{
  158. UdpEnabled: true,
  159. User: &protocol.User{
  160. Account: account,
  161. Level: 1,
  162. },
  163. }),
  164. },
  165. },
  166. Outbound: []*proxyman.OutboundHandlerConfig{
  167. {
  168. ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
  169. },
  170. },
  171. }
  172. clientPort := pickPort()
  173. clientConfig := &core.Config{
  174. App: []*serial.TypedMessage{
  175. serial.ToTypedMessage(&log.Config{
  176. ErrorLogLevel: log.LogLevel_Debug,
  177. ErrorLogType: log.LogType_Console,
  178. }),
  179. },
  180. Inbound: []*proxyman.InboundHandlerConfig{
  181. {
  182. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  183. PortRange: net.SinglePortRange(clientPort),
  184. Listen: net.NewIPOrDomain(net.LocalHostIP),
  185. }),
  186. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  187. Address: net.NewIPOrDomain(dest.Address),
  188. Port: uint32(dest.Port),
  189. NetworkList: &net.NetworkList{
  190. Network: []net.Network{net.Network_UDP},
  191. },
  192. }),
  193. },
  194. },
  195. Outbound: []*proxyman.OutboundHandlerConfig{
  196. {
  197. ProxySettings: serial.ToTypedMessage(&shadowsocks.ClientConfig{
  198. Server: []*protocol.ServerEndpoint{
  199. {
  200. Address: net.NewIPOrDomain(net.LocalHostIP),
  201. Port: uint32(serverPort),
  202. User: []*protocol.User{
  203. {
  204. Account: account,
  205. },
  206. },
  207. },
  208. },
  209. }),
  210. },
  211. },
  212. }
  213. servers, err := InitializeServerConfigs(serverConfig, clientConfig)
  214. assert(err, IsNil)
  215. var wg sync.WaitGroup
  216. wg.Add(10)
  217. for i := 0; i < 10; i++ {
  218. go func() {
  219. conn, err := net.DialUDP("udp", nil, &net.UDPAddr{
  220. IP: []byte{127, 0, 0, 1},
  221. Port: int(clientPort),
  222. })
  223. assert(err, IsNil)
  224. payload := make([]byte, 1024)
  225. rand.Read(payload)
  226. nBytes, err := conn.Write([]byte(payload))
  227. assert(err, IsNil)
  228. assert(nBytes, Equals, len(payload))
  229. response := readFrom(conn, time.Second*5, 1024)
  230. assert(response, Equals, xor([]byte(payload)))
  231. assert(conn.Close(), IsNil)
  232. wg.Done()
  233. }()
  234. }
  235. wg.Wait()
  236. CloseAllServers(servers)
  237. }
  238. func TestShadowsocksChacha20TCP(t *testing.T) {
  239. assert := With(t)
  240. tcpServer := tcp.Server{
  241. MsgProcessor: xor,
  242. }
  243. dest, err := tcpServer.Start()
  244. assert(err, IsNil)
  245. defer tcpServer.Close()
  246. account := serial.ToTypedMessage(&shadowsocks.Account{
  247. Password: "shadowsocks-password",
  248. CipherType: shadowsocks.CipherType_CHACHA20_IETF,
  249. Ota: shadowsocks.Account_Enabled,
  250. })
  251. serverPort := pickPort()
  252. serverConfig := &core.Config{
  253. App: []*serial.TypedMessage{
  254. serial.ToTypedMessage(&log.Config{
  255. ErrorLogLevel: log.LogLevel_Debug,
  256. ErrorLogType: log.LogType_Console,
  257. }),
  258. },
  259. Inbound: []*proxyman.InboundHandlerConfig{
  260. {
  261. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  262. PortRange: net.SinglePortRange(serverPort),
  263. Listen: net.NewIPOrDomain(net.LocalHostIP),
  264. }),
  265. ProxySettings: serial.ToTypedMessage(&shadowsocks.ServerConfig{
  266. User: &protocol.User{
  267. Account: account,
  268. Level: 1,
  269. },
  270. }),
  271. },
  272. },
  273. Outbound: []*proxyman.OutboundHandlerConfig{
  274. {
  275. ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
  276. },
  277. },
  278. }
  279. clientPort := pickPort()
  280. clientConfig := &core.Config{
  281. App: []*serial.TypedMessage{
  282. serial.ToTypedMessage(&log.Config{
  283. ErrorLogLevel: log.LogLevel_Debug,
  284. ErrorLogType: log.LogType_Console,
  285. }),
  286. },
  287. Inbound: []*proxyman.InboundHandlerConfig{
  288. {
  289. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  290. PortRange: net.SinglePortRange(clientPort),
  291. Listen: net.NewIPOrDomain(net.LocalHostIP),
  292. }),
  293. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  294. Address: net.NewIPOrDomain(dest.Address),
  295. Port: uint32(dest.Port),
  296. NetworkList: &net.NetworkList{
  297. Network: []net.Network{net.Network_TCP},
  298. },
  299. }),
  300. },
  301. },
  302. Outbound: []*proxyman.OutboundHandlerConfig{
  303. {
  304. ProxySettings: serial.ToTypedMessage(&shadowsocks.ClientConfig{
  305. Server: []*protocol.ServerEndpoint{
  306. {
  307. Address: net.NewIPOrDomain(net.LocalHostIP),
  308. Port: uint32(serverPort),
  309. User: []*protocol.User{
  310. {
  311. Account: account,
  312. },
  313. },
  314. },
  315. },
  316. }),
  317. },
  318. },
  319. }
  320. servers, err := InitializeServerConfigs(serverConfig, clientConfig)
  321. assert(err, IsNil)
  322. var wg sync.WaitGroup
  323. wg.Add(10)
  324. for i := 0; i < 10; i++ {
  325. go func() {
  326. conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{
  327. IP: []byte{127, 0, 0, 1},
  328. Port: int(clientPort),
  329. })
  330. assert(err, IsNil)
  331. payload := make([]byte, 10240*1024)
  332. rand.Read(payload)
  333. nBytes, err := conn.Write([]byte(payload))
  334. assert(err, IsNil)
  335. assert(nBytes, Equals, len(payload))
  336. response := readFrom(conn, time.Second*20, 10240*1024)
  337. assert(response, Equals, xor([]byte(payload)))
  338. assert(conn.Close(), IsNil)
  339. wg.Done()
  340. }()
  341. }
  342. wg.Wait()
  343. CloseAllServers(servers)
  344. }
  345. func TestShadowsocksAES256GCMTCP(t *testing.T) {
  346. assert := With(t)
  347. tcpServer := tcp.Server{
  348. MsgProcessor: xor,
  349. }
  350. dest, err := tcpServer.Start()
  351. assert(err, IsNil)
  352. defer tcpServer.Close()
  353. account := serial.ToTypedMessage(&shadowsocks.Account{
  354. Password: "shadowsocks-password",
  355. CipherType: shadowsocks.CipherType_AES_256_GCM,
  356. })
  357. serverPort := pickPort()
  358. serverConfig := &core.Config{
  359. App: []*serial.TypedMessage{
  360. serial.ToTypedMessage(&log.Config{
  361. ErrorLogLevel: log.LogLevel_Debug,
  362. ErrorLogType: log.LogType_Console,
  363. }),
  364. },
  365. Inbound: []*proxyman.InboundHandlerConfig{
  366. {
  367. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  368. PortRange: net.SinglePortRange(serverPort),
  369. Listen: net.NewIPOrDomain(net.LocalHostIP),
  370. }),
  371. ProxySettings: serial.ToTypedMessage(&shadowsocks.ServerConfig{
  372. User: &protocol.User{
  373. Account: account,
  374. Level: 1,
  375. },
  376. }),
  377. },
  378. },
  379. Outbound: []*proxyman.OutboundHandlerConfig{
  380. {
  381. ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
  382. },
  383. },
  384. }
  385. clientPort := pickPort()
  386. clientConfig := &core.Config{
  387. App: []*serial.TypedMessage{
  388. serial.ToTypedMessage(&log.Config{
  389. ErrorLogLevel: log.LogLevel_Debug,
  390. ErrorLogType: log.LogType_Console,
  391. }),
  392. },
  393. Inbound: []*proxyman.InboundHandlerConfig{
  394. {
  395. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  396. PortRange: net.SinglePortRange(clientPort),
  397. Listen: net.NewIPOrDomain(net.LocalHostIP),
  398. }),
  399. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  400. Address: net.NewIPOrDomain(dest.Address),
  401. Port: uint32(dest.Port),
  402. NetworkList: &net.NetworkList{
  403. Network: []net.Network{net.Network_TCP},
  404. },
  405. }),
  406. },
  407. },
  408. Outbound: []*proxyman.OutboundHandlerConfig{
  409. {
  410. ProxySettings: serial.ToTypedMessage(&shadowsocks.ClientConfig{
  411. Server: []*protocol.ServerEndpoint{
  412. {
  413. Address: net.NewIPOrDomain(net.LocalHostIP),
  414. Port: uint32(serverPort),
  415. User: []*protocol.User{
  416. {
  417. Account: account,
  418. },
  419. },
  420. },
  421. },
  422. }),
  423. },
  424. },
  425. }
  426. servers, err := InitializeServerConfigs(serverConfig, clientConfig)
  427. assert(err, IsNil)
  428. var wg sync.WaitGroup
  429. wg.Add(10)
  430. for i := 0; i < 10; i++ {
  431. go func() {
  432. conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{
  433. IP: []byte{127, 0, 0, 1},
  434. Port: int(clientPort),
  435. })
  436. assert(err, IsNil)
  437. payload := make([]byte, 10240*1024)
  438. rand.Read(payload)
  439. nBytes, err := conn.Write([]byte(payload))
  440. assert(err, IsNil)
  441. assert(nBytes, Equals, len(payload))
  442. response := readFrom(conn, time.Second*20, 10240*1024)
  443. assert(response, Equals, xor([]byte(payload)))
  444. assert(conn.Close(), IsNil)
  445. wg.Done()
  446. }()
  447. }
  448. wg.Wait()
  449. CloseAllServers(servers)
  450. }
  451. func TestShadowsocksAES128GCMUDP(t *testing.T) {
  452. assert := With(t)
  453. udpServer := udp.Server{
  454. MsgProcessor: xor,
  455. }
  456. dest, err := udpServer.Start()
  457. assert(err, IsNil)
  458. defer udpServer.Close()
  459. account := serial.ToTypedMessage(&shadowsocks.Account{
  460. Password: "shadowsocks-password",
  461. CipherType: shadowsocks.CipherType_AES_128_GCM,
  462. })
  463. serverPort := pickPort()
  464. serverConfig := &core.Config{
  465. App: []*serial.TypedMessage{
  466. serial.ToTypedMessage(&log.Config{
  467. ErrorLogLevel: log.LogLevel_Debug,
  468. ErrorLogType: log.LogType_Console,
  469. }),
  470. },
  471. Inbound: []*proxyman.InboundHandlerConfig{
  472. {
  473. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  474. PortRange: net.SinglePortRange(serverPort),
  475. Listen: net.NewIPOrDomain(net.LocalHostIP),
  476. }),
  477. ProxySettings: serial.ToTypedMessage(&shadowsocks.ServerConfig{
  478. UdpEnabled: true,
  479. User: &protocol.User{
  480. Account: account,
  481. Level: 1,
  482. },
  483. }),
  484. },
  485. },
  486. Outbound: []*proxyman.OutboundHandlerConfig{
  487. {
  488. ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
  489. },
  490. },
  491. }
  492. clientPort := pickPort()
  493. clientConfig := &core.Config{
  494. App: []*serial.TypedMessage{
  495. serial.ToTypedMessage(&log.Config{
  496. ErrorLogLevel: log.LogLevel_Debug,
  497. ErrorLogType: log.LogType_Console,
  498. }),
  499. },
  500. Inbound: []*proxyman.InboundHandlerConfig{
  501. {
  502. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  503. PortRange: net.SinglePortRange(clientPort),
  504. Listen: net.NewIPOrDomain(net.LocalHostIP),
  505. }),
  506. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  507. Address: net.NewIPOrDomain(dest.Address),
  508. Port: uint32(dest.Port),
  509. NetworkList: &net.NetworkList{
  510. Network: []net.Network{net.Network_UDP},
  511. },
  512. }),
  513. },
  514. },
  515. Outbound: []*proxyman.OutboundHandlerConfig{
  516. {
  517. ProxySettings: serial.ToTypedMessage(&shadowsocks.ClientConfig{
  518. Server: []*protocol.ServerEndpoint{
  519. {
  520. Address: net.NewIPOrDomain(net.LocalHostIP),
  521. Port: uint32(serverPort),
  522. User: []*protocol.User{
  523. {
  524. Account: account,
  525. },
  526. },
  527. },
  528. },
  529. }),
  530. },
  531. },
  532. }
  533. servers, err := InitializeServerConfigs(serverConfig, clientConfig)
  534. assert(err, IsNil)
  535. var wg sync.WaitGroup
  536. wg.Add(10)
  537. for i := 0; i < 10; i++ {
  538. go func() {
  539. conn, err := net.DialUDP("udp", nil, &net.UDPAddr{
  540. IP: []byte{127, 0, 0, 1},
  541. Port: int(clientPort),
  542. })
  543. assert(err, IsNil)
  544. payload := make([]byte, 1024)
  545. rand.Read(payload)
  546. nBytes, err := conn.Write([]byte(payload))
  547. assert(err, IsNil)
  548. assert(nBytes, Equals, len(payload))
  549. response := readFrom(conn, time.Second*5, 1024)
  550. assert(response, Equals, xor([]byte(payload)))
  551. assert(conn.Close(), IsNil)
  552. wg.Done()
  553. }()
  554. }
  555. wg.Wait()
  556. CloseAllServers(servers)
  557. }
  558. func TestShadowsocksAES256GCMConformance(t *testing.T) {
  559. assert := With(t)
  560. tcpServer := tcp.Server{
  561. MsgProcessor: xor,
  562. }
  563. dest, err := tcpServer.Start()
  564. assert(err, IsNil)
  565. defer tcpServer.Close()
  566. account := serial.ToTypedMessage(&shadowsocks.Account{
  567. Password: "ss-password",
  568. CipherType: shadowsocks.CipherType_AES_256_GCM,
  569. })
  570. serverPort := pickPort()
  571. serverConfig := &core.Config{
  572. App: []*serial.TypedMessage{
  573. serial.ToTypedMessage(&log.Config{
  574. ErrorLogLevel: log.LogLevel_Debug,
  575. ErrorLogType: log.LogType_Console,
  576. }),
  577. },
  578. Inbound: []*proxyman.InboundHandlerConfig{
  579. {
  580. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  581. PortRange: net.SinglePortRange(serverPort),
  582. Listen: net.NewIPOrDomain(net.LocalHostIP),
  583. }),
  584. ProxySettings: serial.ToTypedMessage(&shadowsocks.ServerConfig{
  585. User: &protocol.User{
  586. Account: account,
  587. Level: 1,
  588. },
  589. }),
  590. },
  591. },
  592. Outbound: []*proxyman.OutboundHandlerConfig{
  593. {
  594. ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
  595. },
  596. },
  597. }
  598. servers, err := InitializeServerConfigs(serverConfig)
  599. assert(err, IsNil)
  600. var wg sync.WaitGroup
  601. wg.Add(10)
  602. for i := 0; i < 10; i++ {
  603. go func() {
  604. cipher, err := ss.PickCipher("AES-256-GCM", nil, "ss-password")
  605. assert(err, IsNil)
  606. conn, err := ss.Dial("tcp", fmt.Sprintf(":%d", serverPort), cipher)
  607. assert(err, IsNil)
  608. _, err = conn.Write([]byte{1, 127, 0, 0, 1})
  609. assert(err, IsNil)
  610. _, err = conn.Write(serial.Uint16ToBytes(dest.Port.Value(), nil))
  611. assert(err, IsNil)
  612. payload := make([]byte, 10240*1024)
  613. rand.Read(payload)
  614. nBytes, err := conn.Write([]byte(payload))
  615. assert(err, IsNil)
  616. assert(nBytes, Equals, len(payload))
  617. response := readFrom(conn, time.Second*30, 10240*1024)
  618. assert(response, Equals, xor([]byte(payload)))
  619. assert(conn.Close(), IsNil)
  620. wg.Done()
  621. }()
  622. }
  623. wg.Wait()
  624. CloseAllServers(servers)
  625. }
  626. func TestShadowsocksChacha20Poly1305UDPConformance(t *testing.T) {
  627. assert := With(t)
  628. udpServer := udp.Server{
  629. MsgProcessor: xor,
  630. }
  631. dest, err := udpServer.Start()
  632. assert(err, IsNil)
  633. defer udpServer.Close()
  634. account := serial.ToTypedMessage(&shadowsocks.Account{
  635. Password: "ss-password",
  636. CipherType: shadowsocks.CipherType_CHACHA20_POLY1305,
  637. })
  638. serverPort := pickPort()
  639. serverConfig := &core.Config{
  640. App: []*serial.TypedMessage{
  641. serial.ToTypedMessage(&log.Config{
  642. ErrorLogLevel: log.LogLevel_Debug,
  643. ErrorLogType: log.LogType_Console,
  644. }),
  645. },
  646. Inbound: []*proxyman.InboundHandlerConfig{
  647. {
  648. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  649. PortRange: net.SinglePortRange(serverPort),
  650. Listen: net.NewIPOrDomain(net.LocalHostIP),
  651. }),
  652. ProxySettings: serial.ToTypedMessage(&shadowsocks.ServerConfig{
  653. UdpEnabled: true,
  654. User: &protocol.User{
  655. Account: account,
  656. Level: 1,
  657. },
  658. }),
  659. },
  660. },
  661. Outbound: []*proxyman.OutboundHandlerConfig{
  662. {
  663. ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
  664. },
  665. },
  666. }
  667. servers, err := InitializeServerConfigs(serverConfig)
  668. assert(err, IsNil)
  669. cipher, err := ss.PickCipher("CHACHA20-IETF-POLY1305", nil, "ss-password")
  670. assert(err, IsNil)
  671. conn, err := ss.ListenPacket("udp", ":0", cipher)
  672. assert(err, IsNil)
  673. for i := 0; i < 100; i++ {
  674. payload := buf.New()
  675. payload.AppendBytes(1, 127, 0, 0, 1)
  676. payload.AppendSupplier(serial.WriteUint16(dest.Port.Value()))
  677. payload.AppendSupplier(buf.ReadFullFrom(rand.Reader, 10))
  678. nBytes, err := conn.WriteTo(payload.Bytes(), &net.UDPAddr{
  679. IP: []byte{127, 0, 0, 1},
  680. Port: int(serverPort),
  681. })
  682. assert(err, IsNil)
  683. assert(nBytes, Equals, payload.Len())
  684. conn.SetReadDeadline(time.Now().Add(time.Second * 10))
  685. response := make([]byte, 10240)
  686. nBytes, _, err = conn.ReadFrom(response)
  687. assert(err, IsNil)
  688. assert(response[:7], Equals, payload.BytesTo(7))
  689. assert(response[7:nBytes], Equals, xor(payload.BytesFrom(7)))
  690. }
  691. assert(conn.Close(), IsNil)
  692. CloseAllServers(servers)
  693. }
  694. func TestShadowsocksChacha20Conformance(t *testing.T) {
  695. assert := With(t)
  696. tcpServer := tcp.Server{
  697. MsgProcessor: xor,
  698. }
  699. dest, err := tcpServer.Start()
  700. assert(err, IsNil)
  701. defer tcpServer.Close()
  702. account := serial.ToTypedMessage(&shadowsocks.Account{
  703. Password: "ss-password",
  704. CipherType: shadowsocks.CipherType_CHACHA20_IETF,
  705. Ota: shadowsocks.Account_Disabled,
  706. })
  707. serverPort := pickPort()
  708. serverConfig := &core.Config{
  709. App: []*serial.TypedMessage{
  710. serial.ToTypedMessage(&log.Config{
  711. ErrorLogLevel: log.LogLevel_Debug,
  712. ErrorLogType: log.LogType_Console,
  713. }),
  714. },
  715. Inbound: []*proxyman.InboundHandlerConfig{
  716. {
  717. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  718. PortRange: net.SinglePortRange(serverPort),
  719. Listen: net.NewIPOrDomain(net.LocalHostIP),
  720. }),
  721. ProxySettings: serial.ToTypedMessage(&shadowsocks.ServerConfig{
  722. User: &protocol.User{
  723. Account: account,
  724. Level: 1,
  725. },
  726. }),
  727. },
  728. },
  729. Outbound: []*proxyman.OutboundHandlerConfig{
  730. {
  731. ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
  732. },
  733. },
  734. }
  735. servers, err := InitializeServerConfigs(serverConfig)
  736. assert(err, IsNil)
  737. var wg sync.WaitGroup
  738. wg.Add(10)
  739. for i := 0; i < 10; i++ {
  740. go func() {
  741. cipher, err := ss.PickCipher("CHACHA20-IETF", nil, "ss-password")
  742. assert(err, IsNil)
  743. conn, err := ss.Dial("tcp", fmt.Sprintf(":%d", serverPort), cipher)
  744. assert(err, IsNil)
  745. _, err = conn.Write([]byte{1, 127, 0, 0, 1})
  746. assert(err, IsNil)
  747. _, err = conn.Write(serial.Uint16ToBytes(dest.Port.Value(), nil))
  748. assert(err, IsNil)
  749. payload := make([]byte, 10240*1024)
  750. rand.Read(payload)
  751. nBytes, err := conn.Write([]byte(payload))
  752. assert(err, IsNil)
  753. assert(nBytes, Equals, len(payload))
  754. response := readFrom(conn, time.Second*30, 10240*1024)
  755. assert(response, Equals, xor([]byte(payload)))
  756. assert(conn.Close(), IsNil)
  757. wg.Done()
  758. }()
  759. }
  760. wg.Wait()
  761. CloseAllServers(servers)
  762. }