vmess.go 5.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211
  1. // Package vmess contains protocol definition, io lib for VMess.
  2. package protocol
  3. import (
  4. "crypto/aes"
  5. "crypto/cipher"
  6. "encoding/binary"
  7. "hash/fnv"
  8. "io"
  9. "time"
  10. "github.com/v2ray/v2ray-core/common/errors"
  11. v2io "github.com/v2ray/v2ray-core/common/io"
  12. v2net "github.com/v2ray/v2ray-core/common/net"
  13. "github.com/v2ray/v2ray-core/proxy/vmess/protocol/user"
  14. )
  15. const (
  16. addrTypeIPv4 = byte(0x01)
  17. addrTypeIPv6 = byte(0x03)
  18. addrTypeDomain = byte(0x02)
  19. CmdTCP = byte(0x01)
  20. CmdUDP = byte(0x02)
  21. Version = byte(0x01)
  22. blockSize = 16
  23. )
  24. // VMessRequest implements the request message of VMess protocol. It only contains the header of a
  25. // request message. The data part will be handled by conection handler directly, in favor of data
  26. // streaming.
  27. type VMessRequest struct {
  28. Version byte
  29. UserId user.ID
  30. RequestIV [16]byte
  31. RequestKey [16]byte
  32. ResponseHeader [4]byte
  33. Command byte
  34. Address v2net.Address
  35. }
  36. // Destination is the final destination of this request.
  37. func (request *VMessRequest) Destination() v2net.Destination {
  38. if request.Command == CmdTCP {
  39. return v2net.NewTCPDestination(request.Address)
  40. } else {
  41. return v2net.NewUDPDestination(request.Address)
  42. }
  43. }
  44. // VMessRequestReader is a parser to read VMessRequest from a byte stream.
  45. type VMessRequestReader struct {
  46. vUserSet user.UserSet
  47. }
  48. // NewVMessRequestReader creates a new VMessRequestReader with a given UserSet
  49. func NewVMessRequestReader(vUserSet user.UserSet) *VMessRequestReader {
  50. return &VMessRequestReader{
  51. vUserSet: vUserSet,
  52. }
  53. }
  54. // Read reads a VMessRequest from a byte stream.
  55. func (r *VMessRequestReader) Read(reader io.Reader) (*VMessRequest, error) {
  56. buffer := make([]byte, 256)
  57. nBytes, err := reader.Read(buffer[:user.IDBytesLen])
  58. if err != nil {
  59. return nil, err
  60. }
  61. userId, timeSec, valid := r.vUserSet.GetUser(buffer[:nBytes])
  62. if !valid {
  63. return nil, errors.NewAuthenticationError(buffer[:nBytes])
  64. }
  65. aesCipher, err := aes.NewCipher(userId.CmdKey())
  66. if err != nil {
  67. return nil, err
  68. }
  69. aesStream := cipher.NewCFBDecrypter(aesCipher, user.Int64Hash(timeSec))
  70. decryptor := v2io.NewCryptionReader(aesStream, reader)
  71. if err != nil {
  72. return nil, err
  73. }
  74. nBytes, err = decryptor.Read(buffer[:41])
  75. if err != nil {
  76. return nil, err
  77. }
  78. bufferLen := nBytes
  79. request := &VMessRequest{
  80. UserId: *userId,
  81. Version: buffer[0],
  82. }
  83. if request.Version != Version {
  84. return nil, errors.NewProtocolVersionError(int(request.Version))
  85. }
  86. copy(request.RequestIV[:], buffer[1:17]) // 16 bytes
  87. copy(request.RequestKey[:], buffer[17:33]) // 16 bytes
  88. copy(request.ResponseHeader[:], buffer[33:37]) // 4 bytes
  89. request.Command = buffer[37]
  90. port := binary.BigEndian.Uint16(buffer[38:40])
  91. switch buffer[40] {
  92. case addrTypeIPv4:
  93. _, err = decryptor.Read(buffer[41:45]) // 4 bytes
  94. bufferLen += 4
  95. if err != nil {
  96. return nil, err
  97. }
  98. request.Address = v2net.IPAddress(buffer[41:45], port)
  99. case addrTypeIPv6:
  100. _, err = decryptor.Read(buffer[41:57]) // 16 bytes
  101. bufferLen += 16
  102. if err != nil {
  103. return nil, err
  104. }
  105. request.Address = v2net.IPAddress(buffer[41:57], port)
  106. case addrTypeDomain:
  107. _, err = decryptor.Read(buffer[41:42])
  108. if err != nil {
  109. return nil, err
  110. }
  111. domainLength := int(buffer[41])
  112. _, err = decryptor.Read(buffer[42 : 42+domainLength])
  113. if err != nil {
  114. return nil, err
  115. }
  116. bufferLen += 1 + domainLength
  117. request.Address = v2net.DomainAddress(string(buffer[42:42+domainLength]), port)
  118. }
  119. _, err = decryptor.Read(buffer[bufferLen : bufferLen+4])
  120. if err != nil {
  121. return nil, err
  122. }
  123. fnv1a := fnv.New32a()
  124. fnv1a.Write(buffer[:bufferLen])
  125. actualHash := fnv1a.Sum32()
  126. expectedHash := binary.BigEndian.Uint32(buffer[bufferLen : bufferLen+4])
  127. if actualHash != expectedHash {
  128. return nil, errors.NewCorruptedPacketError()
  129. }
  130. return request, nil
  131. }
  132. // ToBytes returns a VMessRequest in the form of byte array.
  133. func (request *VMessRequest) ToBytes(idHash user.CounterHash, randomRangeInt64 user.RandomInt64InRange, buffer []byte) ([]byte, error) {
  134. if buffer == nil {
  135. buffer = make([]byte, 0, 300)
  136. }
  137. counter := randomRangeInt64(time.Now().UTC().Unix(), 30)
  138. hash := idHash.Hash(request.UserId.Bytes[:], counter)
  139. buffer = append(buffer, hash...)
  140. encryptionBegin := len(buffer)
  141. buffer = append(buffer, request.Version)
  142. buffer = append(buffer, request.RequestIV[:]...)
  143. buffer = append(buffer, request.RequestKey[:]...)
  144. buffer = append(buffer, request.ResponseHeader[:]...)
  145. buffer = append(buffer, request.Command)
  146. buffer = append(buffer, request.Address.PortBytes()...)
  147. switch {
  148. case request.Address.IsIPv4():
  149. buffer = append(buffer, addrTypeIPv4)
  150. buffer = append(buffer, request.Address.IP()...)
  151. case request.Address.IsIPv6():
  152. buffer = append(buffer, addrTypeIPv6)
  153. buffer = append(buffer, request.Address.IP()...)
  154. case request.Address.IsDomain():
  155. buffer = append(buffer, addrTypeDomain)
  156. buffer = append(buffer, byte(len(request.Address.Domain())))
  157. buffer = append(buffer, []byte(request.Address.Domain())...)
  158. }
  159. encryptionEnd := len(buffer)
  160. fnv1a := fnv.New32a()
  161. fnv1a.Write(buffer[encryptionBegin:encryptionEnd])
  162. fnvHash := fnv1a.Sum32()
  163. buffer = append(buffer, byte(fnvHash>>24))
  164. buffer = append(buffer, byte(fnvHash>>16))
  165. buffer = append(buffer, byte(fnvHash>>8))
  166. buffer = append(buffer, byte(fnvHash))
  167. encryptionEnd += 4
  168. aesCipher, err := aes.NewCipher(request.UserId.CmdKey())
  169. if err != nil {
  170. return nil, err
  171. }
  172. aesStream := cipher.NewCFBEncrypter(aesCipher, user.Int64Hash(counter))
  173. aesStream.XORKeyStream(buffer[encryptionBegin:encryptionEnd], buffer[encryptionBegin:encryptionEnd])
  174. return buffer, nil
  175. }