server.go 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163
  1. //go:build !confonly
  2. // +build !confonly
  3. package mtproto
  4. import (
  5. "bytes"
  6. "context"
  7. "time"
  8. core "github.com/v2fly/v2ray-core/v4"
  9. "github.com/v2fly/v2ray-core/v4/common"
  10. "github.com/v2fly/v2ray-core/v4/common/buf"
  11. "github.com/v2fly/v2ray-core/v4/common/crypto"
  12. "github.com/v2fly/v2ray-core/v4/common/net"
  13. "github.com/v2fly/v2ray-core/v4/common/protocol"
  14. "github.com/v2fly/v2ray-core/v4/common/session"
  15. "github.com/v2fly/v2ray-core/v4/common/signal"
  16. "github.com/v2fly/v2ray-core/v4/common/task"
  17. "github.com/v2fly/v2ray-core/v4/features/policy"
  18. "github.com/v2fly/v2ray-core/v4/features/routing"
  19. "github.com/v2fly/v2ray-core/v4/transport/internet"
  20. )
  21. var dcList = []net.Address{
  22. net.ParseAddress("149.154.175.50"),
  23. net.ParseAddress("149.154.167.51"),
  24. net.ParseAddress("149.154.175.100"),
  25. net.ParseAddress("149.154.167.91"),
  26. net.ParseAddress("149.154.171.5"),
  27. }
  28. type Server struct {
  29. user *protocol.User
  30. account *Account
  31. policy policy.Manager
  32. }
  33. func NewServer(ctx context.Context, config *ServerConfig) (*Server, error) {
  34. if len(config.User) == 0 {
  35. return nil, newError("no user configured.")
  36. }
  37. user := config.User[0]
  38. rawAccount, err := config.User[0].GetTypedAccount()
  39. if err != nil {
  40. return nil, newError("invalid account").Base(err)
  41. }
  42. account, ok := rawAccount.(*Account)
  43. if !ok {
  44. return nil, newError("not a MTProto account")
  45. }
  46. v := core.MustFromContext(ctx)
  47. return &Server{
  48. user: user,
  49. account: account,
  50. policy: v.GetFeature(policy.ManagerType()).(policy.Manager),
  51. }, nil
  52. }
  53. func (s *Server) Network() []net.Network {
  54. return []net.Network{net.Network_TCP}
  55. }
  56. var (
  57. ctype1 = []byte{0xef, 0xef, 0xef, 0xef}
  58. ctype2 = []byte{0xee, 0xee, 0xee, 0xee}
  59. )
  60. func isValidConnectionType(c [4]byte) bool {
  61. if bytes.Equal(c[:], ctype1) {
  62. return true
  63. }
  64. if bytes.Equal(c[:], ctype2) {
  65. return true
  66. }
  67. return false
  68. }
  69. func (s *Server) Process(ctx context.Context, network net.Network, conn internet.Connection, dispatcher routing.Dispatcher) error {
  70. sPolicy := s.policy.ForLevel(s.user.Level)
  71. if err := conn.SetDeadline(time.Now().Add(sPolicy.Timeouts.Handshake)); err != nil {
  72. newError("failed to set deadline").Base(err).WriteToLog(session.ExportIDToError(ctx))
  73. }
  74. auth, err := ReadAuthentication(conn)
  75. if err != nil {
  76. return newError("failed to read authentication header").Base(err)
  77. }
  78. defer putAuthenticationObject(auth)
  79. if err := conn.SetDeadline(time.Time{}); err != nil {
  80. newError("failed to clear deadline").Base(err).WriteToLog(session.ExportIDToError(ctx))
  81. }
  82. auth.ApplySecret(s.account.Secret)
  83. decryptor := crypto.NewAesCTRStream(auth.DecodingKey[:], auth.DecodingNonce[:])
  84. decryptor.XORKeyStream(auth.Header[:], auth.Header[:])
  85. ct := auth.ConnectionType()
  86. if !isValidConnectionType(ct) {
  87. return newError("invalid connection type: ", ct)
  88. }
  89. dcID := auth.DataCenterID()
  90. if dcID >= uint16(len(dcList)) {
  91. return newError("invalid datacenter id: ", dcID)
  92. }
  93. dest := net.Destination{
  94. Network: net.Network_TCP,
  95. Address: dcList[dcID],
  96. Port: net.Port(443),
  97. }
  98. ctx, cancel := context.WithCancel(ctx)
  99. timer := signal.CancelAfterInactivity(ctx, cancel, sPolicy.Timeouts.ConnectionIdle)
  100. ctx = policy.ContextWithBufferPolicy(ctx, sPolicy.Buffer)
  101. sc := SessionContext{
  102. ConnectionType: ct,
  103. DataCenterID: dcID,
  104. }
  105. ctx = ContextWithSessionContext(ctx, sc)
  106. link, err := dispatcher.Dispatch(ctx, dest)
  107. if err != nil {
  108. return newError("failed to dispatch request to: ", dest).Base(err)
  109. }
  110. request := func() error {
  111. defer timer.SetTimeout(sPolicy.Timeouts.DownlinkOnly)
  112. reader := buf.NewReader(crypto.NewCryptionReader(decryptor, conn))
  113. return buf.Copy(reader, link.Writer, buf.UpdateActivity(timer))
  114. }
  115. response := func() error {
  116. defer timer.SetTimeout(sPolicy.Timeouts.UplinkOnly)
  117. encryptor := crypto.NewAesCTRStream(auth.EncodingKey[:], auth.EncodingNonce[:])
  118. writer := buf.NewWriter(crypto.NewCryptionWriter(encryptor, conn))
  119. return buf.Copy(link.Reader, writer, buf.UpdateActivity(timer))
  120. }
  121. responseDoneAndCloseWriter := task.OnSuccess(response, task.Close(link.Writer))
  122. if err := task.Run(ctx, request, responseDoneAndCloseWriter); err != nil {
  123. common.Interrupt(link.Reader)
  124. common.Interrupt(link.Writer)
  125. return newError("connection ends").Base(err)
  126. }
  127. return nil
  128. }
  129. func init() {
  130. common.Must(common.RegisterConfig((*ServerConfig)(nil), func(ctx context.Context, config interface{}) (interface{}, error) {
  131. return NewServer(ctx, config.(*ServerConfig))
  132. }))
  133. }