vmess.go 6.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259
  1. // Package vmess contains protocol definition, io lib for VMess.
  2. package protocol
  3. import (
  4. "crypto/aes"
  5. "crypto/cipher"
  6. "crypto/rand"
  7. "encoding/binary"
  8. "errors"
  9. "fmt"
  10. "io"
  11. mrand "math/rand"
  12. "time"
  13. v2io "github.com/v2ray/v2ray-core/common/io"
  14. "github.com/v2ray/v2ray-core/common/log"
  15. v2net "github.com/v2ray/v2ray-core/common/net"
  16. "github.com/v2ray/v2ray-core/proxy/vmess/protocol/user"
  17. )
  18. const (
  19. addrTypeIPv4 = byte(0x01)
  20. addrTypeIPv6 = byte(0x03)
  21. addrTypeDomain = byte(0x02)
  22. CmdTCP = byte(0x01)
  23. CmdUDP = byte(0x02)
  24. Version = byte(0x01)
  25. blockSize = 16
  26. )
  27. var (
  28. ErrorInvalidUser = errors.New("Invalid User")
  29. ErrorInvalidVerion = errors.New("Invalid Version")
  30. )
  31. // VMessRequest implements the request message of VMess protocol. It only contains
  32. // the header of a request message. The data part will be handled by conection
  33. // handler directly, in favor of data streaming.
  34. type VMessRequest struct {
  35. Version byte
  36. UserId user.ID
  37. RequestIV [16]byte
  38. RequestKey [16]byte
  39. ResponseHeader [4]byte
  40. Command byte
  41. Address v2net.Address
  42. }
  43. func (request *VMessRequest) Destination() v2net.Destination {
  44. if request.Command == CmdTCP {
  45. return v2net.NewTCPDestination(request.Address)
  46. } else {
  47. return v2net.NewUDPDestination(request.Address)
  48. }
  49. }
  50. type VMessRequestReader struct {
  51. vUserSet user.UserSet
  52. }
  53. func NewVMessRequestReader(vUserSet user.UserSet) *VMessRequestReader {
  54. return &VMessRequestReader{
  55. vUserSet: vUserSet,
  56. }
  57. }
  58. func (r *VMessRequestReader) Read(reader io.Reader) (*VMessRequest, error) {
  59. buffer := make([]byte, 256)
  60. nBytes, err := reader.Read(buffer[:user.IDBytesLen])
  61. if err != nil {
  62. return nil, err
  63. }
  64. log.Debug("Read user hash: %v", buffer[:nBytes])
  65. userId, timeSec, valid := r.vUserSet.GetUser(buffer[:nBytes])
  66. if !valid {
  67. return nil, ErrorInvalidUser
  68. }
  69. aesCipher, err := aes.NewCipher(userId.CmdKey())
  70. if err != nil {
  71. return nil, err
  72. }
  73. aesStream := cipher.NewCFBDecrypter(aesCipher, user.Int64Hash(timeSec))
  74. decryptor := v2io.NewCryptionReader(aesStream, reader)
  75. if err != nil {
  76. return nil, err
  77. }
  78. nBytes, err = decryptor.Read(buffer[0:1])
  79. if err != nil {
  80. return nil, err
  81. }
  82. randomLength := buffer[0]
  83. if randomLength <= 0 || randomLength > 32 {
  84. return nil, fmt.Errorf("Unexpected random length %d", randomLength)
  85. }
  86. _, err = decryptor.Read(buffer[:randomLength])
  87. if err != nil {
  88. return nil, err
  89. }
  90. nBytes, err = decryptor.Read(buffer[0:1])
  91. if err != nil {
  92. return nil, err
  93. }
  94. request := &VMessRequest{
  95. UserId: *userId,
  96. Version: buffer[0],
  97. }
  98. if request.Version != Version {
  99. log.Error("Unknown VMess version %d", request.Version)
  100. return nil, ErrorInvalidVerion
  101. }
  102. // TODO: check number of bytes returned
  103. _, err = decryptor.Read(request.RequestIV[:])
  104. if err != nil {
  105. return nil, err
  106. }
  107. _, err = decryptor.Read(request.RequestKey[:])
  108. if err != nil {
  109. return nil, err
  110. }
  111. _, err = decryptor.Read(request.ResponseHeader[:])
  112. if err != nil {
  113. return nil, err
  114. }
  115. _, err = decryptor.Read(buffer[0:1])
  116. if err != nil {
  117. return nil, err
  118. }
  119. request.Command = buffer[0]
  120. _, err = decryptor.Read(buffer[0:2])
  121. if err != nil {
  122. return nil, err
  123. }
  124. port := binary.BigEndian.Uint16(buffer[0:2])
  125. _, err = decryptor.Read(buffer[0:1])
  126. if err != nil {
  127. return nil, err
  128. }
  129. switch buffer[0] {
  130. case addrTypeIPv4:
  131. _, err = decryptor.Read(buffer[1:5])
  132. if err != nil {
  133. return nil, err
  134. }
  135. request.Address = v2net.IPAddress(buffer[1:5], port)
  136. case addrTypeIPv6:
  137. _, err = decryptor.Read(buffer[1:17])
  138. if err != nil {
  139. return nil, err
  140. }
  141. request.Address = v2net.IPAddress(buffer[1:17], port)
  142. case addrTypeDomain:
  143. _, err = decryptor.Read(buffer[1:2])
  144. if err != nil {
  145. return nil, err
  146. }
  147. domainLength := buffer[1]
  148. _, err = decryptor.Read(buffer[2 : 2+domainLength])
  149. if err != nil {
  150. return nil, err
  151. }
  152. request.Address = v2net.DomainAddress(string(buffer[2:2+domainLength]), port)
  153. }
  154. _, err = decryptor.Read(buffer[0:1])
  155. if err != nil {
  156. return nil, err
  157. }
  158. randomLength = buffer[0]
  159. _, err = decryptor.Read(buffer[:randomLength])
  160. if err != nil {
  161. return nil, err
  162. }
  163. return request, nil
  164. }
  165. func (request *VMessRequest) ToBytes(idHash user.CounterHash, randomRangeInt64 user.RandomInt64InRange) ([]byte, error) {
  166. buffer := make([]byte, 0, 300)
  167. counter := randomRangeInt64(time.Now().UTC().Unix(), 30)
  168. hash := idHash.Hash(request.UserId.Bytes, counter)
  169. log.Debug("Writing userhash: %v", hash)
  170. buffer = append(buffer, hash...)
  171. encryptionBegin := len(buffer)
  172. randomLength := mrand.Intn(32) + 1
  173. randomContent := make([]byte, randomLength)
  174. _, err := rand.Read(randomContent)
  175. if err != nil {
  176. return nil, err
  177. }
  178. buffer = append(buffer, byte(randomLength))
  179. buffer = append(buffer, randomContent...)
  180. buffer = append(buffer, request.Version)
  181. buffer = append(buffer, request.RequestIV[:]...)
  182. buffer = append(buffer, request.RequestKey[:]...)
  183. buffer = append(buffer, request.ResponseHeader[:]...)
  184. buffer = append(buffer, request.Command)
  185. buffer = append(buffer, request.Address.PortBytes()...)
  186. switch {
  187. case request.Address.IsIPv4():
  188. buffer = append(buffer, addrTypeIPv4)
  189. buffer = append(buffer, request.Address.IP()...)
  190. case request.Address.IsIPv6():
  191. buffer = append(buffer, addrTypeIPv6)
  192. buffer = append(buffer, request.Address.IP()...)
  193. case request.Address.IsDomain():
  194. buffer = append(buffer, addrTypeDomain)
  195. buffer = append(buffer, byte(len(request.Address.Domain())))
  196. buffer = append(buffer, []byte(request.Address.Domain())...)
  197. }
  198. paddingLength := mrand.Intn(32) + 1
  199. paddingBuffer := make([]byte, paddingLength)
  200. _, err = rand.Read(paddingBuffer)
  201. if err != nil {
  202. return nil, err
  203. }
  204. buffer = append(buffer, byte(paddingLength))
  205. buffer = append(buffer, paddingBuffer...)
  206. encryptionEnd := len(buffer)
  207. aesCipher, err := aes.NewCipher(request.UserId.CmdKey())
  208. if err != nil {
  209. return nil, err
  210. }
  211. aesStream := cipher.NewCFBEncrypter(aesCipher, user.Int64Hash(counter))
  212. aesStream.XORKeyStream(buffer[encryptionBegin:encryptionEnd], buffer[encryptionBegin:encryptionEnd])
  213. return buffer, nil
  214. }
  215. type VMessResponse [4]byte
  216. func NewVMessResponse(request *VMessRequest) *VMessResponse {
  217. response := new(VMessResponse)
  218. copy(response[:], request.ResponseHeader[:])
  219. return response
  220. }