vmess.go 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264
  1. // Package vmess contains protocol definition, io lib for VMess.
  2. package vmess
  3. import (
  4. "crypto/aes"
  5. "crypto/cipher"
  6. "crypto/rand"
  7. "encoding/binary"
  8. "errors"
  9. "fmt"
  10. "io"
  11. mrand "math/rand"
  12. "github.com/v2ray/v2ray-core"
  13. v2io "github.com/v2ray/v2ray-core/io"
  14. "github.com/v2ray/v2ray-core/log"
  15. v2net "github.com/v2ray/v2ray-core/net"
  16. )
  17. const (
  18. addrTypeIPv4 = byte(0x01)
  19. addrTypeIPv6 = byte(0x03)
  20. addrTypeDomain = byte(0x02)
  21. Version = byte(0x01)
  22. blockSize = 16
  23. )
  24. var (
  25. ErrorInvalidUser = errors.New("Invalid User")
  26. ErrorInvalidVerion = errors.New("Invalid Version")
  27. )
  28. // VMessRequest implements the request message of VMess protocol. It only contains
  29. // the header of a request message. The data part will be handled by conection
  30. // handler directly, in favor of data streaming.
  31. type VMessRequest struct {
  32. Version byte
  33. UserId core.ID
  34. RequestIV [16]byte
  35. RequestKey [16]byte
  36. ResponseHeader [4]byte
  37. Command byte
  38. Address v2net.Address
  39. }
  40. type VMessRequestReader struct {
  41. vUserSet core.UserSet
  42. }
  43. func NewVMessRequestReader(vUserSet core.UserSet) *VMessRequestReader {
  44. reader := new(VMessRequestReader)
  45. reader.vUserSet = vUserSet
  46. return reader
  47. }
  48. func (r *VMessRequestReader) Read(reader io.Reader) (*VMessRequest, error) {
  49. request := new(VMessRequest)
  50. buffer := make([]byte, 256)
  51. nBytes, err := reader.Read(buffer[:core.IDBytesLen])
  52. if err != nil {
  53. return nil, err
  54. }
  55. log.Debug("Read user hash: %v", buffer[:nBytes])
  56. userId, timeSec, valid := r.vUserSet.GetUser(buffer[:nBytes])
  57. if !valid {
  58. return nil, ErrorInvalidUser
  59. }
  60. request.UserId = *userId
  61. aesCipher, err := aes.NewCipher(userId.CmdKey())
  62. if err != nil {
  63. return nil, err
  64. }
  65. aesStream := cipher.NewCFBDecrypter(aesCipher, core.TimestampHash(timeSec))
  66. decryptor := v2io.NewCryptionReader(aesStream, reader)
  67. if err != nil {
  68. return nil, err
  69. }
  70. nBytes, err = decryptor.Read(buffer[0:1])
  71. if err != nil {
  72. return nil, err
  73. }
  74. randomLength := buffer[0]
  75. if randomLength <= 0 || randomLength > 32 {
  76. return nil, fmt.Errorf("Unexpected random length %d", randomLength)
  77. }
  78. _, err = decryptor.Read(buffer[:randomLength])
  79. if err != nil {
  80. return nil, err
  81. }
  82. nBytes, err = decryptor.Read(buffer[0:1])
  83. if err != nil {
  84. return nil, err
  85. }
  86. request.Version = buffer[0]
  87. if request.Version != Version {
  88. log.Error("Unknown VMess version %d", request.Version)
  89. return nil, ErrorInvalidVerion
  90. }
  91. // TODO: check number of bytes returned
  92. _, err = decryptor.Read(request.RequestIV[:])
  93. if err != nil {
  94. return nil, err
  95. }
  96. _, err = decryptor.Read(request.RequestKey[:])
  97. if err != nil {
  98. return nil, err
  99. }
  100. _, err = decryptor.Read(request.ResponseHeader[:])
  101. if err != nil {
  102. return nil, err
  103. }
  104. _, err = decryptor.Read(buffer[0:1])
  105. if err != nil {
  106. return nil, err
  107. }
  108. request.Command = buffer[0]
  109. _, err = decryptor.Read(buffer[0:2])
  110. if err != nil {
  111. return nil, err
  112. }
  113. port := binary.BigEndian.Uint16(buffer[0:2])
  114. _, err = decryptor.Read(buffer[0:1])
  115. if err != nil {
  116. return nil, err
  117. }
  118. switch buffer[0] {
  119. case addrTypeIPv4:
  120. _, err = decryptor.Read(buffer[1:5])
  121. if err != nil {
  122. return nil, err
  123. }
  124. request.Address = v2net.IPAddress(buffer[1:5], port)
  125. case addrTypeIPv6:
  126. _, err = decryptor.Read(buffer[1:17])
  127. if err != nil {
  128. return nil, err
  129. }
  130. request.Address = v2net.IPAddress(buffer[1:17], port)
  131. case addrTypeDomain:
  132. _, err = decryptor.Read(buffer[1:2])
  133. if err != nil {
  134. return nil, err
  135. }
  136. domainLength := buffer[1]
  137. _, err = decryptor.Read(buffer[2 : 2+domainLength])
  138. if err != nil {
  139. return nil, err
  140. }
  141. request.Address = v2net.DomainAddress(string(buffer[2:2+domainLength]), port)
  142. }
  143. _, err = decryptor.Read(buffer[0:1])
  144. if err != nil {
  145. return nil, err
  146. }
  147. randomLength = buffer[0]
  148. _, err = decryptor.Read(buffer[:randomLength])
  149. if err != nil {
  150. return nil, err
  151. }
  152. return request, nil
  153. }
  154. type VMessRequestWriter struct {
  155. }
  156. func NewVMessRequestWriter() *VMessRequestWriter {
  157. writer := new(VMessRequestWriter)
  158. return writer
  159. }
  160. func (w *VMessRequestWriter) Write(writer io.Writer, request *VMessRequest) error {
  161. buffer := make([]byte, 0, 300)
  162. userHash, timeSec := request.UserId.TimeRangeHash(30)
  163. log.Debug("Writing userhash: %v", userHash)
  164. buffer = append(buffer, userHash...)
  165. encryptionBegin := len(buffer)
  166. randomLength := mrand.Intn(32) + 1
  167. randomContent := make([]byte, randomLength)
  168. _, err := rand.Read(randomContent)
  169. if err != nil {
  170. return err
  171. }
  172. buffer = append(buffer, byte(randomLength))
  173. buffer = append(buffer, randomContent...)
  174. buffer = append(buffer, request.Version)
  175. buffer = append(buffer, request.RequestIV[:]...)
  176. buffer = append(buffer, request.RequestKey[:]...)
  177. buffer = append(buffer, request.ResponseHeader[:]...)
  178. buffer = append(buffer, request.Command)
  179. portBytes := make([]byte, 2)
  180. binary.BigEndian.PutUint16(portBytes, request.Address.Port)
  181. buffer = append(buffer, portBytes...)
  182. switch {
  183. case request.Address.IsIPv4():
  184. buffer = append(buffer, addrTypeIPv4)
  185. buffer = append(buffer, request.Address.IP...)
  186. case request.Address.IsIPv6():
  187. buffer = append(buffer, addrTypeIPv6)
  188. buffer = append(buffer, request.Address.IP...)
  189. case request.Address.IsDomain():
  190. buffer = append(buffer, addrTypeDomain)
  191. buffer = append(buffer, byte(len(request.Address.Domain)))
  192. buffer = append(buffer, []byte(request.Address.Domain)...)
  193. }
  194. paddingLength := mrand.Intn(32) + 1
  195. paddingBuffer := make([]byte, paddingLength)
  196. _, err = rand.Read(paddingBuffer)
  197. if err != nil {
  198. return err
  199. }
  200. buffer = append(buffer, byte(paddingLength))
  201. buffer = append(buffer, paddingBuffer...)
  202. encryptionEnd := len(buffer)
  203. aesCipher, err := aes.NewCipher(request.UserId.CmdKey())
  204. if err != nil {
  205. return err
  206. }
  207. aesStream := cipher.NewCFBEncrypter(aesCipher, core.TimestampHash(timeSec))
  208. cWriter := v2io.NewCryptionWriter(aesStream, writer)
  209. _, err = writer.Write(buffer[0:encryptionBegin])
  210. if err != nil {
  211. return err
  212. }
  213. _, err = cWriter.Write(buffer[encryptionBegin:encryptionEnd])
  214. if err != nil {
  215. return err
  216. }
  217. return nil
  218. }
  219. type VMessResponse [4]byte
  220. func NewVMessResponse(request *VMessRequest) *VMessResponse {
  221. response := new(VMessResponse)
  222. copy(response[:], request.ResponseHeader[:])
  223. return response
  224. }